| ==Phrack Inc.== | |
| Volume Two, Issue 22, File 4 of 12 | |
| +++++++++++++++++++++++++++++++++++++++++++++++++ | |
| | The LOD/H Presents | | |
| ++++++++++++++++ ++++++++++++++++ | |
| A Novice's Guide to Hacking- 1989 edition / | |
| ========================================= / | |
| by / | |
| The Mentor / | |
| Legion of Doom/Legion of Hackers / | |
| / | |
| December, 1988 / | |
| Merry Christmas Everyone! / | |
| +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/ | |
| The author hereby grants permission to reproduce, redistribute, or include this | |
| file in your g-file section, electronic or print newletter, or any other form | |
| of transmission that you choose, as long as it is kept intact and whole, with | |
| no ommissions, deletions, or changes. | |
| (C) The Mentor- Phoenix Project Productions 1988,1989 512/441-3088 | |
| Introduction: The State of the Hack | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| After surveying a rather large g-file collection, my attention was drawn to the | |
| fact that there hasn't been a good introductory file written for absolute | |
| beginners since back when Mark Tabas was cranking them out (and almost | |
| *everyone* was a beginner!) The Arts of Hacking and Phreaking have changed | |
| radically since that time, and as the 90's approach, the hack/phreak community | |
| has recovered from the Summer '87 busts (just like it recovered from the Fall | |
| '85 busts, and like it will always recover from attempts to shut it down), and | |
| the progressive media (from Reality Hackers magazine to William Gibson and | |
| Bruce Sterling's cyberpunk fables of hackerdom) is starting to take notice | |
| of us for the first time in recent years in a positive light. | |
| Unfortunately, it has also gotten more dangerous since the early 80's. Phone | |
| cops have more resources, more awareness, and more intelligence than they | |
| exhibited in the past. It is becoming more and more difficult to survive as a | |
| hacker long enough to become skilled in the art. To this end this file is | |
| dedicated. If it can help someone get started, and help them survive to | |
| discover new systems and new information, it will have served it's purpose, and | |
| served as a partial repayment to all the people who helped me out when was a | |
| beginner. | |
| Contents | |
| ~~~~~~~~ | |
| This file will be divided into four parts: | |
| Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety | |
| Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, | |
| Outdials, Network Servers, Private PADs | |
| Part 3: Identifying a Computer, How to Hack In, Operating System Defaults | |
| Part 4: Conclusion; Final Thoughts, Books to Read, Boards to Call, | |
| Acknowledgements | |
| Part One: The Basics | |
| ~~~~~~~~~~~~~~~~~~~~~ | |
| As long as there have been computers, there have been hackers. In the 50's at | |
| the Massachusets Institute of Technology (MIT), students devoted much time and | |
| energy to ingenious exploration of the computers. Rules and the law were | |
| disregarded in their pursuit for the 'hack.' Just as they were enthralled with | |
| their pursuit of information, so are we. The thrill of the hack is not in | |
| breaking the law, it's in the pursuit and capture of knowledge. | |
| To this end, let me contribute my suggestions for guidelines to follow to | |
| ensure that not only you stay out of trouble, but you pursue your craft without | |
| damaging the computers you hack into or the companies who own them. | |
| I. Do not intentionally damage *any* system. | |
| II. Do not alter any system files other than ones needed to ensure your | |
| escape from detection and your future access (Trojan Horses, Altering | |
| Logs, and the like are all necessary to your survival for as long as | |
| possible). | |
| III. Do not leave your (or anyone else's) real name, real handle, or real | |
| phone number on any system that you access illegally. They *can* and | |
| will track you down from your handle! | |
| IV. Be careful who you share information with. Feds are getting trickier | |
| Generally, if you don't know their voice phone number, name, and | |
| occupation or haven't spoken with them voice on non-info trading | |
| conversations, be wary. | |
| V. Do not leave your real phone number to anyone you don't know. This | |
| includes logging on boards, no matter how k-rad they seem. If you don't | |
| know the sysop, leave a note telling some trustworthy people that will | |
| validate you. | |
| VI. Do not hack government computers. Yes, there are government systems that | |
