亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? a novice's guide to hacking.txt

?? 黑客培訓教程
?? TXT
字號:
This file is an addendum to "A Novice's Guide To Hacking" written by "TheMentor".  The word "hacking" is here used the way the non-hacking publicthinks it is used, to mean breaking into somebody else's computer.  Itspurpose is to expand and clarify the information about the TOPS-20 operatingsystem, which runs on DECsystem-20 mainframes.  The Mentor basically lumpedthis system in with TOPS-10 and didn't note important differences between thetwo.  I will here reproduce in full what The Mentor had to say about TOPS-10and about VMS, which are the parent and the offspring of TOPS-20.VMS-       The VAX computer is made by Digital Equipment Corporation (DEC),           and runs the VMS (Virtual Memory System) operating system.           VMS is characterized by the 'Username:' prompt.  It will not tell           you if you've entered a valid username or not, and will disconnect           you after three bad login attempts.  It also keeps track of all           failed login attempts and informs the owner of the account next time           s/he logs in how many bad login attempts were made on the account.           It is one of the most secure operating systems around from the           outside, but once you're in there are many things that you can do           to circumvent system security.  The VAX also has the best set of           help files in the world.  Just type HELP and read to your heart's           content.           Common Accounts/Defaults:  [username: password [[,password]] ]           SYSTEM:     OPERATOR or MANAGER or SYSTEM or SYSLIB           OPERATOR:   OPERATOR           SYSTEST:    UETP           SYSMAINT:   SYSMAINT or SERVICE or DIGITAL           FIELD:      FIELD or SERVICE           GUEST:      GUEST or unpassworded           DEMO:       DEMO  or unpassworded           DECNET:     DECNETDEC-10-    An earlier line of DEC computer equipment, running the TOPS-10           operating system.  These machines are recognized by their           '.' prompt.  The DEC-10/20 series are remarkably hacker-friendly,           allowing you to enter several important commands without ever           logging into the system.  Accounts are in the format [xxx,yyy] where           xxx and yyy are integers.  You can get a listing of the accounts and           the process names of everyone on the system before logging in with           the command .systat (for SYstem STATus).  If you seen an account           that reads [234,1001]   BOB JONES, it might be wise to try BOB or           JONES or both for a password on this account.  To login, you type           .login xxx,yyy  and then type the password when prompted for it.           The system will allow you unlimited tries at an account, and does           not keep records of bad login attempts.  It will also inform you           if the UIC you're trying (UIC = User Identification Code, 1,2 for           example) is bad.           Common Accounts/Defaults:           1,2:        SYSLIB or OPERATOR or MANAGER           2,7:        MAINTAIN           5,30:       GAMES**** note:  I'm remembering this stuff from several years ago, and in somecases my memory may be foggy or stuff may be outdated.TOPS-20, once you are inside, resembles VMS much more than it resembles  TOPS-10, as far as I know (I'm not really familiar with VMS).  From theoutside, it's more like TOPS-10, except that the prompt is a @ instead of aperiod.  You can enter many commands without logging in, including SYSTAT andprobably FINGER.  (Sometimes you can even use the mail program withoutlogging in.)  It is very helpful.  