| | ==Phrack Inc.== |
| |
|
| | Volume Two, Issue 22, File 5 of 12 |
| |
|
| | /|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/| |
| | |/ |/ |
| | /| An Indepth Guide In Hacking UNIX /| |
| | |/ and |/ |
| | /| The Concept Of Basic Networking Utility /| |
| | |/ |/ |
| | /| By Red Knight /| |
| | |/ |/ |
| | /| Member of the /| |
| | |/ Phreakers/Hackers Underground Network |/ |
| | /| /| |
| | |/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/|/ |
| |
|
| | Brief History On UNIX |
| | ~~~~~~~~~~~~~~~~~~~~~ |
| | Its because of Ken Tompson that today we are able to hack Unix. He used to |
| | work for Bell Labs in the 1960s. Tompson started out using the MULTICS OS |
| | which was later eliminated and Tompson was left without an operating system to |
| | work with. |
| |
|
| | Tompson had to come up with something real quick. He did some research and and |
| | in 1969 UNIX came out, which was a single user and it did not have many |
| | capabilities. A combined effort with others enabled him to rewrite the version |
| | in C and add some good features. This version was released in 1973 and was |
| | made available to the public. This was the first begining of UNIX in its |
| | presently known form. The more refined version of UNIX, today know as UNIX |
| | system V developed by Berkley University has unique capabilities. |
| |
|
| | Various types of UNIXes are CPIX, Berkeley Ver 4.1, Berkeley 4.2, FOS, Genix, |
| | HP-UX, IS/I, OSx, PC-IX, PERPOS, Sys3, Ultrix, Zeus, Xenix, UNITY, VENIX, UTS, |
| | Unisys, Unip lus+, UNOS, Idris, QNIX, Coherent, Cromix, System III, System 7, |
| | Sixth edition. |
| |
|
| | The Article Itself |
| | ~~~~~~~~~~~~~~~~~~ |
| | I believe that hacking into any system requires knowledge of the operating |
| | system itself. Basically what I will try to do is make you more familiar with |
| | UNIX operation and its useful commands that will be advantageous to you as a |
| | hacker. This article contains indepth explainations. I have used the UNIX |
| | System V to write this article. |
| |
|
| |
|
| | Error Messages: (UNIX System V) |
| | ~~~~~~~~~~~~~~ |
| | Login Incorrect - An invalid ID and/or password was entered. This means |
| | nothing. In UNIX there is no way guessing valid user IDs. |
| | You may come across this one when trying to get in. |
| |
|
| | No More Logins - This happens when the system will not accept anymore logins. |
| | The system could be going down. |
| |
|
| | Unknown Id - This happens if an invalid id is entered using (su) command. |
| |
|
| | Unexpected Eof In File - The file being stripped or the file has been damaged. |
| |
|
| | Your Password Has Expired - This is quite rare although there are situations |
| | where it can happen. Reading the etc/passwd will |
| | show you at how many intervals it changes. |
| |
|
| | You May Not Change The Password - The password has not yet aged enough. The |
| | administrator set the quotas for the users. |
| |
|
| | Unknown Group (Group's Name) - Occurs when chgrp is executed, group does not |
| | exist. |
| | Sorry - Indicated that you have typed in an invalid super user password |
| | (execution of the su). |
| |
|
| | Permission Denied! - Indicated you must be the owner or a super user to change |
| | password. |
| |
|
| | Sorry <( Of Weeks) Since Last Change - This will happen when password has has |
| | not aged enough and you tried to change |
| | it (password). |
| |
|
| | (Directory Name): No Permission - You are trying to remove a directory which |
| | you have no permission to. |
| |
|
| | (File Name) Not Removed - Trying to delete a file owned by another user that |
| | you do not have write permission for. |
| |
|
| | (Dirname) Not Removed - Ownership of the dir is not your that your trying to |
| | delete. |
| |
|
| | (Dirname) Not Empty - The directory contains files so you must have to delete |
| | the files before execcant open [file name] - defined |
| | wrong path, file name or you have no read permission. |
| |
|
| | Cp: (File Name) And (File Name) Are Identical - Self explanatory. |
| |
|
| | Cannot Locate Parent Directory - Occurs when using mv. |
| |
|
| | (File name) Not Found - File which your trying to move does not exist. |
| |
|
| | You Have Mail - Self explanatory. |
| |
|
| |
|
| | Basic Networking Utility Error Messages |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | Cu: Not found - Networking not installed. |
| | Login Failed - Invalid id/pw or wrong number specified. |
| | Dial Failed - The systen never answered due to a wrong number. |
