________________________________________________________________________________ ____ THE BASICS OF HACKING: INTRO ____ ___________________________________________ Uploaded by Elric of Imrryr __________________________________________ __ THE FIRST OF A SET OF ARTICLES: __ AN INTRODUCTION TO THE WORLD OF THE __ HACKER. BASICS TO KNOW BEFORE DOING__ ANYTHING, ESSENTIAL TO YOUR CONTIN- __ UING CAREER AS ONE OF THE ELITE IN __ THE COUNTRY... _______________________________________________________________________________THIS ARTICLE, "THE INTRODUCTION TO THEWORLD OF HACKING" IS MEANT TO HELP YOUBY TELLING YOU HOW NOT TO GET CAUGHT,WHAT NOT TO DO ON A COMPUTER SYSTEM,WHAT TYPE OF EQUIPMENT SHOULD I KNOWABOUT NOW, AND JUST A LITTLE ON THEHISTORY, PAST PRESENT FUTURE, OF THEHACKER._______________________________________WELCOME TO THE WORLD OF HACKING!WE, THE PEOPLE WHO LIVE OUTSIDE OFTHE NORMAL RULES, AND HAVE BEEN SCORNEDAND EVEN ARRESTED BY THOSE FROM THE'CIVILIZED WORLD', ARE BECOMMINGSCARCER EVERY DAY. THIS IS DUE TO THEGREATER FEAR OF WHAT A GOOD HACKER(SKILL WISE, NO MORAL JUDGEMENTS HERE)CAN DO NOWADAYS, THUS CAUSING ANTI-HACKER SENTIMENT IN THE MASSES.ALSO, FEW HACKERS SEEM TO ACTUALLY KNOWABOUT THE COMPUTER SYSTEMS THEY HACK,OR WHAT EQUIPMENT THEY WILL RUN INTOON THE FRONT END, OR WHAT THEY COULDDO WRONG ON A SYSTEM TO ALERT THE'HIGHER' AUTHORITIES WHO MONITOR THESYSTEM.THIS ARTICLE IS INTENDED TO TELL YOUABOUT SOME THINGS NOT TO DO, EVENBEFORE YOU GET ON THE SYSTEM. WEWILL TELL YOU ABOUT THE NEW WAVE OFFRONT END SECURITY DEVICES THAT AREBEGINNING TO BE USED ON COMPUTERS.WE WILL ATTEMPT TO INSTILL IN YOU ASECOND IDENTITY, TO BE BROUGHT UP ATTIME OF GREAT NEED, TO PULL YOU OUTOF TROUBLE.AND, BY THE WAY, WE TAKE NO, REPEAT,NO, RESPONCIBILITY FOR WHAT WE SAY INTHIS AND THE FORTHCOMING ARTICLES.ENOUGH OF THE BULLSHIT, ON TO THE FUN:_______________________________________AFTER LOGGING ON YOUR FAVORITE BBS,YOU SEE ON THE HIGH ACCESS BOARD APHONE NUMBER! IT SAYS IT'S A GREATSYSTEM TO "FUCK AROUND WITH!"THIS MAY BE TRUE, BUT HOW MANY OTHERPEOPLE ARE GOING TO CALL THE SAMENUMBER? SO: TRY TO AVOID CALLING ANUMBER GIVEN TO THE PUBLIC. THIS ISBECAUSE THERE ARE AT LEAST EVERY OTHERUSER CALLING, AND HOW MANY OTHER BOARDSWILL THAT NUMBER SPREAD TO?IF YOU CALL A NUMBER FAR, FAR AWAY, ANDYOU PLAN ON GOING THRU AN EXTENDER ORA RE-SELLER, DON'T KEEP CALLING THESAME ACCESS NUMBER (I.E. AS YOU WOULDIF YOU HAD A HACKER RUNNING), THISLOOKS VERY SUSPICIOUS AND CAN MAKELIFE MISERABLE WHEN THE PHONE BILLCOMES IN THE MAIL. MOST CITIES HAVEA VARIETY OF ACCESS NUMBERS ANDSERVICES, SO USE AS MANY AS YOU CAN.NEVER TRUST A CHANGE IN THE SYSTEM...THE 414'S, THE ASSHOLES, WERE CAUGHTFOR THIS REASON: WHEN ONE OF THEMCONNECTED TO THE SYSTEM, THERE WASNOTHING GOOD THERE. THE NEXT TIME,THERE WAS A TREK GAME STUCK RIGHT INTHEIR WAY! THEY PROCEDED TO PLAY SAIDGAME FOR TWO, SAY TWO AND A HALF HOURS,WHILE TELENET WAS TRACING THEM! NICEJOB, DON'T YOU THINK? IF ANYTHINGLOOKS SUSPICIOUS, DROP THE