Not only does the command HELP lead tolots of useful information, but anywhere in typing a command you can press ?and it will tell you what the format of the command expects.  For instance,if you type ? by itself, it will tell you all the words that a command canbegin with.  If you type S?, it will tell you all the commands that startwith the letter S.  If you type SYSTAT ?, it will tell you the optionsavailable on the systat command.  You can use this at any point in anycommand.  Furthermore, if there is only one possibility (you have typed aunique abbreviation), you can press Escape and it will finish the word foryou.  I'm not sure, but I think TOPS-20 was the system that first introducedfilename completion as well --turning a uniquely abbreviated filename into acomplete name when you press escape, beeping if the abbreviation is notunique.  With command keywords you can leave the abbreviation un-expanded,with filenames you have to expand it (or type it all in) for it to work.Use the "Login" command to log in, followed by a username.  It will promptfor a password.  Note that a password can be something like 39 characterslong, as can the username itself.  TOPS-20 does NOT use numbers like 317,043for user IDs.  (Note that these numbers in TOPS-10 are octal, not decimal.) Furthermore, the password can contain spaces.  So, if somebody wants to makehis password difficult to guess, he can easily do so.(But sometimes they might get overconfident.  I remember a story fromStanford...  Someone asked the large cheese if he would let him know what theoperator password was, and he said "The operator password is currentlyunavailable."  So the guy tried "currently unavailable" as a password, andgot in.  (Which reminds me of the time they got a real bug in the systemthere...  a head crash caused by an ant on the disk platter.))In general, TOPS-20 does not limit the number of login attempts, nor does itkeep a record of bad tries.  However, it is not difficult for the localmanagement to add such measures, or others such as a delay of several secondsafter each attempt.  And unlike Unix, it is difficult to evade these evenonce you're in.  Without heavy in-depth knowledge, you can't test a username-password combination except through a system call, which will enforce delaysand limited failures and such against password-trying programs.So, TOPS-20 is easy to defend against the "database hack", in which you trymany different common passwords with many different usernames.  (Unix ismuch more vulnerable to this.)  But any particular system, especially a laxone like a college machine (DEC is always popular in academia), might havelittle defense here.  But you might not know how much defense until too late.Do try the GUEST username.But TOPS-20 can be very vulnerable to trojan horses.  See, there's this thingcalled the Wheel bit.  A username that has the Wheel property can do anythingthe system operator can do, such as ignore file protection masks, edit thedisks at the track/sector level, change any area of memory...  On Unix, onlyone user, the superuser, can read and write protected files.  On TOPS-20, anyuser can do these things from any terminal, if the Wheel attribute is set inhis user data.  Some campus computers tend to accumulate excess trusted userswith wheel bits, and have to periodically prune away the unnecessary ones.The thing is that a wheel can do these things without knowing that he hasdone them.  Normally the privileged commands are deactivated.  But a programrun by a wheel can activate the privileges, do anything it wants, cover itstracks, and deactivate them without the user ever being the wiser.  So if youcan get any wheel user to run any program you wrote, such as a game or smallutility...  there's no limit to what you can do.  