| | UUCP Completely Failed - Did not specify file after -s. |
| | Wrong Time to Call - You called at the time at a time not specified in the |
| | Systems file. |
| | System not in systems - You called a remote not in the systems file. |
| |
|
| |
|
| | Logon Format |
| | ~~~~~~~~~~~~ |
| | The first thing you must do is switch to lower case. To identifing a UNIX, |
| | this is what you will see; |
| |
|
| | AT&T Unix System V 3.0 (eg of a system identifier) |
| |
|
| | login: |
| | or |
| | Login: |
| |
|
| | Any of these is a UNIX. Here is where you will have to guess at a user valid |
| | id. Here are some that I have come across; glr, glt, radgo, rml, chester, cat, |
| | lom, cora, hlto, hwill, edcasey, and also some containing numbers; smith1, |
| | mitu6, or special characters in it; bremer$, jfox. Login names have to be 3 |
| | to 8 chracters in length, lowercase, and must start with a letter. In some |
| | XENIX systems one may login as "guest" |
| |
|
| | User Level Accounts (Lower Case) |
| | ~~~~~~~~~~~~~~~~~~~ |
| | In Unix there are what is called. These accounts can be used at the "login:" |
| | prompt. Here is a list: |
| |
|
| | sys bin trouble daemon uucp nuucp rje lp adm |
| |
|
| |
|
| | Super-User Accounts |
| | ~~~~~~~~~~~~~~~~~~~ |
| | There is also a super-user login which make UNIX worth hacking. The accounts |
| | are used for a specific job. In large systems these logins are assingned to |
| | users who have a responsibilty to maintain subsystems. |
| |
|
| | They are as follows (all lower case); |
| |
|
| | root - This is a must the system comes configured with it. It has no |
| | restriction. It has power over every other account. |
| | unmountsys - Unmounts files |
| | setup - System set up |
| | makefsys - Makes a new file |
| | sysadm - Allows useful S.A commands (doesn't need root login) |
| | powerdown - Powering system down |
| | mountfsys - Mounts files |
| | checkfsys - Checks file |
| |
|
| | These accounts will definitly have passwords assigned to them. These accounts |
| | are also commands used by the system administrator. After the login prompt you |
| | will receive a password prompt: |
| |
|
| | password: |
| | or |
| | Password: |
| |
|
| | Enter the password (it will not echo). The password rule is as follows; Each |
| | password has to contain at least 6 characters and maximum of 8 characters. Two |
| | of which are to be alphabetic letters and at least one being a number or a |
| | special character. The alphabetic digits could be in upper case or lower |
| | case. Here are some of the passwords that I have seen; Ansuya1, PLAT00N6, |
| | uFo/78, ShAsHi.., Div417co. |
| |
|
| | The passwords for the super user accounts will be difficult to hack try the |
| | accounts interchangebly; login:sysadm password:makefsys, or rje1, sysop, |
| | sysop1, bin4, or they might contain letters, numbers, or special chracters in |
| | them. It could be anything. The user passwords are changed by an aging |
| | proccess at successive intervals. The users are forced to changed it. The |
| | super-user will pick a password that will not need changing for a long period |
| | of time. |
| |
|
| |
|
| | You Have Made It! |
| | ~~~~~~~~~~~~~~~~~ |
| | The hard part is over and hopefully you have hacked a super-user account. |
| | Remember Control-d stops a process and also logs you off. The next thing you |
| | will probably see is the system news. Ex; |
| |
|
| | login:john |
| | password:hacker1 |
| |
|
| | System news |
| |
|
| | There will be no networking offered to the users till |
| | August 15, due to hardware problems. |
| | (Just An Example) |
| |
|
| | $ |
| |
|
| | $ (this is the Unix prompt) - Waiting for a command to be entered. |
| | - Means your logged in as root (Very Good). |
| |
|
| | A Word About The XENIX System III (Run On The Tandy 6000) |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | The largest weakness in the XENIX System III occurs after the installation |
| | of the Profile-16 or more commonly know as the Filepro-16. I have seen the |
| | Filepro-16 installed in many systems. The installation process creates an |
| | entry in the password file for a user named \fBprofile\fR, an account that who |
| | owns and administors the database. The great thing about it is that when the |
| | account is created, no password is assigned to it. The database contains |
| | executable to maintain it. The database creation programs perform a |
| | \fBsetuid\fR to boot up the \fBoot\fR thereby giving a person the whole C |
