| ==Phrack Inc.== | |
| Volume Two, Issue 18, Phile #5 of 11 | |
| -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- | |
| -= =- | |
| -= Hacking Control Data Corporation's Cyber =- | |
| -= =- | |
| -= Written by Phrozen Ghost, April 23, 1988 =- | |
| -= =- | |
| -= Exclusively for Phrack Magazine =- | |
| -= =- | |
| -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- | |
| This article will cover getting into and using NOS (Networking Operating | |
| System) version 2.5.2 running on a Cyber 730 computer. Cybers generally run | |
| this operating system so I will just refer to this environ- ment as Cyber. | |
| Also, Cyber is a slow and outdated operating system that is primarily used | |
| only for college campuses for running compilers. First off after you have | |
| scanned a bunch of carriers you will need to know how Cyber identifies itself. | |
| It goes like this: | |
| WELCOME TO THE NOS SOFTWARE SYSTEM. | |
| COPYRIGHT CONTROL DATA 1978, 1987. | |
| 88/02/16. 02.36.53. N265100 | |
| CSUS CYBER 170-730. NOS 2.5.2-678/3. | |
| FAMILY: | |
| You would normally just hit return at the family prompt. Next prompt is: | |
| USER NAME: | |
| Usernames are in the format abcdxxx where a is the location of where the | |
| account is being used from (A-Z). the b is a grouping specifying privs and | |
| limits for the account- usually A-G -where A is the lowest access. Some | |
| examples of how they would be used in a college system: | |
| A = lowest access - class accounts for students | |
| B = slightly higher than A (for students working on large projects) | |
| C = Much higher limits, these accounts are usually not too hard to get and | |
| they will normally last a long time! Lab assistants use these. | |
| D = Instructors, Lecturers, Professors.. etc.. | |
| E = same... (very hard to get these!) | |
| The C and D positions are usually constant according to the groupings. | |
| For example, a class would have accounts ranging from NADRAAA-AZZ | |
| ^^^ ^^^ | |
| These can also be digits | |
| There are also special operator accounts which start with digits instead of | |
| numbers. (ie 7ETPDOC) These accounts can run programs such as the monitor | |
| which can observe any tty connected to the system... | |
| The next prompt will be for the password, student account passwords cannot be | |
| changed and are 7 random letters by default, other account passwords can be | |
| changed. You get 3 tries until you are logged out. It is very difficult if | |
| not impossible to use a brute force hacker or try to guess someone's account.. | |
| so how do you get on? Here's one easy way... Go down to your local college | |
| (make sure they have a Cyber computer!) then just buy a class catalog (they | |
| only cost around 50 cents) or you could look, borrow, steal someone else's... | |
| then find a pascal or fortran class that fits your schedule! You will only | |
| have to attend the class 3 or 4 times max. Once you get there you should have | |
| no trouble, but if the instructor asks you questions about why you are not on | |
| the roll, just tell him that you are auditing the class (taking it without | |
| enrolling so it won't affect your GPA). The instructor will usually pass out | |
| accounts on the 3rd or 4th day of class.. this method also works well with | |
| just about any system they have on campus! Another way to get accounts is to | |
| go down to the computer lab and start snooping! Look over someone's shoulder | |
| while they type in their password, or look thru someone's papers while they're | |
| in the bathroom, or look thru the assistants desk while he is helping | |
| someone... (I have acquired accounts both ways, and the first way is a lot | |
| easier with less hassles) Also, you can use commas instead of returns when | |
| entering username and password. | |
| Example: at the family prompt, you could type ,nadrajf,dsfgkcd | |
| or at the username prompt nadrajf,dsfgkcd | |
| After you enter your info, the system will respond with: | |
| JSN: APXV, NAMIAF | |
| / | |
| The 'APXV, NAMIAF' could be different depending on what job you were attached | |
| to. The help program looks a lot neater if you have vt100 emulation, if you | |
| do, type [screen,vt100] (don't type the brackets! from now on, all commands I | |
| refer to will be enclosed in brackets) Then type help for an extensive | |