| are safe to hack, but they are few and far between. And the government | |
| has inifitely more time and resources to track you down than a company | |
| who has to make a profit and justify expenses. | |
| VII. Don't use codes unless there is *NO* way around it (you don't have a | |
| local telenet or tymnet outdial and can't connect to anything 800). You | |
| use codes long enough, you will get caught. Period. | |
| VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the law. | |
| It doesn't hurt to store everything encrypted on your hard disk, or | |
| keep your notes buried in the backyard or in the trunk of your car. You | |
| may feel a little funny, but you'll feel a lot funnier when you when you | |
| meet Bruno, your transvestite cellmate who axed his family to death. | |
| IX. Watch what you post on boards. Most of the really great hackers in the | |
| country post *nothing* about the system they're currently working except | |
| in the broadest sense (I'm working on a UNIX, or a COSMOS, or something | |
| generic. Not "I'm hacking into General Electric's Voice Mail | |
| System" or something inane and revealing like that). | |
| X. Don't be afraid to ask questions. That's what more experienced hackers | |
| are for. Don't expect *everything* you ask to be answered, though. | |
| There are some things (LMOS, for instance) that a begining hacker | |
| shouldn't mess with. You'll either get caught, or screw it up for | |
| others, or both. | |
| XI. Finally, you have to actually hack. You can hang out on boards all you | |
| want, and you can read all the text files in the world, but until you | |
| actually start doing it, you'll never know what it's all about. There's | |
| no thrill quite the same as getting into your first system (well, ok, I | |
| can thinksavea couple of biggers thrills, but you get the picture). | |
| One of the safest places to start your hacking career is on a computer system | |
| belonging to a college. University computers have notoriously lax security, | |
| and are more used to hackers, as every college computer department ment has one | |
| or two, so are less likely to press charges if you should be detected. But the | |
| odds of them detecting you and having the personel to committ to tracking you | |
| down are slim as long as you aren't destructive. | |
| If you are already a college student, this is ideal, as you can legally explore | |
| your computer system to your heart's desire, then go out and look for similar | |
| systems that you can penetrate with confidence, as you're already | |
| familar with them. | |
| So if you just want to get your feet wet, call your local college. Many of | |
| them will provide accounts for local residents at a nominal (under $20) charge. | |
| Finally, if you get caught, stay quiet until you get a lawyer. Don't volunteer | |
| any information, no matter what kind of 'deals' they offer you. Nothing is | |
| binding unless you make the deal through your lawyer, so you might as well shut | |
| up and wait. | |
| Part Two: Networks | |
| ~~~~~~~~~~~~~~~~~~~ | |
| The best place to begin hacking (other than a college) is on one of the | |
| bigger networks such as Telenet. Why? First, there is a wide variety of | |
| computers to choose from, from small Micro-Vaxen to huge Crays. Second, the | |
| networks are fairly well documented. It's easier to find someone who can help | |
| you with a problem off of Telenet than it is to find assistance concerning your | |
| local college computer or high school machine. Third, the networks are safer. | |
| Because of the enormous number of calls that are fielded every day by the big | |
| networks, it is not financially practical to keep track of where every call and | |
| connection are made from. It is also very easy to disguise your location using | |
| the network, which makes your hobby much more secure. | |
| Telenet has more computers hooked to it than any other system in the world once | |
| you consider that from Telenet you have access to Tymnet, ItaPAC, JANET, | |
| DATAPAC, SBDN, PandaNet, THEnet, and a whole host of other networks, all of | |
| which you can connect to from your terminal. | |
| The first step that you need to take is to identify your local dialup port. | |
| This is done by dialing 1-800-424-9494 (1200 7E1) and connecting. It will | |
| spout some garbage at you and then you'll get a prompt saying 'TERMINAL= '. | |
| This is your terminal type. If you have vt100 emulation, type it in now. Or | |
| just hit return and it will default to dumb terminal mode. | |
| You'll now get a prompt that looks like a @. From here, type @c mail <cr> and | |