| | Shell to gain Super User privilege same as root. Intresting huh! |
| |
|
| | (* Note: First the article will inform you of how the Unix is made up.) |
| |
|
| |
|
| | The Unix is made if three components - The Shell, The Kernal, File System. |
| |
|
| | The Kernal |
| | ~~~~~~~~~~ |
| | You could say that the kernal is the heart of the Unix operating system. The |
| | kernal is a low level language lower than the shell which maintains processes. |
| | The kernal handles memory usage, maintains file system the sofware and hardware |
| | devices. |
| |
|
| | The Shell |
| | ~~~~~~~~~ |
| | The shell a higher level language. The shell had two important uses, to act as |
| | command interpreture for example using commands like cat or who. The shell is |
| | at work figuring out whether you have entered a command correctly or not. The |
| | second most important reason for the shell is its ability to be used as |
| | programing language. Suppose your performing some tasks repeatedly over and |
| | over again, you can program the shell to do this for you. |
| |
|
| | (Note: This article will not cover shell programming.) |
| | ( Instead B.N.N will be covered. ) |
| |
|
| |
|
| | The File System |
| | ~~~~~~~~~~~~~~~ |
| | The file system in Unix is divided into 3 catagories: Directories, ordinary |
| | files and special files (d,-). |
| |
|
| | Basic Stucture: |
| |
|
| | (/)-this is abreviation for the root dirctory. |
| |
|
| | root level root |
| | (/) system |
| | -------------------------------------|---------------------------------- level |
| | | | | | | | | | |
| | /unix /etc /dev /tmp /lib /usr /usr2 /bin |
| | | _____|_____ |
| | login passwd | | | |
| | level /john /cathy |
| | ________________________|_______________ |
| | | | | | | | |
| | .profile /mail /pers /games /bin /michelle |
| | *.profile - in case you | __|______ | __|_______ |
| | wish to change your environment, but capital | | data | | | |
| | after you log off, it sets it to othello starwars letter letter1 |
| | default. |
| |
|
| | /unix - This is the kernal. |
| | /etc - Contains system administrators files,Most are not available to the |
| | regular user (this dirrctory contains the /passwd file). |
| |
|
| | Here are some files under /etc directory: |
| | /etc/passwd |
| | /etc/utmp |
| | /etc/adm/sulog |
| | /etc/motd |
| | /etc/group |
| | /etc/conf |
| | /etc/profile |
| |
|
| | /dev - contains files for physical devices such as printer and the disk drives |
| | /tmp - temporary file directory |
| | /lib - dirctory that contains programs for high level languages |
| | /usr - this directory contains dirctories for each user on the system |
| | /bin - contain executable programs (commands) |
| |
|
| | The root also contains: |
| | /bck - used to mount a back up file system. |
| | /install - Used to install and remove utilities |
| | /lost+found - This is where all the removed files go, this dir is used by fsck |
| | /save -A utility used to save data |
| | /mnt - Used for temporary mounting |
| |
|
| | **Now the fun part scouting around** |
| |
|
| | Local Commands (Explained In Details) |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | At the unix prompt type the pwd command. It will show you the current working |
| | directory you are in. |
| |
|
| | $ pwd |
| | $ /usr/admin - assuming that you have hacked into a super user account |
| | check fsys |
| | $ |
| |
|
| | This gives you the full login directory. The / before tell you the location of |
| | the root directory. |
| |
|
| | Or |
| |
|
| | (REFER TO THE DIAGRAM ABOVE) |
| | $ pwd |
| | $ /usr/john |
| | $ |
| | Assuming you have hacked into John's account. |
| |
|
| | Lets say you wanted to move down to the Michelle directory that contains |
| | letters. You would type in; |
| |
|
| | $ cd michelle or cd usr/john/michelle |
| | $ pwd |
| | $ /usr/john/michelle |
| | $ |
| |
|
| | Going back one directory up type in: |
| | $ cd .. |
| | or going to your parent directory just type in "cd" |
| |
|
| | Listing file directories assuming you have just logged in: |
| | $ ls /usr/john |
| | mail |
| | pers |
| | games |
| | bin |
| | michelle |
| | This wont give you the .profile file. To view it type |
| | $ cd |
| | $ ls -a |
| | : |
| | : |
| | .profile |
| |
|
| | To list file names in Michelle's directory type in: |
| | $ ls michelle (that if your in the johns directory) |
| | $ ls /usr/john/michelle(parent dir) |
| |
|
| | ls -l |
| | ~~~~~ |
| | The ls -l is an an important command in unix.This command displays the whole |
| | directory in long format :Run this in parent directory. |