In particular, you cancreate a new username, and make it a wheel.  Or you can simply ask the systemoutright for someone's password, if I'm not mistaken.  (All this requiresaccess to TOPS-20 programming manuals, but some of the necessary materialshould be available on line.)  You cannot actually conceal this creation, asfar as I know...  but maybe with sophisticated enough knowledge you couldmake it not immediately apparent...  Anyway, once you get that far in, you canprobably keep one step ahead of them for a while...  If they erase your newaccounts, you can use the passwords to old ones...  They can change all ofthe wheel passwords, but a lot of the regular users won't change for sometime...  You could even lock the operators out of their own system bychanging all their passwords for them, if you were crazy enough, perhapsforcing them to shut the machine down to regain control of it.  They mighteven have to restore stuff from tape backup.Even if you don't wedge your way into secret stuff, a TOPS-20 system can befun to explore.  It's much more novice-friendly than most systems, and muchmore hacker-friendly as well.  I think the ascendency of Unix as the least-common-denominator OS that everybody can agree on is a definite loss,compared to TOPS-20.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
99精品桃花视频在线观看| 亚洲私人黄色宅男| 91色九色蝌蚪| a亚洲天堂av| 99久久精品免费观看| 91一区一区三区| 成人18精品视频| 91香蕉视频污在线| 在线观看亚洲精品视频| 在线观看91精品国产入口| 色综合av在线| 欧美日韩aaaaaa| 日韩一区二区三区免费看| 精品国产在天天线2019| 久久久久久久综合色一本| 国产目拍亚洲精品99久久精品| 亚洲成av人片在线| 天天操天天干天天综合网| 日韩精品一级二级| 国产一区二区精品在线观看| 国产成人自拍在线| 99v久久综合狠狠综合久久| 在线观看亚洲精品视频| 欧美精品1区2区3区| 久久综合色播五月| 综合在线观看色| 五月激情综合婷婷| 国产一区二区三区国产| 91香蕉视频在线| 欧美一区二区久久| 国产精品成人网| 婷婷久久综合九色综合伊人色| 久久激情综合网| av欧美精品.com| 欧美一级免费大片| 自拍av一区二区三区| 日本aⅴ亚洲精品中文乱码| 成人免费看黄yyy456| 欧美人与性动xxxx| 国产精品美女久久福利网站| 三级成人在线视频| 成人av先锋影音| 日韩一级大片在线观看| 综合婷婷亚洲小说| 国产在线播精品第三| 欧美日韩一区小说| 亚洲欧洲三级电影| 国产一区二区主播在线| 欧美色倩网站大全免费| 欧美激情综合五月色丁香 | 国产一区二区三区| 欧洲另类一二三四区| 久久丝袜美腿综合| 老司机一区二区| 欧美久久一区二区| 一区二区久久久久| av电影在线观看一区| 精品99999| 毛片av一区二区三区| 欧美人牲a欧美精品| 亚洲欧美一区二区视频| 国产91高潮流白浆在线麻豆| 日韩精品专区在线影院重磅| 亚洲超丰满肉感bbw| 在线观看日韩毛片| 亚洲精品视频免费看| heyzo一本久久综合| 欧美国产日韩精品免费观看| 国产另类ts人妖一区二区| 欧美一区二区女人| 日本免费在线视频不卡一不卡二| 欧美三级资源在线| 亚洲国产欧美在线| 欧美性淫爽ww久久久久无| 亚洲乱码国产乱码精品精可以看| 成人午夜在线免费| 国产精品福利一区二区三区| 丁香另类激情小说| 亚洲欧洲成人精品av97| www.亚洲在线| 亚洲欧美日本在线| 在线一区二区三区四区五区| 亚洲成人av电影在线| 91精品国产综合久久久久久| 日本在线观看不卡视频| 3751色影院一区二区三区| 日本免费在线视频不卡一不卡二| 日韩免费视频线观看| 国内久久婷婷综合| 国产精品美女久久久久久久久久久| 国产成人丝袜美腿| 椎名由奈av一区二区三区| 91九色最新地址| 天使萌一区二区三区免费观看| 在线播放亚洲一区| 国产一区在线看| 1000部国产精品成人观看| 欧洲一区在线观看| 毛片av中文字幕一区二区| 国产欧美视频一区二区三区| 99国产精品久久久| 日日骚欧美日韩| 国产亚洲一本大道中文在线| 97久久超碰国产精品电影| 五月天中文字幕一区二区| 欧美变态tickle挠乳网站| 1区2区3区欧美| 欧美日韩一区中文字幕| 国内精品写真在线观看| 亚洲男同1069视频| 日韩一区二区在线观看视频| 国产成人精品一区二区三区四区| 亚洲女爱视频在线| 精品国产欧美一区二区| 色综合 综合色| 国产最新精品精品你懂的| 亚洲蜜桃精久久久久久久| 欧美成人国产一区二区| 不卡的av在线| 极品瑜伽女神91| 亚洲一区二区四区蜜桃| 久久久久久久一区| 欧美高清hd18日本| 波波电影院一区二区三区| 精品一区二区在线视频| 亚洲综合视频在线观看| 国产精品视频yy9299一区| 在线电影国产精品| 一本一道久久a久久精品 | 91色.com| 国产乱子伦视频一区二区三区| 亚洲一二三区在线观看| 26uuu国产一区二区三区| 欧美日韩精品电影| 色香蕉久久蜜桃| 成人激情电影免费在线观看| 国产自产高清不卡| 久久福利资源站| 日本欧美韩国一区三区| 亚洲一级电影视频| 亚洲嫩草精品久久| 综合婷婷亚洲小说| 综合电影一区二区三区| 国产精品沙发午睡系列990531| 久久综合狠狠综合久久综合88 | 亚洲乱码精品一二三四区日韩在线| 久久精品一区八戒影视| 日韩免费观看高清完整版在线观看| 欧美日韩一区中文字幕| 欧美视频中文一区二区三区在线观看| 成人免费毛片嘿嘿连载视频| 高清视频一区二区| 成人avav影音| av不卡在线播放| 色综合欧美在线视频区| 91久久一区二区| 欧美体内she精视频| 欧美群妇大交群中文字幕| 欧美日韩卡一卡二| 欧美一级一级性生活免费录像| 欧美久久久一区| 欧美一区二区福利视频| 日韩视频一区二区三区在线播放 | 欧美中文字幕一区二区三区亚洲| av在线一区二区三区| 99久久久久久| 欧美性生活大片视频| 8x福利精品第一导航| 精品毛片乱码1区2区3区| 久久久久久久久久看片| 中文字幕色av一区二区三区| 亚洲色欲色欲www在线观看| 亚洲国产日韩a在线播放| 首页亚洲欧美制服丝腿| 激情六月婷婷久久| 丰满放荡岳乱妇91ww| 色综合天天综合网天天狠天天| 欧美三级在线视频| 日韩精品一区二区三区视频在线观看 | 亚洲电影中文字幕在线观看| 亚洲成人免费视频| 国产精品996| 欧美三级在线看| 久久婷婷国产综合精品青草| 亚洲欧洲成人精品av97| 日韩电影一区二区三区| 成人免费视频国产在线观看| 欧美熟乱第一页| 国产欧美视频一区二区三区| 亚洲黄色小视频| 国产乱一区二区| 欧美三级电影一区| 久久精品视频在线免费观看| 一区二区三区欧美日韩| 国产综合成人久久大片91| 欧美在线影院一区二区| 国产亚洲欧洲997久久综合| 亚洲成av人片一区二区梦乃| 成人激情免费视频| xnxx国产精品|