LINEIMMEDIATELY!! AS IN, YESTERDAY!!THE POINT WE'RE TRYING TO GET ACCROSSIS: IF YOU USE A LITTLE COMMON SENCE,YOU WON'T GET BUSTED. LET THE LITTLEKIDS WHO AREN'T SMART ENOUGH TORECOGNIZE A TRAP GET BUSTED, IT WILLTAKE THE HEAT OFF OF THE REAL HACKERS.NOW, LET'S SAY YOU GET ON A COMPUTERSYSTEM... IT LOOKS GREAT, CHECKSOUT, EVERYTHING SEEMS FINE. OK, NOWIS WHEN IT GETS MORE DANGEROUS. YOUHAVE TO KNOW THE COMPUTER SYSTEM (SEEFUTURE ISSUES OF THIS ARTICLE FOR INFOON SPECIFIC SYSTEMS) TO KNOW WHAT NOTTO DO. BASICALLY, KEEP AWAY FROM ANYCOMMAND WHICH LOOKS LIKE IT MIGHTDELETE SOMETHING, COPY A NEW FILE INTOTHE ACCOUNT, OR WHATEVER! ALWAYS LEAVETHE ACCOUNT IN THE SAME STATUS YOULOGGED IN WITH. CHANGE _NOTHING_...IF IT ISN'T AN ACCOUNT WITH PRIV'S,THEN DON'T TRY ANY COMMANDS THATREQUIRE THEM! ALL, YES ALL, SYSTEMSARE GOING TO BE KEEPING LOG FILESOF WHAT USERS ARE DOING, AND THAT WILLSHOW UP. IT IS JUST LIKE DROPPING ATROUBLE-CARD IN AN ESS SYSTEM, AFTERSENDING THAT NICE OPERATOR A PRETTYTONE. SPEND NO EXCESSIVE AMOUNTS OFTIME ON THE ACCOUNT IN ONE STRETCH.KEEP YOUR CALLING TO THE VERY LATENIGHT IF POSSIBLE, OR DURING BUSINESSHOURS (BELIEVE IT OR NOT!). IT SOHAPPENS THAT THERE ARE MORE USERS ONDURING BUSINESS HOURS, AND IT IS VERYDIFFICULT TO READ A LOG FILE WITH60 USERS DOING MANY COMMNDS EVERYMINUTE. TRY TO AVOID SYSTEMS WHEREEVERYONE KNOWS EACH OTHER, DON'T TRYTO BLUFF. AND ABOVE ALL: NEVER ACTLIKE YOU OWN THE SYSTEM, OR ARE THEBEST THERE IS. THEY ALWAYS GRAB THEPEOPLE WHO'S HEADS SWELL...THERE IS SOME VERY INTERESTING FRONTEND EQUIPMENT AROUND NOWADAYS, BUTFIRST LET'S DEFINE TERMS...BY FRONT END, WE MEAN ANY DEVICE THATYOU MUST PASS THRU TO GET AT THE REALCOMPUTER. THERE ARE DEVICES THAT AREMADE TO DEFEAT HACKER PROGRAMS, ANDJUST PLAIN OLD MULTIPLEXERS.TO DEFEAT HACKER PROGRAMS, THERE ARENOW DEVICES THAT PICK UP THE PHONEAND JUST SIT THERE... THIS MEANSTHAT YOUR DEVICE GETS NO CARRIER, THUSYOU THINK THERE ISN'T A COMPUTER ONTHE OTHER END. THE ONLY WAY AROUND ITIS TO DETECT WHEN IT WAS PICKED UP. IFIT PICKES UP AFTER THE SAME NUMBERRING, THEN YOU KNOW IT IS A HACKER-DEFEATER. THESE DEVICES TAKE A MULTI-DIGIT CODE TO LET YOU INTO THE SYSTEM.SOME ARE, IN FACT, QUITE SOPHISTICATEDTO THE POINT WHERE IT WILL ALSO LIMITTHE USER NAME'S DOWN, SO ONLY ONE NAMEOR SET OF NAMES CAN BE VALID LOGINSAFTER THEY INPUT THE CODE...OTHER DEVICES INPUT A NUMBER CODE, ANDTHEN THEY DIAL BACK A PRE-PROGRAMMEDNUMBER FOR THAT CODE. THESE SYSTEMSARE BEST TO LEAVE ALONE, BECAUSE THEYKNOW SOMEONE IS PLAYING WITH THEIRPHONE. YOU MAY THINK "BUT I'LL JUSTREPROGRAM THE DIAL-BACK." THINKAGAIN, HOW STUPID THAT IS... THENTHEY HAVE YOUR NUMBER, OR A TEST LOOPIF YOU WERE JUST A LITTLE SMARTER.IF IT'S YOUR NUMBER, THEY HAVE YOURBALLS (IF MALE...), IF ITS A LOOP,THEN YOU ARE SCREWED AGAIN, SINCE THOSELOOPS ARE _MONITORED_.AS FOR MULTIPLEXERS... WHAT A PLEXERIS SUPPOSED TO DO IS THIS: THE SYSTEMCAN ACCEPT MULTIPLE USERS. WE HAVETO TIME SHARE, SO WE'LL LET THE FRONT-END PROCESSOR DO IT... WELL, THIS ISWHAT