| | $ ls -l |
| | total 60 |
| | -rwxr-x--- 5 john bluebox 10 april 9 7:04 mail |
| | drwx------ 7 john bluebox 30 april 2 4:09 pers |
| | : : : : : : : |
| | : : : : : : : |
| | -rwxr-x--- 6 cathy bluebox 13 april 1 13:00 partys |
| | : : : : : : : |
| | $ |
| |
|
| | The total 60 tells one the ammount of disk space used in a directory. The |
| | -rwxr-x--- is read in triples of 3. The first chracter eg (-, d, b, c) means |
| | as follows: - is an ordinary file, d is a directory, b is block file, c is a |
| | character file. |
| |
|
| | The r stands for read permission, w is write permission, x is execute. The |
| | first column is read in 3 triples as stated above. The first group of 3 (in |
| | -rwxr-x---) after the "-" specifies the permission for the owner of the file, |
| | the second triple are for the groups (the fourth column) and the last triple |
| | are the permissions for all other users. Therefore, the -rwxr-x--- is read as |
| | follows. |
| |
|
| | The owner, John, has permission to read, write, and execute anything in the bin |
| | directory but the group has no write permission to it and the rest of the users |
| | have no permission at all. The format of one of the lines in the above output |
| | is as follows: |
| |
|
| | file type-permissions, links, user's name, group, bytes taken, date, time when |
| | last renued, directory, or file name. |
| |
|
| | *** You will be able to read, execute Cathy's *** |
| | *** file named partly due to the same group. *** |
| |
|
| | Chmod |
| | ~~~~~ |
| | The chmod command changes permission of a directory or a file. Format is |
| | chmod who+, -, =r , w, x |
| |
|
| | The who is substituted by u-user, g-group, o-other users, a-all. |
| | The + means add permission, - means remove permission, = - assign. |
| | Example: If you wanted all other users to read the file name mail, type: |
| |
|
| | $ chmod o+r mail |
| |
|
| | Cat |
| | ~~~ |
| | Now suppose you wanted to read the file letter. There are two ways to doing |
| | this. First go to the michelle directory then type in: |
| |
|
| | $ cat letter |
| | line one ...\ |
| | line two ... }the output of letter |
| | line three../ |
| | $ |
| | or |
| | If you are in the parent directory type in: |
| | $ cat /usr/john/michelle/letter |
| | and you will have the same output. |
| |
|
| | Some cat options are -s, -u, -v, -e, -t |
| |
|
| | Special Chracters in Unix |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | * - Matches any number of single characters eg. ls john* will list all |
| | files that begin with john |
| | [...] - Matchs any one of the chracter in the [ ] |
| | ? - Matches any single chracter |
| | & - Runs a process in the backgroung leaving your terminal free |
| | $ - Values used for variables also $n - null argument |
| | > - Redirectes output |
| | < - Redirects input to come from a file |
| | >> - Redirects command to be added to the end of a file |
| | | - Pipe output (eg:who|wc-l tells us how many users are online) |
| | "..." - Turn of meaning of special chracters excluding $,` |
| | `...` - Allows command output in to be used in a command line |
| | '...' - Turns of special meaning of all chracters |
| |
|
| | Continuation Of Local Commands |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | man [command] or [c/r] -will give you a list of commands explainations |
| | help - available on some UNIX systems |
| | mkdir [dir name(s)] - makes a directory |
| | rmdir [dir name(s)] - removes directory.You wont be able to remove the |
| | directory if it contains files in them |
| | rm [file name(s)] - removes files. rm * will erase all files in the current |
| | dir. Be carefull you! Some options are: |
| | [-f unconditional removal] [-i Prompts user for y or n] |
| |
|
| | ps [-a all processes except group leaders] [-e all processes] [-f the whole |
| | list] - This command reports processes you are running eg: |
| |
|
| | $ps |
| | PID TTY TIME COMMAND |
| | 200 tty09 14:20 ps |
| |
|
| | The systems reports (PID - process idenetification number which is a number |
| | from 1-30,000 assigned to UNIX processes) |
| | It also reports the TTY,TIME and the COMMAND being executed at the time. |
| | To stop a process enter : |
| |
|
| | $kill [PID] (this case its 200) |
| | 200 terminated |
| | $ |
| |
|
| | grep (argument) - searches for an file that contains the argument |
| | mv (file names(s)) ( dir name ) - renames a file or moves it to another |
| | directory |
| | cp [file name] [file name] - makes a copy of a file |