| then it will ask for a Username. Enter 'phones' for the username. When it | |
| asks for a password, enter 'phones' again. From this point, it is menu driven. | |
| Use this to locate your local dialup, and call it back locally. If you don't | |
| have a local dialup, then use whatever means you wish to connect to one long | |
| distance (more on this later). | |
| When you call your local dialup, you will once again go through the TERMINAL= | |
| stuff, and once again you'll be presented with a @. This prompt lets you know | |
| you are connected to a Telenet PAD. PAD stands for either Packet | |
| Assembler/Disassembler (if you talk to an engineer), or Public Access Device | |
| (if you talk to Telenet's marketing people.) The first description is more | |
| correct. | |
| Telenet works by taking the data you enter in on the PAD you dialed into, | |
| bundling it into a 128 byte chunk (normally... this can be changed), and then | |
| transmitting it at speeds ranging from 9600 to 19,200 baud to another PAD, who | |
| then takes the data and hands it down to whatever computer or system it's | |
| connected to. Basically, the PAD allows two computers that have different baud | |
| rates or communication protocols to communicate with each other over a long | |
| distance. Sometimes you'll notice a time lag in the remote machines response. | |
| This is called PAD Delay, and is to be expected when you're sending data | |
| through several different links. | |
| What do you do with this PAD? You use it to connect to remote computer | |
| systems by typing 'C' for connect and then the Network User Address (NUA) of | |
| the system you want to go to. | |
| An NUA takes the form of 031103130002520 | |
| ___/___/___/ | |
| | | | | |
| | | |____ network address | |
| | |_________ area prefix | |
| |______________ DNIC | |
| This is a summary of DNIC's (taken from Blade Runner's file on ItaPAC) | |
| according to their country and network name. | |
| DNIC Network Name Country DNIC Network Name Country | |
| _______________________________________________________________________________ | |
| | | |
| 02041 Datanet 1 Netherlands | 03110 Telenet USA | |
| 02062 DCS Belgium | 03340 Telepac Mexico | |
| 02080 Transpac France | 03400 UDTS-Curacau Curacau | |
| 02284 Telepac Switzerland | 04251 Isranet Israel | |
| 02322 Datex-P Austria | 04401 DDX-P Japan | |
| 02329 Radaus Austria | 04408 Venus-P Japan | |
| 02342 PSS UK | 04501 Dacom-Net South Korea | |
| 02382 Datapak Denmark | 04542 Intelpak Singapore | |
| 02402 Datapak Sweden | 05052 Austpac Australia | |
| 02405 Telepak Sweden | 05053 Midas Australia | |
| 02442 Finpak Finland | 05252 Telepac Hong Kong | |
| 02624 Datex-P West Germany | 05301 Pacnet New Zealand | |
| 02704 Luxpac Luxembourg | 06550 Saponet South Africa | |
| 02724 Eirpak Ireland | 07240 Interdata Brazil | |
| 03020 Datapac Canada | 07241 Renpac Brazil | |
| 03028 Infogram Canada | 09000 Dialnet USA | |
| 03103 ITT/UDTS USA | 07421 Dompac French Guiana | |
| 03106 Tymnet USA | | |
| There are two ways to find interesting addresses to connect to. The first and | |
| easiest way is to obtain a copy of the LOD/H Telenet Directory from the LOD/H | |
| Technical Journal 4 or 2600 Magazine. Jester Sluggo also put out a good list | |
| of non-US addresses in Phrack Inc. Newsletter Issue 21. These files will tell | |
| you the NUA, whether it will accept collect calls or not, what type of computer | |
| system it is (if known) and who it belongs to (also if known.) | |
| The second method of locating interesting addresses is to scan for them | |
| manually. On Telenet, you do not have to enter the 03110 DNIC to connect to a | |
| Telenet host. So if you saw that 031104120006140 had a VAX on it you wanted to | |
| look at, you could type @c 412 614 (0's can be ignored most of the time). | |
| If this node allows collect billed connections, it will say 412 614 CONNECTED | |
| and then you'll possibly get an identifying header or just a Username: prompt. | |
| If it doesn't allow collect connections, it will give you a message such as 412 | |
| 614 REFUSED COLLECT CONNECTION with some error codes out to the right, and | |
| return you to the @ prompt. | |
| There are two primary ways to get around the REFUSED COLLECT message. The | |
| first is to use a Network User Id (NUI) to connect. An NUI is a username/pw | |
| combination that acts like a charge account on Telenet. To collect to node | |
| 412 614 with NUI junk4248, password 525332, I'd type the following: | |
| @c 412 614,junk4248,525332 <---- the 525332 will *not* be echoed to the | |
| screen. The problem with NUI's is that they're hard to come by unless you're a | |