A MULTIPLEXER DOES. USUALLY THEYWILL ASK FOR SOMETHING LIKE "ENTERCLASS" OR "LINE:". USUALLY IT ISPROGRAMMED FOR A DOUBLE DIGIT NUMBER,OR A FOUR TO FIVE LETTER WORD. THEREARE USUALLY A FEW SETS OF NUMBERS ITACCEPTS, BUT THOSE NUMBERS ALSO SETYOUR 300/1200 BAUD DATA TYPE. THESEMULTIPLEXERS ARE INCONVENIENT AT BEST,SO NOT TO WORRY.A LITTLE ABOUT THE HISTORY OF HACKING:HACKING, BY OUR DEFINITION, MEANS AGREAT KNOWLEDGE OF SOME SPECIAL AREA.DOCTORS AND LAWYERS ARE HACKERS OF ASORT, BY THIS DEFINITION. BUT MOSTOFTEN, IT IS BEING USED IN THE COMPUTERCONTEXT, AND THUS WE HAVE A DEFINITIONOF "ANYONE WHO HAS A GREAT AMOUNT OFCOMPUTER OR TELECOMMUNICATIONSKNOWLEDGE." YOU ARE NOT A HACKERBECAUSE YOU HAVE A LIST OF CODES...HACKING, BY OUR DEFINITION, HAS THENBEEN AROUND ONLY ABOUT 15 YEARS. ITSTARTED, WHERE ELSE BUT, MIT ANDCOLLEGES WHERE THEY HAD COMPUTERSCIENCE OR ELECTRICAL ENGINEERINGDEPARTMENTS. HACKERS HAVE CREATEDSOME OF THE BEST COMPUTER LANGUAGES,THE MOST AWESOME OPERATING SYSTEMS, ANDEVEN GONE ON TO MAKE MILLIONS. HACKINGUSED TO HAVE A GOOD NAME, WHEN WE COULDHONESTLY SAY "WE KNOW WHAT WE AREDOING". NOW IT MEANS (IN THE PUBLICEYE): THE 414'S, RON AUSTIN, THE NASAHACKERS, THE ARPANET HACKERS... ALLTHE PEOPLE WHO HAVE BEEN CAUGHT, HAVEDONE DAMAGE, AND ARE NOW GOING TO HAVETO FACE FINES AND SENTANCES.THUS WE COME PAST THE MORALISTIC CRAP,AND TO OUR PURPOSE: EDUCATE THE HACKERCOMMUNITY, RETURN TO THE DAYS WHENPEOPLE ACTUALLY KNEW SOMETHING..._______________________________________A PROGRAM GUIDE:THREE MORE ARTICLES WILL BE WRITTEN INTHIS SERIES, AT THE PRESENT TIME.BASICS OF HACKING I: DEC'SBASICS OF HACKING II: VAX'S (UNIX)BASICS OF HACKING III: DATA GENERALIT IS IMPOSSIBLE TO WRITE AN ARTICLEON IBM, SINCE THERE ARE SO MANY SYSTEMSAND WE ONLY HAVE INFO ON A FEW..._______________________________________THIS ARTICLE HAS BEEN WRITTEN BY:THE KNIGHTS OF SHADOW_______________________________________ THE BASICS OF HACKING II: VAX'S UNIX UNIX IS A TRADEMARK OF AT&T (AND YOU KNOW WHAT _THAT_ MEANS)Uploaded by Elric of Imrryr_______________________________________WELCOME TO THE BASICS OF HACKING II:VAX'S AND UNIX. IN THIS ARTICLE, WEDISCUSS THE UNIX SYSTEM THAT RUNS ONTHE VARIOUS VAX SYSTEMS. IF YOU AREON ANOTHER UNIX-TYPE SYSTEM, SOMECOMMANDS MAY DIFFER, BUT SINCE IT ISLICENCED TO BELL, THEY CAN'T MAKE MANYCHANGES._______________________________________HACKING ONTO A UNIX SYSTEM IS VERYDIFFICULT, AND IN THIS CASE, WE ADVISEHAVING AN INSIDE SOURCE, IF POSSIBLE.THE REASON IT IS DIFFICULT TO HACK AVAX IS THIS: MANY VAX, AFTER YOU GETA CARRIER FROM THEM, RESPOND=>LOGIN:THEY GIVE YOU NO CHANCE TO SEE WHAT THELOGIN NAME FORMAT IS. MOST COMMONLYUSED ARE SINGLE WORDS, UNDER 8 DIGITS,USUALLY THE PERSON'S NAME. THERE ISA WAY AROUND THIS: MOST VAX HAVE ANACCT. CALLED 'SUGGEST' FOR PEOPLE TOUSE TO MAKE A SUGGESTION TO THE SYSTEMROOT TERMINAL. THIS IS USUALLY WATCHEDBY THE SYSTEM OPERATOR, BUT AT LATEHE IS PROBABLY AT HOME SLEEPING ORSCREWING SOMEONE'S BRAINS OUT. SO WECAN WRITE