| tutorial or a list of commands. Your best bet at this point is to buy a quick | |
| reference guide at the campus because I am only going to describe the most | |
| useful commands. The / means you are in the batch subsystem, there are usually | |
| 6 or 7 other subsystems like basic, fortran, etc... return to batch mode by | |
| typing [batch]. | |
| Some useful commands: | |
| CATLIST - will show permanent files in your directory. | |
| ENQUIRE,F - displays temporary files in your workspace. | |
| LIMITS - displays your privileges. | |
| INFO - get more on-line help. | |
| R - re-execute last command. | |
| GET,fn - loads fn into the local file area. | |
| CHANGE - change certain specs on a file. | |
| PERMIT - allow other users to use one of your files. | |
| REWIND,* - rewinds all your local files. | |
| NEW,fn - creates new file. | |
| PURGE - deletes files. | |
| LIST,F=fn - list file. | |
| UPROC - create an auto-execute procedure file. | |
| MAIL - send/receive private mail. | |
| BYE - logoff. | |
| Use the [helpme,cmd] command for the exact syntax and parameters of these | |
| commands. There are also several machine specific 'application' programs such | |
| as pascal, fortran, spitbol, millions of others that you can look up with the | |
| INFO command... there are also the text editors; edit, xedit, and fse (full | |
| screen editor). Xedit is the easiest to use if you are not at a Telray 1061 | |
| terminal and it has full documentation. Simply type [xedit,fn] to edit the | |
| file 'fn'. | |
| Special control characters used with Cyber: | |
| Control S and Control Q work normally, the terminate character is Control T | |
| followed by a carriage return. If you wanted to break out of an auto-execute | |
| login program, you would have to hit ^T C/R very fast and repetitively in | |
| order to break into the batch subsystem. Control Z is used to set environment | |
| variables and execute special low level commands, example: [^Z TM C/R] this | |
| will terminate your connection... | |
| So now you're thinking, what the hell is Cyber good for? Well, they won't | |
| have any phone company records, and you can't get credit information from one, | |
| and I am not going to tell you how to crash it since crashing systems is a | |
| sin. There are uses for a Cyber though, one handy use is to set up a chat | |
| system, as there are normally 30-40 lines going into a large university Cyber | |
| system. I have the source for a chat program called the communicator that I | |
| will be releasing soon. Another use is some kind of underground information | |
| exchange that people frequently set up on other systems, this can easily be | |
| done with Cyber. | |
| Procedure files: | |
| A procedure file is similar to a batch file for MS-DOS, and a shell script for | |
| UNIX. You can make a procedure file auto-execute by using the UPROC command | |
| like [uproc,auto] will make the file 'auto', auto execute. There is also a | |
| special procedure file called the procfile in which any procedure may be | |
| accessed by simply a - in front of it. If your procfile read: | |
| .proc,cn. | |
| .* sample procedure | |
| $catlist/un=7etpdoc. | |
| $exit. | |
| then you could simply type -cn and the / prompt and it would execute the | |
| catlist command. Now back to uprocs, you could easily write a whole BBS in a | |
| procedure file or say you wanted to run a chat system and you did not want | |
| people to change the password on your account, you could do this: | |
| .proc,chat, | |
| PW"Password: "=(*A). | |
| $ife,PW="cyber",yes. | |
| $chat. | |
| $revert. | |
| $bye. | |
| $else,yes. | |
| $note./Wrong password, try again/. | |
| $revert. | |
| $bye. | |
| $endif,yes. | |
| This procedure will ask the user for a password and if he doesn't type "cyber" | |
| he will be logged off. If he does get it right then he will be dumped into | |
| the chat program and as soon as he exits the chat program, he will be logged | |
| off. This way, the user cannot get into the batch subsystem and change your | |
| password or otherwise screw around with the account. The following is a | |
| listing of the procfil that I use on my local system, it has a lot of handy | |
| utilities and examples... | |
| ---- cut here ---- | |
| .PROC,B. | |
| .******BYE****** | |
| $DAYFILE. | |
