?? the basics of hacking- introduction.txt
字號(hào):
/ROOTBY THE WAY, MOST UNIX SYSTEMS HAVETHEIR LOG FILE ON THE ROOT, SO YOUCAN SET UP A WATCH ON THE FILE, WAITINGFOR PEOPLE TO LOG IN AND SNATCH THEIRPASSWORD AS IT PASSES THRU THE FILE.TO CONNECT TO A DIRECTORY, USE THECOMMAND: => CD PATHNAMETHIS ALLOWS YOU TO DO WHAT YOU WANTWITH THAT DIRECTORY. YOU MAY BE ASKEDFOR A PASSWORD, BUT THIS IS A GOODWAY OF FINDING OTHER USER NAMES TOHACK ONTO.THE WILDCARD CHARACTER IN UNIX, IFYOU WANT TO SEARCH DOWN A PATH FORA GAME OR SUCH, IS THE *.=> LS /*SHOULD SHOW YOU WHAT YOU CAN ACCESS.THE FILE TYPES ARE THE SAME AS THEYARE ON A DEC, SO REFER TO THAT SECTIONWHEN EXAMINING FILE. TO SEE WHAT ISIN A FILE, USE THE => PR FILENAMECOMMAND, FOR PRINT FILE.WE ADVISE PLAYING WITH PATHNAMES TOGET THE HANG OF THE CONCEPT. THEREIS ON-LINE HELP AVAILABLE ON MOSTSYSTEMS WITH A 'HELP' OR A '?'.WE ADVISE YOU LOOK THRU THE HELPFILES AND PAY ATTENTION TO ANYTHINGTHEY GIVE YOU ON PATHNAMES, OR THECOMMANDS FOR THE SYSTEM.YOU CAN, AS A USER, CREATE OR DESTROYDIRECTORIES ON THE TREE BENEATH YOU.THIS MEANS THAT ROOT CAN KILL EVERY-THING BUT ROOT, AND YOU CAN KILL ANYTHAT ARE BELOW YOU. THESE ARE THE=> MKDIR PATHNAME=> RMDIR PATHNAMECOMMANDS.ONCE AGAIN, YOU ARE NOT ALONE ON THESYSTEM... TYPE=> WHOTO SEE WHAT OTHER USERS ARE LOGGED INTO THE SYSTEM AT THE TIME. IF YOUWANT TO TALK TO THEM=> WRITE USERNAMEWILL ALLOW YOU TO CHAT AT THE SAMETIME, WITHOUT HAVING TO WORRY ABOUT THEPARSER. TO SEND MAIL TO A USER, SAY=> MAILAND ENTER THE MAIL SUB-SYSTEM.TO SEND A MESSAGE TO ALL THE USERSON THE SYSTEM, SAY => WALLWHICH STANDS FOR 'WRITE ALL'BY THE WAY, ON A FEW SYSTEMS, ALL YOUHAVE TO DO IS HIT THE <RETURN> KEYTO END THE MESSAGE, BUT ON OTHERS YOUMUST HIT THE CNTRL-D KEY.TO SEND A SINGLE MESSAGE TO A USER,SAY => WRITE USERNAMETHIS IS VERY HANDY AGAIN! IF YOU SENDTHE SEQUENCE OF CHARACTERS DISCUSSEDAT THE VERY BEGINNING OF THIS ARTICLE,YOU CAN HAVE THE SUPER-USER TERMINAL DOTRICKS FOR YOU AGAIN.PRIVS:IF YOU WANT SUPER-USER PRIVS, YOU CANEITHER LOG IN AS ROOT, OR EDIT YOURACCT. SO IT CAN SAY => SUTHIS NOW GIVES YOU THE # PROMPT, ANDALLOWS YOU TO COMPLETELY BY-PASS THEPROTECTION. THE WONDERFUL SECURITYCONSCIOUS DEVELOPERS AT BELL MADE ITVERY DIFFICULT TO DO MUCH WITHOUTPRIVS, BUT ONCE YOU HAVE THEM, THEREIS ABSOLUTELY NOTHING STOPPING YOUFROM DOING ANYTHING YOU WANT TO.TO BRING DOWN A UNIX SYSTEM:=> CHDIR /BIN=> RM *THIS WIPES OUT THE PATHNAME BIN, WHEREALL THE SYSTEM MAINTENANCE FILES ARE.OR TRY:=> R -RTHIS RECURSIVELY REMOVES EVERYTHINGFROM THE SYSTEM EXCEPT THE REMOVECOMMAND ITSELF.OR TRY:=> KILL -1,1=> SYNCTHIS WIPES OUT THE SYSTEM DEVICES FROMOPERATION.WHEN YOU ARE FINALLY SICK AND TIREDFROM HACKING ON THE VAX SYSTEMS, JUSTHIT YOUR CNTRL-D AND REPEAT KEY, ANDYOU WILL EVENTUALLY BE LOGGED OUT._______________________________________THE REASON THIS FILE SEEMS TO BE VERYSKETCHY IS THE FACT THAT BELL HAS 7LICENCED VERSIONS OF UNIX OUT IN THEPUBLIC DOMAIN, AND THESE COMMANDS ARETHOSE COMMON TO ALL OF THEM. WERECOMMEND YOU HACK ONTO THE ROOT ORBIN DIRECTORY, SINCE THEY HAVE THEHIGHEST LEVELS OF PRIVS, AND THEREIS REALLY NOT MUCH YOU CAN DO (EXCEPTDEVELOPE SOFTWARE) WITHOUT THEM._______________________________________THIS ARTICLE WRITTEN BY:THE KNIGHTS OF SHADOW_______________________________________Description: Hacking DEC's (Knights of Shadow II) File Date: 6-21-87 File Time: 6:31 am******************************************************************************** **** Hacking : DEC's **** ******************************************************************************** Welcome to Basics of Hacking I: DEC's In this article you will learn howto log in to DEC's, logging out, and all the fun stuff to do in-between.All of this information is based on a standard DEC system. Since thereare DEC systems 10 and 20, and we favor, the DEC 20, there will be moreinfo on them in this article. It is also the more common of the two,and is used by much more interesting people (if you know what we mean...)Ok, the first thing you want to do when you are receiving carrier froma DEC system is to find out the format of login names. You can do thisby looking at who is on the system.DEC=> @ (the 'exec' level prompt)YOU=> SYSY is short for SY(STAT) and shows you the system status. You should see|he format of login names... A SYSTAT usually comes up in this form:Job Line Program UserJob: The JOB number (Not important unless you want to log them off later)Line: What line they are on (used to talk to them...) These are both two or three digit numbers.Program: What program are they running under? If it says 'EXEC' they aren't doing anything at all...User: ahhhAHHHH! This is the user name they are logged in under...Copy the format, and hack yourself out a working code...Login format is as such:DEC=> @YOU=> login username passwordUsername is the username in the format you saw above in the SYSTAT. After youhit the space after your username, it will stop echoing characters back toyour screen. This is the password you are typing in... Remember, peopleusually use their name, their dog's name, the name of a favorite characterin a book, or something like this. A few clever people have it set to a keycluster (qwerty or asdfg). PW's can be from 1 to 8 characters long, anythingafter that is ignored. It would be nice to have a little help, wouldn't it? Just type a ?or the word HELP, and it will give you a whole list of topics...Some handy characters for you to know would be the control keys, wouldn't it?Backspace on a DEC 20 is rub which is 255 on your ASCII chart. On the DEC 10it is Ctrl-H. To abort a long listing or a program, Ctrl-C works fine. UseCtrl-O to stop long output to the terminal. This is handy when playinga game, but you don't want to Ctrl-C out. Ctrl-T for the time. Ctrl-Uwill kill the whole line you are typing at the moment. You may accidentlyrun a program where the only way out is a Ctrl-X, so keep that in reserve.Ctrl-S to stop listing, Ctrl-Q to continue on both systems. Is yourterminal having trouble?? Like, it pauses for no reason, or it doesn'tbackspace right? This is because both systems support many terminals,and you haven't told it what yours is yet... You are using a VT05 (Isn'tthat funny? I thought i had an apple) so you need to tell it you are one.DEC=> @YOU=> information terminal or...YOU=> info terThis shows you what your terminal is set up as...DEC=> all sorts of shit, then the @YOU=> set ter vt05This sets your terminal type to VT05. Now let's see what is in the account(here after abbreviated acct.) that you have hacked onto...SAY => DIRshort for directory, it shows you what the user of the code has save to thedisk. There should be a format like this: xxxxx.ooo xxxxx is the filename, from 1 to 20 characters long. ooo is the file type, one of:exe, txt, dat, bas, cmd and a few others that are system dependant.Exe is a compiled program that can be run (just by typing its name at the @).Txt is a text file, which you can see by typing=> type xxxxx.txtDo not try to=> type xxxxx.exe This is very bad for your terminal andwill tell you absolutly nothing. Dat is data they have saved.Bas is a basic program, you can have it typed out for you.Cmd is a command type file, a little too complicated to go into here.TRY => take xxxxx.cmdBy the way, there are other usersout there who may have files you canuse (Gee, why else am i here?).TYPE => DIR <*.*> (DEC 20) => DIR [*,*] (DEC 10)* is a wildcard, and will allow youto access the files on other accounts if the user has it set for publicaccess. If it isn't set for public access, then you won't see it.to run that program:DEC=> @YOU=> username program-nameUsername is the directory you saw the file listed under, and file name waswhat else but the file name?