| good social engineer with a thorough knowledge of Telenet (in which case you | |
| probably aren't reading this section), or you have someone who can provide you | |
| with them. | |
| The second way to connect is to use a private PAD, either through an X.25 PAD | |
| or through something like Netlink off of a Prime computer (more on these two | |
| below). | |
| The prefix in a Telenet NUA oftentimes (not always) refers to the phone Area | |
| Code that the computer is located in (i.e. 713 xxx would be a computer in | |
| Houston, Texas). If there's a particular area you're interested in, (say, New | |
| York City 914), you could begin by typing @c 914 001 <cr>. If it connects, you | |
| make a note of it and go on to 914 002. You do this until you've found some | |
| interesting systems to play with. | |
| Not all systems are on a simple xxx yyy address. Some go out to four or five | |
| digits (914 2354), and some have decimal or numeric extensions (422 121A = 422 | |
| 121.01). You have to play with them, and you never know what you're going to | |
| find. To fully scan out a prefix would take ten million attempts per prefix. | |
| For example, if I want to scan 512 completely, I'd have to start with 512 | |
| 00000.00 and go through 512 00000.99, then increment the address by 1 and try | |
| 512 00001.00 through 512 00001.99. A lot of scanning. There are plenty of | |
| neat computers to play with in a 3-digit scan, however, so don't go berserk | |
| with the extensions. | |
| Sometimes you'll attempt to connect and it will just be sitting there after one | |
| or two minutes. In this case, you want to abort the connect attempt by sending | |
| a hard break (this varies with different term programs, on Procomm, it's | |
| ALT-B), and then when you get the @ prompt back, type 'D' for disconnect. | |
| If you connect to a computer and wish to disconnect, you can type <cr> @ <cr> | |
| and you it should say TELENET and then give you the @ prompt. From there, type | |
| D to disconnect or CONT to re-connect and continue your session uninterrupted. | |
| Outdials, Network Servers, and PADs | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| In addition to computers, an NUA may connect you to several other things. One | |
| of the most useful is the outdial. An outdial is nothing more than a modem | |
| you can get to over telenet -- similar to the PC Pursuit concept, except that | |
| these don't have passwords on them most of the time. | |
| When you connect, you will get a message like 'Hayes 1200 baud outdial, | |
| Detroit, MI', or 'VEN-TEL 212 Modem', or possibly 'Session 1234 established on | |
| Modem 5588.' The best way to figure out the commands on these is to type ? or | |
| H or HELP -- this will get you all the information that you need to use one. | |
| Safety tip here -- when you are hacking *any* system through a phone dialup, | |
| always use an outdial or a diverter, especially if it is a local phone number | |
| to you. More people get popped hacking on local computers than you can | |
| imagine, Intra-LATA calls are the easiest things in the world to trace | |
| inexpensively. | |
| Another nice trick you can do with an outdial is use the redial or macro | |
| function that many of them have. First thing you do when you connect is to | |
| invoke the 'Redial Last Number' facility. This will dial the last number used, | |
| which will be the one the person using it before you typed. Write down the | |
| number, as no one would be calling a number without a computer on it. This is | |
| a good way to find new systems to hack. Also, on a VENTEL modem, type 'D' for | |
| Display and it will display the five numbers stored as macros in the modem's | |
| memory. | |
| There are also different types of servers for remote Local Area Networks (LAN) | |
| that have many machine all over the office or the nation connected to them. | |
| I'll discuss identifying these later in the computer ID section. | |
| And finally, you may connect to something that says 'X.25 Communication PAD' | |
| and then some more stuff, followed by a new @ prompt. This is a PAD just like | |
| the one you are on, except that all attempted connections are billed to the | |
| PAD, allowing you to connect to those nodes who earlier refused collect | |
| connections. | |
| This also has the added bonus of confusing where you are connecting from. When | |
| a packet is transmitted from PAD to PAD, it contains a header that has the | |
| location you're calling from. For instance, when you first connected to | |
| Telenet, it might have said 212 44A CONNECTED if you called from the 212 area | |