| | write [login name ] - to write to other logged in users. Sort of a chat |
| | mesg [-n] [-y] - doesn't allow others to send you messages using the write |
| | command. Wall used by system adm overrides it. |
| | $ [file name] - to execute any file |
| | wc [file name] - Counts words, characters,lines in a file |
| | stty [modes] - Set terminal I/O for the current devices |
| | sort [filename] - Sorts and merges files many options |
| | spell [file name] > [file name] - The second file is where the misspelt words |
| | are entered |
| | date [+%m%d%y*] [+%H%%M%S] - Displays date acoording to options |
| | at [-r] [-l] [job] - Does a specified job at a specified time. The -r Removes |
| | all previously scheduled jobs.The -l reports the job and |
| | status of all jobs scheduled |
| | write [login] [tty] - Sends message to the login name. Chat! |
| |
|
| |
|
| | Su [login name] |
| | ~~~~~~~~~~~~~~~ |
| | The su command allows one to switch user to a super user to a user. Very |
| | important could be used to switch to super user accounts. |
| | Usage: |
| |
|
| | $ su sysadm |
| | password: |
| |
|
| | This su command will be monitored in /usr/adm/sulog and this file of all files |
| | is carefully monitered by the system administrator.Suppose you hacked in john's |
| | account and then switched to the sysadm account (ABOVE) your /usr/adm/su log |
| | entry would look like: |
| |
|
| | SU 04/19/88 21:00 + tty 12 john-sysadm |
| |
|
| | Therfore the S.A(system administrator) would know that john swithed to sysadm |
| | account on 4/19/88 at 21:00 hours |
| |
|
| |
|
| | Searching For Valid Login Names: |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | Type in- |
| | $ who ( command informs the user of other users on the system) |
| | cathy tty1 april 19 2:30 |
| | john tty2 april 19 2:19 |
| | dipal tty3 april 19 2:31 |
| | : |
| | : |
| | tty is the user's terminal, date, time each logged on. mary, dr.m are valid |
| | logins. |
| |
|
| | Files worth concatenating(cat) |
| |
|
| |
|
| | /etc/passwd file |
| | ~~~~~~~~~~~~~~~~ |
| | The etc/passwd is a vital file to cat. For it contains login names of all |
| | users including super user accounts and there passwords. In the newer SVR3 |
| | releases they are tighting their security by moving the encrypted passwords |
| | from /etc/passwd to /etc/shadow making it only readable by root. |
| | This is optional of course. |
| |
|
| | $ cat /etc/passwd |
| | root:D943/sys34:0:1:0000:/: |
| | sysadm:k54doPerate:0:0:administration:usr/admin:/bin/rsh |
| | checkfsys:Locked;:0:0:check file system:/usr/admin:/bin/rsh |
| | : |
| | other super user accs. |
| | : |
| | john:hacker1:34:3:john scezerend:/usr/john: |
| | : |
| | other users |
| | : |
| | $ |
| |
|
| | If you have reached this far capture this file as soon as possible. This is a |
| | typical output etc/passwd file. The entries are seperated by a ":". There |
| | made be up to 7 fields in each line. |
| | Eg.sysadm account. |
| |
|
| | The first is the login name in this case sysadm.The second field contains the |
| | password. The third field contains the user id."0 is the root." Then comes |
| | the group id then the account which contains the user full name etc. The sixth |
| | field is the login directory defines the full path name of the the paticular |
| | account and the last is the program to be executed. Now one can switch to |
| | other super user account using su command descibed above. The password entry |
| | in the field of the checkfsys account in the above example is "Locked;". This |
| | doesn't mean thats its a password but the account checkfsys cannot be accessed |
| | remotely. The ";" acts as an unused encryption character. A space is also |
| | used for the same purpose. You will find this in many UNIX systems that are |
| | small systems where the system administrator handles all maintaince. |
| |
|
| | If the shawdowing is active the /etc/passwd would look like this: |
| |
|
| | root:x:0:1:0000:/: |
| | sysadm:x:0:0:administration:/usr/admin:/bin/rsh |
| |
|
| | The password filed is substituted by "x". |
| |
|
| | The /etc/shawdow file only readable by root will look similar to this: |
| |
|
| | root:D943/sys34:5288:: |
| | : |
| | super user accounts |
| | : |
| | Cathy:masai1:5055:7:120 |
| | : |
| | all other users |
| | : |
| |
|
| | The first field contains users id: The second contains the password (The pw |
| | will be NONE if logining in remotely is deactivated): The third contains a |
| | code of when the password was last changed: The fourth and the fifth contains |