A PROGRAM TO SEND AT THEVAX THIS TYPE OF A MESSAGE:A SCREEN FREEZE (CNTRL-S), SCREENCLEAR (SYSTEM DEPENDANT), ABOUT 255GARBAGE CHARACTERS, AND THEN A COMMANDTO CREATE A LOGIN ACCT., AFTER WHICHYOU CLEAR THE SCREEN AGAIN, THEN UN-FREEZE THE TERMINAL. WHAT THIS DOES:WHEN THE TERMINAL IS FROZEN, IT KEEPSA BUFFER OF WHAT IS SENT. WELL, THEBUFFER IS ABOUT 127 CHARACTERS LONG.SO YOU OVERFLOW IT WITH TRASH, AND THENYOU SEND A COMMAND LINE TO CREATE ANACCT. (SYSTEM DEPENDANT). AFTER THISYOU CLEAR THE BUFFER AND SCREEN AGAIN,THEN UNFREEZE THE TERMINAL. THIS ISA BAD WAY TO DO IT, AND IT IS MUCHNICER IF YOU JUST SEND A COMMAND TOTHE TERMINAL TO SHUT THE SYSTEM DOWN,OR WHATEVER YOU ARE AFTER...THERE IS ALWAYS, *ALWAYS* AN ACCT.CALLED ROOT, THE MOST POWERFUL ACCT.TO BE ON, SINCE IT HAS ALL OF THESYSTEM FILES ON IT. IF YOU HACK YOURWAY ONTO THIS ONE, THEN EVERYTHING ISEASY FROM HERE ON...ON THE UNIX SYSTEM, THE ABORT KEY ISTHE CNTRL-D KEY. WATCH HOW MANY TIMESYOU HIT THIS, SINCE IT IS ALSO A WAY TOLOG OFF THE SYSTEM!A LITTLE ABOUT UNIX ARCHITECHTURE:THE ROOT DIRECTORY, CALLED ROOT, ISWHERE THE SYSTEM RESIDES. AFTER THISCOME A FEW 'SUB' ROOT DIRECTORIES,USUALLY TO GROUP THINGS (STATS HERE,PRIV STUFF HERE, THE USER LOG HERE...).UNDER THIS COMES THE SUPERUSER (THEOPERATOR OF THE SYSTEM), AND THENFINALLY THE NORMAL USERS. IN THE UNIX'SHELL' EVERYTHING IS TREATED THE SAME.BY THIS WE MEAN: YOU CAN ACCESS APROGRAM THE SAME WAY YOU ACCESS A USERDIRECTORY, AND SO ON. THE WAY THE UNIXSYSTEM WAS WRITTEN, EVERYTHING, USERSINCLUDED, ARE JUST PROGRAMS BELONGINGTO THE ROOT DIRECTORY. THOSE OF YOUWHO HACKED ONTO THE ROOT, SMILE, SINCEYOU CAN SCREW EVERYTHING...THE MAIN LEVEL (EXEC LEVEL) PROMPT ONTHE UNIX SYSTEM IS THE $, AND IF YOUARE ON THE ROOT, YOU HAVE A # (SUPER-USER PROMPT).OK, A FEW BASICS FOR THE SYSTEM...TO SEE WHERE YOU ARE, AND WHAT PATHSARE ACTIVE IN REGUARDS TO YOUR USERACCOUNT, THEN TYPE => PWDTHIS SHOWS YOUR ACCT. SEPERATED BYA SLASH WITH ANOTHER PATHNAME (ACCT.),POSSIBLY MANY TIMES.TO CONNECT THROUGH TO ANOTHER PATH,OR MANY PATHS, YOU WOULD TYPE:YOU=> PATH1/PATH2/PATH3AND THEN YOU ARE CONNECTED ALL THEWAY FROM PATH1 TO PATH3. YOU CANRUN THE PROGRAMS ON ALL THE PATHSYOU ARE CONNECTED TO. IF IT DOESNOT ALLOW YOU TO CONNECT TO A PATH,THEN YOU HAVE INSUFFICIENT PRIVS, ORTHE PATH IS CLOSED AND ARCHIVED ONTOTAPE. YOU CAN RUN PROGRAMS THIS WAYALSO:YOU=> PATH1/PATH2/PATH3/PROGRAM-NAMEUNIX TREATS EVERYTHING AS A PROGRAM,AND THUS THERE A FEW COMMANDS TOLEARN...TO SEE WHAT YOU HAVE ACCESS TO IN THEEND PATH, TYPE=> LSFOR LIST. THIS SHOW THE PROGRAMSYOU CAN RUN. YOU CAN CONNECT TOTHE ROOT DIRECTORY AND RUN IT'SPROGRAMS WITH=>/ROOTBY THE WAY, MOST UNIX SYSTEMS HAVETHEIR LOG FILE ON THE ROOT, SO YOUCAN SET UP A WATCH ON THE FILE, WAITINGFOR PEOPLE TO LOG IN AND SNATCH THEIRPASSWORD AS IT PASSES THRU THE FILE.TO CONNECT TO A DIRECTORY, USE THECOMMAND: => CD PATHNAMETHIS ALLOWS YOU TO DO WHAT YOU WANTWITH THAT DIRECTORY. YOU MAY BE ASKEDFOR A PASSWORD, BUT THIS IS A GOODWAY OF FINDING OTHER USER NAMES TOHACK ONTO.THE WILDCARD CHARACTER IN UNIX, IFYOU WANT TO SEARCH DOWN A PATH FORA GAME OR SUCH, IS THE *.