| code. This means you were calling PAD number 44A in the 212 area. That 21244A | |
| will be sent out in the header of all packets leaving the PAD. | |
| Once you connect to a private PAD, however, all the packets going out from *it* | |
| will have it's address on them, not yours. This can be a valuable buffer | |
| between yourself and detection. | |
| Phone Scanning | |
| ~~~~~~~~~~~~~~ | |
| Finally, there's the time-honored method of computer hunting that was made | |
| famous among the non-hacker crowd by that Oh-So-Technically-Accurate movie | |
| Wargames. You pick a three digit phone prefix in your area and dial every | |
| number from 0000 --> 9999 in that prefix, making a note of all the carriers you | |
| find. There is software available to do this for nearly every computer in the | |
| world, so you don't have to do it by hand. | |
| Part Three: I've Found a Computer, Now What? | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| This next section is applicable universally. It doesn't matter how you found | |
| this computer, it could be through a network, or it could be from carrier | |
| scanning your High School's phone prefix, you've got this prompt this prompt, | |
| what the hell is it? | |
| I'm *NOT* going to attempt to tell you what to do once you're inside of any of | |
| these operating systems. Each one is worth several G-files in its own right. | |
| I'm going to tell you how to identify and recognize certain OpSystems, how to | |
| approach hacking into them, and how to deal with something that you've never | |
| seen before and have know idea what it is. | |
| VMS - The VAX computer is made by Digital Equipment Corporation (DEC), and | |
| runs the VMS (Virtual Memory System) operating system. VMS is | |
| characterized by the 'Username:' prompt. It will not tell you if | |
| you've entered a valid username or not, and will disconnect you | |
| after three bad login attempts. It also keeps track of all failed | |
| login attempts and informs the owner of the account next time s/he | |
| logs in how many bad login attempts were made on the account. It is | |
| one of the most secure operating systems around from the outside, | |
| but once you're in there are many things that you can do to | |
| circumvent system security. The VAX also has the best set of help | |
| files in the world. Just type HELP and read to your heart's | |
| content. | |
| Common Accounts/Defaults: [username: password [[,password]]] | |
| SYSTEM: OPERATOR or MANAGER or SYSTEM or SYSLIB | |
| OPERATOR: OPERATOR | |
| SYSTEST: UETP | |
| SYSMAINT: SYSMAINT or SERVICE or DIGITAL | |
| FIELD: FIELD or SERVICE | |
| GUEST: GUEST or unpassworded | |
| DEMO: DEMO or unpassworded | |
| DECNET: DECNET | |
| DEC-10 - An earlier line of DEC computer equipment, running the TOPS-10 | |
| operating system. These machines are recognized by their '.' | |
| prompt. The DEC-10/20 series are remarkably hacker-friendly, | |
| allowing you to enter several important commands without ever | |
| logging into the system. Accounts are in the format [xxx,yyy] | |
| where xxx and yyy are integers. You can get a listing of the | |
| accounts and the process names of everyone on the system before | |
| logging in with the command .systat (for SYstem STATus). If you | |
| seen an account that reads [234,1001] BOB JONES, it might be wise | |
| to try BOB or JONES or both for a password on this account. To | |
| login, you type .login xxx,yyy and then type the password when | |
| prompted for it. | |
| The system will allow you unlimited tries at an account, and does | |
| not keep records of bad login attempts. It will also inform you if | |
| the UIC you're trying (UIC = User Identification Code, 1,2 for | |
| example) is bad. | |
| Common Accounts/Defaults: | |
| 1,2: SYSLIB or OPERATOR or MANAGER | |
| 2,7: MAINTAIN | |
| 5,30: GAMES | |
| UNIX - There are dozens of different machines out there that run UNIX. | |
| While some might argue it isn't the best operating system in the | |
| world, it is certainly the most widely used. A UNIX system will | |
| usually have a prompt like 'login:' in lower case. UNIX also will | |
| give you unlimited shots at logging in (in most cases), and there is | |
| usually no log kept of bad attempts. | |
| Common Accounts/Defaults: (note that some systems are case | |
| sensitive, so use lower case as a general rule. Also, many times | |
| the accounts will be unpassworded, you'll just drop right in!) | |
| root: root | |
| admin: admin | |
| sysadmin: sysadmin or admin | |
| unix: unix | |
| uucp: uucp | |
| rje: rje | |
| guest: guest | |