| | the minimum and the maximum numbers of days for pw changes (its rare that you |
| | will find this in the super user logins due to there hard to guess passwords) |
| |
|
| |
|
| | /etc/options |
| | ~~~~~~~~~~~~ |
| | The etc/options file informs one the utilities available in the system. |
| | -rwxr-xr-x 1 root sys 40 april 1:00 Basic Networking utility |
| |
|
| |
|
| | /etc/group |
| | ~~~~~~~~~~ |
| | The file has each group on the system. Each line will have 4 entries separated |
| | by a ":". Example of concatenated /etc/group: |
| |
|
| | root::0:root |
| | adm::2:adm,root |
| | bluebox::70: |
| |
|
| | Group name:password:group id:login names |
| | ** It very unlikely that groups will have passwords assigned to them ** |
| | The id "0" is assigned to / |
| |
|
| |
|
| | Sending And Recieving Messages |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | Two programs are used to manage this. They are mail & mailx. The difference |
| | between them is that mailx is more fancier thereby giving you many choices like |
| | replying message, using editors, etc. |
| |
|
| |
|
| | Sending |
| | ~~~~~~~ |
| | The basic format for using this command is: |
| |
|
| | $mail [login(s)] |
| | (now one would enter the text after finishing enter "." a period on the next |
| | blank line) |
| | $ |
| |
|
| | This command is also used to send mail to remote systems. Suppose you wanted |
| | to send mail to john on a remote called ATT01 you would type in: |
| |
|
| | $mail ATT01!john |
| |
|
| | Mail can be sent to several users, just by entering more login name after |
| | issuing the mail command |
| |
|
| | Using mailx is the same format:(This I'll describe very briefly) $mailx john |
| | subject:(this lets you enter the subject) |
| | (line 1) |
| | (line 2) |
| | (After you finish enter (~.) not the brackets of course, more commands are |
| | available like ~p, ~r, ~v, ~m, ~h, ~b, etc.). |
| |
|
| |
|
| | Receiving |
| | ~~~~~~~~~ |
| | After you log on to the system you will the account may have mail waiting. |
| | You will be notified "you have mail." |
| | To read this enter: |
| | $mail |
| | (line 1) |
| | (line 2) |
| | (line 3) |
| | ? |
| | $ |
| |
|
| | After the message you will be prompted with a question mark. Here you have a |
| | choice to delete it by entering d, saving it to view it later s, or just press |
| | enter to view the next message. |
| |
|
| | (DON'T BE A SAVANT AND DELETE THE POOR GUY'S MAIL) |
| |
|
| |
|
| | Super User Commands |
| | ~~~~~~~~~~~~~~~~~~~ |
| | $sysadm adduser - will take you through a routine to add a user (may not last |
| | long) |
| |
|
| | Enter this: |
| |
|
| | $ sysadm adduser |
| | password: |
| | (this is what you will see) |
| | /--------------------------------------------------------------------------\ |
| | Process running succommmand `adduser` |
| | USER MANAGMENT |
| |
|
| | Anytime you want to quit, type "q". |
| | If you are not sure how to answer any prompt, type "?" for help |
| |
|
| | If a default appears in the question, press <RETURN> for the default. |
| |
|
| | Enter users full name [?,q]: (enter the name you want) |
| | Enter users login ID [?,q]:(the id you want to use) |
| | Enter users ID number (default 50000) [?,q) [?,q]:( press return ) |
| | Enter group ID number or group name:(any name from /etc/group) |
| | Enter users login home directory:(enter /usr/name) |
| |
|
| | This is the information for the new login: |
| | Users name: (name) |
| | login ID:(id) |
| | users ID:50000 |
| | group ID or name: |
| | home directory:/usr/name |
| | Do you want to install, edit, skip [i, e, s, q]? (enter your choice if "i" |
| | then) |
| | Login installed |
| | Do you want to give the user a password?[y,n] (its better to enter one) |
| | New password: |
| | Re-enter password: |
| |
|
| | Do you want to add another login? |
| | \----------------------------------------------------------------------------/ |
| |
|
| | This is the proccess to add a user. Since you hacked into a super user account |
| | you can make a super user account by doing the following by entering 0 as an |
| | user and a group ID and enter the home directory as /usr/admin. This will give |
| | you as much access as the account sysadm. |
| |
|
| | **Caution** - Do not use login names like Hacker, Cracker,Phreak etc. This is |
| | a total give away. |
| |
|
| | The process of adding a user wont last very long the S.A will know when he |
| | checks out the /etc/passwd file |
| |
|
| | $sysadm moduser - This utility allows one to modify users. DO NOT ABUSE!! |