| $NOTE.////////////////////////// | |
| $ASCII. | |
| $BYE. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,TIME. | |
| .******GIVES DAY AND TIME****** | |
| $NOTE./THE CURRENT DAY AND TIME IS/ | |
| $FIND,CLOCK./ | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,SIGN*I,IN. | |
| .******SIGN PRINT UTILITY******. | |
| $GET,IN. | |
| $FIND,SIGN,#I=IN,#L=OUT. | |
| $NOTE./TO PRINT, TYPE: PRINT,OUT,CC,RPS=??/ | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,TA. | |
| .******TALK****** | |
| $SACFIND,AID,COMM. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,DIR,UN=,FILE=. | |
| .******DIRECTORY LISTING OF PERMANENT FILES****** | |
| $GET(ZZZZDIR=CAT/#UN=1GTL0CL) | |
| ZZZZDIR(FILE,#UN=UN) | |
| $RETURN(ZZZZDIR) | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,Z19. | |
| .******SET SCREEN TO Z19****** | |
| $SCREEN,Z19. | |
| $NOTE./SCREEN,Z19. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,VT. | |
| .******SET SCREEN TO VT100****** | |
| $SCREEN,VT100. | |
| $NOTE./SCREEN,VT100. | |
| $REVERT,NOLIST | |
| #EOR | |
| .PROC,SC. | |
| .******SET SCREEN TO T10****** | |
| $SCREEN,T10. | |
| $NOTE./SCREEN,T10. | |
| $REVERT,NOLIST | |
| #EOR | |
| .PROC,C. | |
| .******CATLIST****** | |
| $CATLIST. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,CA. | |
| .******CATLIST,LO=F****** | |
| $CATLIST,LO=F. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,MT. | |
| .******BBS****** | |
| $SACFIND,AID,MTAB. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,LI,FILE=. | |
| .******LIST FILE****** | |
| $GET,FILE. | |
| $ASCII. | |
| $COPY(FILE) | |
| $REVERT. | |
| $EXIT. | |
| $CSET(NORMAL) | |
| $REVERT,NOLIST. WHERE IS THAT FILE?? | |
| #EOR | |
| .PROC,LOCAL. | |
| .******DIRECTORY OF LOCAL FILES****** | |
| $RETURN(PROCLIB,YYYYBAD,YYYYPRC) | |
| $GET(QQQFILE=ENQF/UN=1GTL0CL) | |
| QQQFILE. | |
| $REVERT,NOLIST. | |
| $EXIT. | |
| $REVERT. FILES ERROR | |
| #EOR | |
| .PROC,RL. | |
| .******RAISE LIMITS****** | |
| $SETASL(*) | |
| $SETJSL(*) | |
| $SETTL(*) | |
| $CSET(ASCII) | |
| $NOTE./ Limits now at max validated levels. | |
| $CSET(NORMAL) | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,CL. | |
| .******CLEAR****** | |
| $CLEAR,*. | |
| $CSET(ASCII) | |
| $NOTE./LOCAL FILE AREA CLEARED | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,P,FILE=THING,LST=LIST. | |
| .*********************************************************** | |
| $CLEAR. | |
| $GET(FILE) | |
| $PASCAL4,FILE,LST. | |
| $REVERT. | |
| $EXIT. | |
| $REWIND,*. | |
| $CSET(ASCII) | |
| $COPY(LIST) | |
| $CSET(NORMAL) | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,RE. | |
| .******REWIND****** | |
| $REWIND,*. | |
| $CSET(ASCII) | |
| $NOTE./REWOUND. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,FOR,FILE,LST=LIST. | |
| .******************************************************************** | |
| $CLEAR. | |
| $GET(FILE) | |
| $FTN5,I=FILE,L=LST. | |
| $REPLACE(LST=L) | |
| $CSET(ASCII) | |
| $REVERT. Fortran Compiled | |
| $EXIT. | |
| $REWIND,*. | |
| $COPY(LST) | |
| $REVERT. That's all folks. | |
| #EOR | |
| .PROC,WAR. | |
| .******WARBLES****** | |
| $SACFIND,AID,WAR. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,M. | |
| .******MAIL/CHECK****** | |
| $MAIL/CHECK. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,MA. | |
| .******ENTER MAIL****** | |
| $MAIL. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,HE,FILE=SUMPROC,UN=. | |
| .******HELP FILE****** | |
| $GET,FILE/#UN=UN. | |
| $COPY(FILE) | |
| $REVERT. | |
| $EXIT. | |
| $REVERT,NOLIST. | |
| #EOR | |
| .PROC,DYNAMO. | |
| .******WHO KNOWS??****** | |
| $GET,DYNMEXP/UN=7ETPDOC. | |
| $SKIPR,DYNMEXP. | |
| $COPYBR,DYNMEXP,GO. | |
| $FIND,DYNAMO,GO. | |
| $REVERT,NOLIST. | |
| #EOR | |
| #EOR | |
| #EOI | |
| ---- cut here ---- | |
| I have covered procfil's fairly extensively as I think it is the most useful | |
| function of Cyber for hackers. I will be releasing source codes for several | |
| programs including 'the communicator' chat utility, and a BBS program with a | |
| full message base. If you have any questions about Cyber or you have gotten | |
| into one and don't know what to do, I can be contacted at the Forgotten Realm | |
| BBS or via UUCP mail at ...!uunet!ncoast!ghost. | |
| Phrozen Ghost | |
| =============================================================================== | |