| demo: demo | |
| daemon: daemon | |
| sysbin: sysbin | |
| Prime - Prime computer company's mainframe running the Primos operating | |
| system. The are easy to spot, as the greet you with 'Primecon | |
| 18.23.05' or the like, depending on the version of the operating | |
| system you run into. There will usually be no prompt offered, it | |
| will just look like it's sitting there. At this point, type 'login | |
| <username>'. If it is a pre-18.00.00 version of Primos, you can hit | |
| a bunch of ^C's for the password and you'll drop in. Unfortunately, | |
| most people are running versions 19+. Primos also comes with a good | |
| set of help files. One of the most useful features of a Prime on | |
| Telenet is a facility called NETLINK. Once you're inside, type | |
| NETLINK and follow the help files. This allows you to connect to | |
| NUA's all over the world using the 'nc' command. | |
| For example, to connect to NUA 026245890040004, you would type | |
| @nc :26245890040004 at the netlink prompt. | |
| Common Accounts/Defaults: | |
| PRIME PRIME or PRIMOS | |
| PRIMOS_CS PRIME or PRIMOS | |
| PRIMENET PRIMENET | |
| SYSTEM SYSTEM or PRIME | |
| NETLINK NETLINK | |
| TEST TEST | |
| GUEST GUEST | |
| GUEST1 GUEST | |
| HP-x000 - This system is made by Hewlett-Packard. It is characterized by the | |
| ':' prompt. The HP has one of the more complicated login sequneces | |
| around -- you type 'HELLO SESSION NAME,USERNAME,ACCOUNTNAME,GROUP'. | |
| Fortunately, some of these fields can be left blank in many cases. | |
| Since any and all of these fields can be passworded, this is not the | |
| easiest system to get into, except for the fact that there are | |
| usually some unpassworded accounts around. In general, if the | |
| defaults don't work, you'll have to brute force it using the common | |
| password list (see below.) The HP-x000 runs the MPE operating | |
| system, the prompt for it will be a ':', just like the logon prompt. | |
| Common Accounts/Defaults: | |
| MGR.TELESUP,PUB User: MGR Acct: HPONLYG rp: PUB | |
| MGR.HPOFFICE,PUB unpassworded | |
| MANAGER.ITF3000,PUB unpassworded | |
| FIELD.SUPPORT,PUB user: FLD, others unpassworded | |
| MAIL.TELESUP,PUB user: MAIL, others unpassworded | |
| MGR.RJE unpassworded | |
| FIELD.HPPl89 ,HPPl87,HPPl89,HPPl96 unpassworded | |
| MGR.TELESUP,PUB,HPONLY,HP3 unpassworded | |
| IRIS - IRIS stands for Interactive Real Time Information System. It | |
| originally ran on PDP-11's, but now runs on many other minis. You | |
| can spot an IRIS by the 'Welcome to "IRIS" R9.1.4 Timesharing' | |
| banner, and the ACCOUNT ID? prompt. IRIS allows unlimited tries at | |
| hacking in, and keeps no logs of bad attempts. I don't know any | |
| default passwords, so just try the common ones from the password | |
| database below. | |
| Common Accounts: | |
| MANAGER | |
| BOSS | |
| SOFTWARE | |
| DEMO | |
| PDP8 | |
| PDP11 | |
| ACCOUNTING | |
| VM/CMS - The VM/CMS operating system runs in International Business Machines | |
| (IBM) mainframes. When you connect to one of these, you will get | |
| message similar to 'VM/370 ONLINE', and then give you a '.' prompt, | |
| just like TOPS-10 does. To login, you type 'LOGON <username>'. | |
| Common Accounts/Defaults are: | |
| AUTOLOG1: AUTOLOG or AUTOLOG1 | |
| CMS: CMS | |
| CMSBATCH: CMS or CMSBATCH | |
| EREP: EREP | |
| MAINT: MAINT or MAINTAIN | |
| OPERATNS: OPERATNS or OPERATOR | |
| OPERATOR: OPERATOR | |
| RSCS: RSCS | |
| SMART: SMART | |
| SNA: SNA | |
| VMTEST: VMTEST | |
| VMUTIL: VMUTIL | |
| VTAM: VTAM | |
| NOS - NOS stands for Networking Operating System, and runs on the Cyber | |
| computer made by Control Data Corporation. NOS identifies itself | |
| quite readily, with a banner of 'WELCOME TO THE NOS SOFTWARE SYSTEM. | |
| COPYRIGHT CONTROL DATA 1978,1987.' The first prompt you will get | |
| will be FAMILY:. Just hit return here. Then you'll get a USER | |
| NAME: prompt. Usernames are typically 7 alpha-numerics characters | |
| long, and are *extremely* site dependent. Operator accounts begin | |
| with a digit, such as 7ETPDOC. | |
| Common Accounts/Defaults: | |
| $SYSTEM unknown | |
| SYSTEMV unknown | |
| Decserver- This is not truly a computer system, but is a network server that | |
| has many different machines available from it. A Decserver will say | |
| 'Enter Username>' when you first connect. This can be anything, it | |
| doesn't matter, it's just an identifier. Type 'c', as this is the | |
| least conspicuous thing to enter. It will then present you with a | |
| 'Local>' prompt. From here, you type 'c <systemname>' to connect to | |