| | ! |
| |
|
| | Password: |
| |
|
| | This is what you'll see: |
| |
|
| | /----------------------------------------------------------------------------\ |
| | MODIFYING USER'S LOGIN |
| |
|
| | 1)chgloginid (This is to change the login ID) |
| | 2)chgpassword (Changing password) |
| | 3)chgshell (Changing directory DEFAULT = /bin/sh) |
| |
|
| | ENTER A NUMBER,NAME,INITIAL PART OF OF NAME,OR ? OR <NUMBER>? FOR HELP, Q TO |
| | QUIT ? |
| | \----------------------------------------------------------------------------/ |
| |
|
| | Try every one of them out.Do not change someones password.It creates a havoc. |
| | If you do decide to change it.Please write the original one down somewhere |
| | and change back.Try not to leave to many traces after you had your fun. In |
| | choice number 1 you will be asked for the login and then the new one. In |
| | choice number 2 you will asked for the login and then supplied by it correct |
| | password and enter a new one. In choice 3 this is used to a pchange the login |
| | shell ** Use full ** The above utilites can be used separatly for eg (To |
| | change a password one could enter: $sysadm chgpasswd not chapassword, The rest |
| | are same) |
| |
|
| | $sysadm deluser - This is an obviously to delete a user password: |
| |
|
| | This will be the screen output: |
| | /---------------------------------------------------------------------------\ |
| | Running subcommand 'deluser' from menu 'usermgmt' |
| | USER MANAGEMENT |
| |
|
| | This fuction completely removes the user,their mail file,home directory and all |
| | files below their home directory from the machine. |
| |
|
| | Enter login ID you wish to remove[q]: (eg.cathy) |
| | 'cathy' belongs to 'Cathy Franklin' |
| | whose home directory is /usr/cathy |
| | Do you want to remove this login ID 'cathy' ? [y,n,?,q] : |
| |
|
| | /usr/cathy and all files under it have been deleted. |
| |
|
| | Enter login ID you wish to remove [q]: |
| | \--------------------------------------------------------------------------/ |
| | This command deletes everthing owned by the user.Again this would be stupid to |
| | use. |
| |
|
| |
|
| | Other Super User Commands |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | wall [text] control-d - to send an anouncement to users logged in (will |
| | override mesg -n command). Execute only from / |
| | /etc/newgrp - is used to become a member of a group |
| |
|
| | sysadm [program name] |
| | delgroup - delets groups |
| | diskuse - Shows free space etc. |
| | whoson - self explanatory |
| | lsgroup - Lists group |
| | mklineset -hunts various sequences |
| |
|
| |
|
| | Basic Networking Unility (BNU) |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| |
|
| | The BNU is a unique feature in UNIX.Some systems may not have this installed. |
| | What BNU does is allow other remote UNIXes communicate with yours without |
| | logging off the present one.BNU also allowes file transfer between computers. |
| | Most UNIX systems V will have this feature installed. |
| |
|
| | The user program like cu,uux etc are located in the /usr/bin directory |
| |
|
| | Basic Networking Files |
| | ~~~~~~~~~~~~~~~~~~~~~~ |
| | /usr/lib/uucp/[file name] |
| | [file name] |
| | systems - cu command to establishes link.Contains info on remote computers |
| | name, time it can be reached, login Id, password, telephone numbers |
| | devices - inter connected with systems files (Automatic call unit same in two |
| | entries) also contains baud rate, port tty1, etc. |
| |
|
| | dialers - where asscii converation must be made before file tranfers etc. |
| | dialcodes - contains abreiviations for phone numbers that can be used in |
| | systems file |
| |
|
| | other files are sysfiles, permissions, poll, devconfig |
| |
|
| | Logining On To Remote And Sending+Receiving Files |
| | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| | cu - This command allows one to log on to the local as well as the remote Unix |
| | (or a non unix)without haveing to hang up so you can transfer files. |
| | Usage:[options] |
| |
|
| | $ cu [-s baud rate][-o odd parity][-e even parity][-l name of comm line] |
| | telephone number | systemname |
| |
|
| | To view system names that you can communicate with use the 'unname' command: |
| | Eg. of output of names: |
| |
|
| | ATT01 |
| | ATT02 |
| | ATT03 |
| | ATT04 |
| |
|
| |
|
| | $ cu -s300 3=9872344 (9872344 is the tel) |
| | connected |
| | login: |
| | password: |
| |
|
| | Local Strings |
| | ~~~~~~~~~~~~~ |