=> LS /*SHOULD SHOW YOU WHAT YOU CAN ACCESS.THE FILE TYPES ARE THE SAME AS THEYARE ON A DEC, SO REFER TO THAT SECTIONWHEN EXAMINING FILE. TO SEE WHAT ISIN A FILE, USE THE => PR FILENAMECOMMAND, FOR PRINT FILE.WE ADVISE PLAYING WITH PATHNAMES TOGET THE HANG OF THE CONCEPT. THEREIS ON-LINE HELP AVAILABLE ON MOSTSYSTEMS WITH A 'HELP' OR A '?'.WE ADVISE YOU LOOK THRU THE HELPFILES AND PAY ATTENTION TO ANYTHINGTHEY GIVE YOU ON PATHNAMES, OR THECOMMANDS FOR THE SYSTEM.YOU CAN, AS A USER, CREATE OR DESTROYDIRECTORIES ON THE TREE BENEATH YOU.THIS MEANS THAT ROOT CAN KILL EVERY-THING BUT ROOT, AND YOU CAN KILL ANYTHAT ARE BELOW YOU. THESE ARE THE=> MKDIR PATHNAME=> RMDIR PATHNAMECOMMANDS.ONCE AGAIN, YOU ARE NOT ALONE ON THESYSTEM... TYPE=> WHOTO SEE WHAT OTHER USERS ARE LOGGED INTO THE SYSTEM AT THE TIME. IF YOUWANT TO TALK TO THEM=> WRITE USERNAMEWILL ALLOW YOU TO CHAT AT THE SAMETIME, WITHOUT HAVING TO WORRY ABOUT THEPARSER. TO SEND MAIL TO A USER, SAY=> MAILAND ENTER THE MAIL SUB-SYSTEM.TO SEND A MESSAGE TO ALL THE USERSON THE SYSTEM, SAY => WALLWHICH STANDS FOR 'WRITE ALL'BY THE WAY, ON A FEW SYSTEMS, ALL YOUHAVE TO DO IS HIT THE KEYTO END THE MESSAGE, BUT ON OTHERS YOUMUST HIT THE CNTRL-D KEY.TO SEND A SINGLE MESSAGE TO A USER,SAY => WRITE USERNAMETHIS IS VERY HANDY AGAIN! IF YOU SENDTHE SEQUENCE OF CHARACTERS DISCUSSEDAT THE VERY BEGINNING OF THIS ARTICLE,YOU CAN HAVE THE SUPER-USER TERMINAL DOTRICKS FOR YOU AGAIN.PRIVS:IF YOU WANT SUPER-USER PRIVS, YOU CANEITHER LOG IN AS ROOT, OR EDIT YOURACCT. SO IT CAN SAY => SUTHIS NOW GIVES YOU THE # PROMPT, ANDALLOWS YOU TO COMPLETELY BY-PASS THEPROTECTION. THE WONDERFUL SECURITYCONSCIOUS DEVELOPERS AT BELL MADE ITVERY DIFFICULT TO DO MUCH WITHOUTPRIVS, BUT ONCE YOU HAVE THEM, THEREIS ABSOLUTELY NOTHING STOPPING YOUFROM DOING ANYTHING YOU WANT TO.TO BRING DOWN A UNIX SYSTEM:=> CHDIR /BIN=> RM *THIS WIPES OUT THE PATHNAME BIN, WHEREALL THE SYSTEM MAINTENANCE FILES ARE.OR TRY:=> R -RTHIS RECURSIVELY REMOVES EVERYTHINGFROM THE SYSTEM EXCEPT THE REMOVECOMMAND ITSELF.OR TRY:=> KILL -1,1=> SYNCTHIS WIPES OUT THE SYSTEM DEVICES FROMOPERATION.WHEN YOU ARE FINALLY SICK AND TIREDFROM HACKING ON THE VAX SYSTEMS, JUSTHIT YOUR CNTRL-D AND REPEAT KEY, ANDYOU WILL EVENTUALLY BE LOGGED OUT._______________________________________THE REASON THIS FILE SEEMS TO BE VERYSKETCHY IS THE FACT THAT BELL HAS 7LICENCED VERSIONS OF UNIX OUT IN THEPUBLIC DOMAIN, AND THESE COMMANDS ARETHOSE COMMON TO ALL OF THEM. WERECOMMEND YOU HACK ONTO THE ROOT ORBIN DIRECTORY, SINCE THEY HAVE THEHIGHEST LEVELS OF PRIVS, AND THEREIS REALLY NOT MUCH YOU CAN DO (EXCEPTDEVELOPE SOFTWARE) WITHOUT THEM._______________________________________THIS ARTICLE WRITTEN BY:THE KNIGHTS OF SHADOW_______________________________________Description: Hacking DEC's (Knights of Shadow II) File Date: 6-21-87 File Time: 6:31 