| a system. To get a list of system names, type 'sh services' or 'sh | |
| nodes'. If you have any problems, online help is available with the | |
| 'help' command. Be sure and look for services named 'MODEM' or | |
| 'DIAL' or something similar, these are often outdial modems and can | |
| be useful! | |
| GS/1 - Another type of network server. Unlike a Decserver, you can't | |
| predict what prompt a GS/1 gateway is going to give you. The | |
| default prompt it 'GS/1>', but this is redifinable by the system | |
| administrator. To test for a GS/1, do a 'sh d'. If that prints out | |
| a large list of defaults (terminal speed, prompt, parity, etc...), | |
| you are on a GS/1. You connect in the same manner as a Decserver, | |
| typing 'c <systemname>'. To find out what systems are available, do | |
| a 'sh n' or a 'sh c'. Another trick is to do a 'sh m', which will | |
| sometimes show you a list of macros for logging onto a system. If | |
| there is a macro named VAX, for instance, type 'do VAX'. | |
| The above are the main system types in use today. There are | |
| hundreds of minor variants on the above, but this should be enough | |
| to get you started. | |
| Unresponsive Systems | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| Occasionally you will connect to a system that will do nothing, but sit there. | |
| This is a frustrating feeling, but a methodical approach to the system will | |
| yield a response if you take your time. The following list will usually make | |
| *something* happen. | |
| 1) Change your parity, data length, and stop bits. A system that won't | |
| respond at 8N1 may react at 7E1 or 8E2 or 7S2. If you don't have a term | |
| program that will let you set parity to EVEN, ODD, SPACE, MARK, and NONE, | |
| with data length of 7 or 8, and 1 or 2 stop bits, go out and buy one. | |
| While having a good term program isn't absolutely necessary, it sure is | |
| helpful. | |
| 2) Change baud rates. Again, if your term program will let you choose odd | |
| baud rates such as 600 or 1100, you will occasionally be able to penetrate | |
| some very interesting systems, as most systems that depend on a strange | |
| baud rate seem to think that this is all the security they need... | |
| 3) Send a series of <cr>'s. | |
| 4) Send a hard break followed by a <cr>. | |
| 5) Type a series of .'s (periods). The Canadian network Datapac responds to | |
| this. | |
| 6) If you're getting garbage, hit an 'i'. Tymnet responds to this, as does a | |
| MultiLink II. | |
| 7) Begin sending control characters, starting with ^A --> ^Z. | |
| 8) Change terminal emulations. What your vt100 emulation thinks is garbage | |
| may all of a sudden become crystal clear using ADM-5 emulation. This also | |
| relates to how good your term program is. | |
| 9) Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, LOGON, GO, | |
| JOIN, HELP, and anything else you can think of. | |
| 10) If it's a dialin, call the numbers around it and see if a company answers. | |
| If they do, try some social engineering. | |
| Brute Force Hacking | |
| ~~~~~~~~~~~~~~~~~~~ | |
| There will also be many occasions when the default passwords will not work on | |
| an account. At this point, you can either go onto the next system on your | |
| list, or you can try to 'brute-force' your way in by trying a large database of | |
| passwords on that one account. Be careful, though! This works fine on systems | |
| that don't keep track of invalid logins, but on a system like a VMS, someone is | |
| going to have a heart attack if they come back and see '600 Bad Login Attempts | |
| Since Last Session' on their account. There are also some operating systems | |
| that disconnect after 'x' number of invalid login attempts and refuse to allow | |
| any more attempts for one hour, or ten minutes, or sometimes until the next | |
| day. | |
| The following list is taken from my own password database plus the database of | |
| passwords that was used in the Internet UNIX Worm that was running around in | |
| November of 1988. For a shorter group, try first names, computer terms, and | |
| obvious things like 'secret', 'password', 'open', and the name of the account. | |
| Also try the name of the company that owns the computer system (if known), the | |
| company initials, and things relating to the products the company makes or | |
| deals with. | |
| Password List | |
| ============= | |
| aaa daniel jester rascal | |
| academia danny johnny really | |
| ada dave joseph rebecca | |
| adrian deb joshua remote | |
| aerobics debbie judith rick | |
| airplane deborah juggle reagan | |
| albany december julia robot | |