** YOU ARE NOT ALONE **Remember, you said (at the very start) SY short for SYSTAT, and how we saidthis showed the other users on the system? Well, you can talk to them,or at least send a message to anyone you see listed in a SYSTAT. You cando this by:DEC=> the user list (from your systat)YOU=> talk username (DEC 20) send username (DEC 10)Talk allows you and them immediate conferencing.Description: Hackign Data General (Knights of Shadow IV) File Date: 6-21-87 File Time: 6:36 am******************************************************************************** **** Hacking III: Data **** General **** ******************************************************************************** Welcome to the basics of hacking III: Data General computers.Data General is favored by large corporations who need to have a lot ofdata on-line. The Data General AOS, which stands for Advance on ofbastardized UNIX. All the commands which were in the UNIX article, willwork on a Data General. Once again, we have the problem of not knowingthe format for the login name on the Data General you want to hack. Asseems to be standard, try names from one to 8 digits long. Data Generaldesigned the computer to be for businessmen, and is thus very simplistic,and basically fool proof (but not damn fool proof). It follows the samelogin format as the unix system:DG=> login:DG=> password:YOU=> passwordPasswords can be a maximum of 8 characters, and they are almost alwaysset to a default of 'AOS' or 'DG'. (any you know about businessmen...) A word about control characters:Ctrl-O stops massive print-outs to the screen, but leaves you in whatevermode you were. (A technical word on what this actually does: It tells theCPU to ignore the terminal, and prints everything out to the CPU! This isabout 19200 baud, and so it seems like it just cancels.) Ctrl-U kills theline you are typing at the time. Now for the weird one: Ctrl-C tells theCPU to stop, and wait for another ctrl character. To stop a program,you actually need to type Ctrl-C and then a Ctrl-B. Once you get on, type 'HELP'. Many DG (Data General) computers are soldin a package deal, which also gets the company free customizing. So you neverknow what commands there might be. So we will follow what is known as the'ECLIPSE STANDARD', or''ctory like. To find out the files on the directoryyou are using, type=> DIRTo run a program, just like on a DEC, just type its name. Other than this,and running other people's programs, there really isn't a standard...*** HARK, yon other system users ***To see who is on, type => WHO remember?). This shows the other users,what they are doing, and what paths they are connected across. Thisis handy, so try a few of those paths yourself. To send a message, say=> send usernameThis is a one time message, just like send on the DEC 10. From here on, trycommands from the other previous files and from the 'HELP' listing.superuser:If you can get privs, just say:=> superuser onand you turn those privs on!By the way, you remember that computers keep a log of what people do? type:=> syslog /stopand it no longer records anything you do on the system, or any of the otherusers. It screams to high heaven that it was you who turned it off, but itkeeps no track of any accounts created or whatever else you may do. You cansay=> syslog /startto turn it back on (now why would you want to do something like that?????)To exit from the system, type=> BYE and the system will hang up on you. Most of the systems around, including DECs, VAX's, and DG's, have games.These are usually located in a path or directory of the name games or <games>or games: Try looking in them, and you might find adventure, zork, wumpus(with bent arrows in hand) or a multitude of others. There may also begames called 'CB' or 'FORUM'. These are a sort of computer conference call.Use them on weekends, and you can meet all sorts of interesting people. If you would like to see more articles on hacking (this time far more thanjust the basics), or maybe articles on networks and such, then leave us mailif we are on the system, or have the sysop search us down. We call a lotof places, and you may just find us.******************************************************************************This completes the series of articles on hacking...The Basics of Hacking: IntroductionThe Basics of Hacking I: DEC'sThe Basics of Hacking II: VAX's (UNIX)The Basics of Hacking III: DG's******************************************************************************This and the previous articles by:The Knights of Shadow******************************************************************************Downloaded From P-80 International Information Systems 304-744-2253
?? 快捷鍵說(shuō)明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號(hào)
Ctrl + =
減小字號(hào)
Ctrl + -