am******************************************************************************** **** Hacking : DEC's **** ******************************************************************************** Welcome to Basics of Hacking I: DEC's In this article you will learn howto log in to DEC's, logging out, and all the fun stuff to do in-between.All of this information is based on a standard DEC system. Since thereare DEC systems 10 and 20, and we favor, the DEC 20, there will be moreinfo on them in this article. It is also the more common of the two,and is used by much more interesting people (if you know what we mean...)Ok, the first thing you want to do when you are receiving carrier froma DEC system is to find out the format of login names. You can do thisby looking at who is on the system.DEC=> @ (the 'exec' level prompt)YOU=> SYSY is short for SY(STAT) and shows you the system status. You should see|he format of login names... A SYSTAT usually comes up in this form:Job Line Program UserJob: The JOB number (Not important unless you want to log them off later)Line: What line they are on (used to talk to them...) These are both two or three digit numbers.Program: What program are they running under? If it says 'EXEC' they aren't doing anything at all...User: ahhhAHHHH! This is the user name they are logged in under...Copy the format, and hack yourself out a working code...Login format is as such:DEC=> @YOU=> login username passwordUsername is the username in the format you saw above in the SYSTAT. After youhit the space after your username, it will stop echoing characters back toyour screen. This is the password you are typing in... Remember, peopleusually use their name, their dog's name, the name of a favorite characterin a book, or something like this. A few clever people have it set to a keycluster (qwerty or asdfg). PW's can be from 1 to 8 characters long, anythingafter that is ignored. It would be nice to have a little help, wouldn't it? Just type a ?or the word HELP, and it will give you a whole list of topics...Some handy characters for you to know would be the control keys, wouldn't it?Backspace on a DEC 20 is rub which is 255 on your ASCII chart. On the DEC 10it is Ctrl-H. To abort a long listing or a program, Ctrl-C works fine. UseCtrl-O to stop long output to the terminal. This is handy when playinga game, but you don't want to Ctrl-C out. Ctrl-T for the time. Ctrl-Uwill kill the whole line you are typing at the moment. You may accidentlyrun a program where the only way out is a Ctrl-X, so keep that in reserve.Ctrl-S to stop listing, Ctrl-Q to continue on both systems. Is yourterminal having trouble?? Like, it pauses for no reason, or it doesn'tbackspace right? This is because both systems support many terminals,and you haven't told it what yours is yet... You are using a VT05 (Isn'tthat funny? I thought i had an apple) so you need to tell it you are one.DEC=> @YOU=> information terminal or...YOU=> info terThis shows you what your terminal is set up as...DEC=> all sorts of shit, then the @YOU=> set