| albatross desperate kathleen robotics | |
| albert develop kermit rolex | |
| alex diet kernel ronald | |
| alexander digital knight rosebud | |
| algebra discovery lambda rosemary | |
| alias disney larry roses | |
| alpha dog lazarus ruben | |
| alphabet drought lee rules | |
| ama duncan leroy ruth | |
| amy easy lewis sal | |
| analog eatme light saxon | |
| anchor edges lisa scheme | |
| andy erenity | |
| arrow elizabeth maggot sex | |
| arthur ellen magic shark | |
| asshole emerald malcolm sharon | |
| athena engine mark shit | |
| atmosphere engineer markus shiva | |
| bacchus enterprise marty shuttle | |
| badass enzyme marvin simon | |
| bailey euclid master simple | |
| banana evelyn maurice singer | |
| bandit extension merlin single | |
| banks fairway mets smile | |
| bass felicia michael smiles | |
| batman fender michelle smooch | |
| beauty fermat mike smother | |
| beaver finite minimum snatch | |
| beethoven flower minsky snoopy | |
| beloved foolproof mogul soap | |
| benz football moose socrates | |
| beowulf format mozart spit | |
| berkeley forsythe nancy spring | |
| berlin fourier napoleon subway | |
| beta fred network success | |
| beverly friend newton summer | |
| angerine | |
| bumbling george osiris tape | |
| cardinal gertrude outlaw target | |
| carmen gibson oxford taylor | |
| carolina ginger pacific telephone | |
| caroline gnu painless temptation | |
| castle golf pam tiger | |
| cat golfer paper toggle | |
| celtics gorgeous password tomato | |
| change graham pat toyota | |
| charles gryphon patricia trivial | |
| charming guest penguin unhappy | |
| charon guitar pete unicorn | |
| chester hacker peter unknown | |
| cigar harmony philip urchin | |
| classic harold phoenix utility | |
| coffee harvey pierre vicky | |
| coke heinlein pizza virginia | |
| collins hello plover warren | |
| comrade help polynomial water | |
| computer herbert praise weenie | |
| condo honey prelude whatnot | |
| condom horse prince whitney | |
| cookie imperial protect will | |
| cooper include pumpkin william | |
| create ingres puppet willie | |
| creation innocuous rabbit winston | |
| I hope this file has been of some help in getting started. If you're asking | |
| yourself the question 'Why hack?', then you've probably wasted a lot of time | |
| reading this, as you'll never understand. For those of you who have read this | |
| and found it useful, please send a tax-deductible donation | |
| of $5.00 (or more!) in the name of the Legion of Doom to: | |
| The American Cancer Society | |
| 90 Park Avenue | |
| New York, NY 10016 | |
| ******************************************************************************* | |
| References: | |
| 1) Introduction to ItaPAC by Blade Runner | |
| Telecom Security Bulletin 1 | |
| 2) The IBM VM/CMS Operating System by Lex Luthor | |
| The LOD/H Technical Journal 2 | |
| 3) Hacking the IRIS Operating System by The Leftist | |
| The LOD/H Technical Journal 3 | |
| 4) Hacking CDC's Cyber by Phrozen Ghost | |
| Phrack Inc. Newsletter 18 | |
| 5) USENET comp.risks digest (various authors, various issues) | |
| 6) USENET unix.wizards forum (various authors) | |
| 7) USENET info-vax forum (various authors) | |
| Recommended Reading: | |
| 1) Hackers by Steven Levy | |
| 2) Out of the Inner Circle by Bill Landreth | |
| 3) Turing's Man by J. David Bolter | |
| 4) Soul of a New Machine by Tracy Kidder | |
| 5) Neuromancer, Count Zero, Mona Lisa Overdrive, and Burning Chrome, all by | |
| William Gibson | |
| 6) Reality Hackers Magazine c/o High Frontiers, P.O. Box 40271, Berkeley, | |
| California, 94704, 415-995-2606 | |
| 7) Any of the Phrack Inc. Newsletters & LOD/H Technical Journals you can | |
| find. | |
| Acknowledgements: | |
| Thanks to my wife for putting up with me. | |
| Thanks to Lone Wolf for the RSTS & TOPS assistance. | |
| Thanks to Android Pope for proofreading, suggestions, and beer. | |
| Thanks to The Urvile/Necron 99 for proofreading & Cyber info. | |
| Thanks to Eric Bloodaxe for wading through all the trash. | |
| Thanks to the users of Phoenix Project for their contributions. | |
| Thanks to Altos Computer Systems, Munich, for the chat system. | |
| Thanks to the various security personel who were willing to talk to me about | |
| how they operate. | |
| Boards: | |
| I can be reached on the following systems with some regularity; | |
| The Phoenix Project: 512/441-3088 300-2400 baud | |
| Hacker's Den-80: 718/358-9209 300-1200 baud | |
| Smash Palace South: 512/478-6747 300-2400 baud | |
| Smash Palace North: 612/633-0509 300-2400 baud | |
| ************************************* EOF ************************************* | |