| | <~.> - will log you off the remote terminal, but not the local |
| | <control-d> - puts you back on the remote unix local (the directory which you |
| | are in) |
| | "%put [file name] - reverse of above |
| |
|
| | Ct |
| | ~~ |
| | ct allows local to connect to remote.Initiates a getty on a remote terminal. |
| | Usefull when using a remote terminal.BNU has call back feature that allows the |
| | user on the remote who can execute a call back meaning the local can call the |
| | remote.[ ] are options |
| |
|
| | $ ct [-h prevent automatic hang up][-s bps rate][-wt set a time to call back |
| | abbrieviated t mins] telephone number |
| |
|
| | Uux |
| | ~~~ |
| | To execute commands on a remote (unix to unix) |
| | usage:[ ] are options |
| |
|
| | $ uux [- use standard output][-n prevent mail notification][-p also use |
| | standard output] command-string |
| |
|
| | UUCP |
| | ~~~~ |
| | UUCP copies files from ones computer to the home directory of a user in remote |
| | system. This also works when copying files from one directory to another in |
| | the remote. The remote user will be notified by mail. This command becomes |
| | use full when copying files from a remote to your local system. The UUCP |
| | requires the uucico daemon will call up the remote and will perform file login |
| | sequence, file transfer, and notify the user by mail. Daemons are programs |
| | runining in the background. The 3 daemons in a Unix are uucico, uusched, |
| | uuxqt. |
| |
|
| | Daemons Explained: [nows a good time to explain the 3 daemons] |
| | ~~~~~~~~~~~~~~~~~ |
| | Uuxqt - Remote execution. This daemon is executed by uudemon.hour started by |
| | cron.UUXQT searchs in the spool directory for executable file named |
| | X.file sent from the remote system. When it finds a file X .file where |
| | it obtains process which are to be executed. The next step is to find |
| | weather the processes are available at the time.The if available it |
| | checks permission and if everthing is o.k it proceeds the background |
| | proccess. |
| |
|
| | Uucico - This Daemon is very immportant for it is responsible in establishing |
| | a connection to the remote also checks permission, performs login |
| | procedures,transfers + executes files and also notifies the user by |
| | mail. This daemon is called upon by uucp,uuto,uux commands. |
| |
|
| | Uusched - This is executed by the shell script called uudemon.hour. This |
| | daemons acts as a randomizer before the UUCICO daemon is called. |
| |
|
| |
|
| | Usage: |
| |
|
| | $ uucp [options] [first full path name!] file [destination path!] file example: |
| |
|
| | $ uucp -m -s bbss hackers unix2!/usr/todd/hackers |
| |
|
| | What this would do is send the file hackers from your computer to the remotes |
| | /usr/todd/hackers making hackers of course as file. Todd would mail that a |
| | file has been sent to him. The Unix2 is the name of the remote. Options for |
| | UUCP: (Don't forget to type in remotes name Unix2 in case) |
| | -c dont copy files to spool directory |
| | -C copy to spool |
| | -s[file name] - this file will contain the file status(above is bbss) |
| | -r Dont start the comm program(uucico) yet |
| | -j print job number(for above eg.unix2e9o3) |
| | -m send mail when file file is complete |
| |
|
| | Now suppose you wanted to receive file called kenya which is in the |
| | usr/ dan/usa to your home directory /usr/john assuming that the local systems |
| | name is ATT01 and you are currently working in /usr/dan/usa,you would type in: |
| |
|
| | $uucp kenya ATT01!/usr/john/kenya |
| |
|
| | Uuto |
| | ~~~~ |
| | The uuto command allows one to send file to remote user and can also be used to |
| | send files locally. |
| |
|
| | Usage: |
| |
|
| | $ uuto [file name] [system!login name]( omit systen name if local) |
| |
|
| |
|
| | Conclusion |
| | ~~~~~~~~~~ |
| | Theres always more one can say about the UNIX, but its time to stop. I hope |
| | you have enjoyed the article. I apologize for the length. I hope I made the |
| | UNIX operating system more familiar. The contents of the article are all |
| | accurate to my knowledge. Hacking into any system is illegal so try to use |
| | remote dial-ups to the job. Remember do not abuse any systems you hack into |
| | for a true hacker doesn't like to wreck, but to learn. |
| |
|
| | Watch for my new article on using PANAMAC airline computers coming soon. |
| |
|
| | Red Knight |
| | P/HUN! |
| | <<T.S.A.N>> |
| | ========================================================================= |
| |
|