ter vt05This sets your terminal type to VT05. Now let's see what is in the account(here after abbreviated acct.) that you have hacked onto...SAY => DIRshort for directory, it shows you what the user of the code has save to thedisk. There should be a format like this: xxxxx.ooo xxxxx is the filename, from 1 to 20 characters long. ooo is the file type, one of:exe, txt, dat, bas, cmd and a few others that are system dependant.Exe is a compiled program that can be run (just by typing its name at the @).Txt is a text file, which you can see by typing=> type xxxxx.txtDo not try to=> type xxxxx.exe This is very bad for your terminal andwill tell you absolutly nothing. Dat is data they have saved.Bas is a basic program, you can have it typed out for you.Cmd is a command type file, a little too complicated to go into here.TRY => take xxxxx.cmdBy the way, there are other usersout there who may have files you canuse (Gee, why else am i here?).TYPE => DIR <*.*> (DEC 20) => DIR [*,*] (DEC 10)* is a wildcard, and will allow youto access the files on other accounts if the user has it set for publicaccess. If it isn't set for public access, then you won't see it.to run that program:DEC=> @YOU=> username program-nameUsername is the directory you saw the file listed under, and file name waswhat else but the file name?** YOU ARE NOT ALONE **Remember, you said (at the very start) SY short for SYSTAT, and how we saidthis showed the other users on the system? Well, you can talk to them,or at least send a message to anyone you see listed in a SYSTAT. You cando this by:DEC=> the user list (from your systat)YOU=> talk username (DEC 20) send username (DEC 10)Talk allows you and them immediate conferencing.Description: Hackign Data General (Knights of Shadow IV) File Date: 6-21-87 File Time: 6:36 am******************************************************************************** **** Hacking III: Data **** General **** ******************************************************************************** Welcome to the basics of hacking III: Data General computers.Data General is favored by large corporations who need to have a lot ofdata on-line. The Data General AOS, which stands for Advance on ofbastardized UNIX. All the commands which were in the UNIX article, willwork on a Data General. Once again, we have the problem of not knowingthe format for the login name on the Data General you want to hack. Asseems to be standard, try names from one to 8 digits long. Data Generaldesigned the computer to be for businessmen, and is thus very simplistic,and basically fool proof (but not damn fool proof). It follows the samelogin format as the unix system:DG=> login:DG=> password:YOU=> passwordPasswords can be a maximum of 8 characters, and they are almost alwaysset to a default of 'AOS' or 'DG'. (any you know about businessmen...) A word about control characters:Ctrl-O stops massive print-outs to the screen, but leaves you in whatevermode you were. (A technical word on what this actually does: It tells theCPU to ignore the terminal, and prints everything out to the CPU! This isabout 19200 baud, and so it seems like it just cancels.) Ctrl-U kills theline you are typing at the time. Now for the weird one: Ctrl-C tells theCPU to stop, and wait for another ctrl character. To stop a program,you actually need to type Ctrl-C and then a Ctrl-B. Once you get on, type 'HELP'. Many DG (Data General) computers are soldin a package deal, which also gets the company free customizing. So you neverknow what commands there might be. So we will follow what is known as the'ECLIPSE STANDARD', or''ctory like. To find out the files on the directoryyou are using, type=> DIRTo run a program, just like on a DEC, just type its name. Other than this,and running other people's programs, there really isn't a standard...*** HARK, yon other system users ***To see who is on, type => WHO remember?). This shows the other users,what they are doing, and what paths they are connected across. Thisis handy, so try a few of those paths yourself. To send a message, say=> send usernameThis is a one time message, just like send on the DEC 10. From here on, trycommands from the other previous files and from the 'HELP' listing.superuser:If you can get privs, just say:=> superuser onand you turn those privs on!By the way, you remember that computers keep a log of what people do? type:=> syslog /stopand it no longer records anything you do on the system, or any of the otherusers. It screams to high heaven that it was you who turned it off, but itkeeps no track of any accounts created or whatever else you may do. You cansay=> syslog /startto turn it back on (now why would you want to do something like that?????)To exit from the system, type=> BYE and the system will hang up on you. Most of the systems around, including DECs, VAX's, and DG's, have games.These are usually located in a path or directory of the name games or or games: Try looking in them, and you might find adventure, zork, wumpus(with bent arrows in hand) or a multitude of others. There may also begames called 'CB' or 'FORUM'. These are a sort of computer conference call.Use them on weekends, and you can meet all sorts of interesting people. If you would like to see more articles on hacking (this time far more thanjust the basics), or maybe articles on networks and such, then leave us mailif we are on the system, or have the sysop search us down. We call a lotof places, and you may just find us.******************************************************************************This completes the series of articles on hacking...The Basics of Hacking: IntroductionThe Basics of Hacking I: DEC'sThe Basics of Hacking II: VAX's (UNIX)The Basics of Hacking III: DG's******************************************************************************This and the previous articles by:The Knights of Shadow******************************************************************************Downloaded From P-80 International Information Systems 304-744-2253