524 lines
24 KiB
Plaintext
524 lines
24 KiB
Plaintext
|
___________________________________________________________
|
|||
|
|
|||
|
GUIDE TO (mostly) HARMLESS HACKING
|
|||
|
|
|||
|
Beginners<EFBFBD> Series #3 Part 1
|
|||
|
|
|||
|
How to Get a *Good* Shell Account
|
|||
|
____________________________________________________________
|
|||
|
|
|||
|
|
|||
|
______________________________________________________________
|
|||
|
In this section you will learn how to:
|
|||
|
<EFBFBD> tell whether you may already have a Unix shell account
|
|||
|
<EFBFBD> get a shell account
|
|||
|
<EFBFBD> log on to your shell account
|
|||
|
_______________________________________________________________
|
|||
|
|
|||
|
You<EFBFBD>ve fixed up your Windows box to boot up with a lurid hacker logo. You<6F>ve
|
|||
|
renamed <20>Recycle Bin<69> <20>Hidden Haxor Secrets.<2E> When you run Netscape or
|
|||
|
Internet Explorer, instead of that boring corporate logo, you have a
|
|||
|
full-color animated Mozilla destroying New York City. Now your friends and
|
|||
|
neighbors are terrified and impressed.
|
|||
|
|
|||
|
But in your heart of hearts you know Windows is scorned by elite hackers.
|
|||
|
You keep on seeing their hairy exploit programs and almost every one of them
|
|||
|
requires the Unix operating system. You realize that when it comes to
|
|||
|
messing with computer networks, Unix is the most powerful operating system
|
|||
|
on the planet. You have developed a burning desire to become one of those
|
|||
|
Unix wizards yourself. Yes, you<6F>re ready for the next step.
|
|||
|
|
|||
|
You<EFBFBD>re ready for a shell account. SHELL ACCOUNT!!!!
|
|||
|
|
|||
|
|
|||
|
*****************************************************
|
|||
|
Newbie note: A shell account allows you to use your home computer as a
|
|||
|
terminal on which you can give commands to a computer running Unix. The
|
|||
|
<EFBFBD>shell<EFBFBD> is the program that translates your keystrokes into Unix commands.
|
|||
|
With the right shell account you can enjoy the use of a far more powerful
|
|||
|
workstation than you could ever dream of affording to own yourself. It also
|
|||
|
is a great stepping stone to the day when you will be running some form of
|
|||
|
Unix on your home computer.
|
|||
|
*****************************************************
|
|||
|
|
|||
|
|
|||
|
Once upon a time the most common way to get on the Internet was through a
|
|||
|
Unix shell account. But nowadays everybody and his brother are on the
|
|||
|
Internet. Almost all these swarms of surfers want just two things: the Web,
|
|||
|
and email. To get the pretty pictures of today<61>s Web, the average Internet
|
|||
|
consumer wants a mere PPP (point to point) connection account. They wouldn<64>t
|
|||
|
know a Unix command if it hit them in the snoot. So nowadays almost the only
|
|||
|
people who want shell accounts are us wannabe hackers.
|
|||
|
|
|||
|
The problem is that you used to be able to simply phone an ISP, say <20>I<EFBFBD>d
|
|||
|
like a shell account,<2C> and they would give it to you just like that. But
|
|||
|
nowadays, especially if you sound like a teenage male, you<6F>ll run into
|
|||
|
something like this:
|
|||
|
|
|||
|
ISP guy: <20>You want a shell account? What for?<3F>
|
|||
|
|
|||
|
Hacker dude: <20>Um, well, I like Unix.<2E>
|
|||
|
|
|||
|
<EFBFBD>Like Unix, huh? You<6F>re a hacker, aren<65>t you!<21> Slam, ISP guy hangs up on you.
|
|||
|
|
|||
|
So how do you get a shell account? Actually, it<69>s possible you may already
|
|||
|
have one and not know it. So first we will answer the question, how do you
|
|||
|
tell whether you may already have a shell account? Then, if you are certain
|
|||
|
you don<6F>t have one, we<77>ll explore the many ways you can get one, no matter
|
|||
|
what, from anywhere in the world.
|
|||
|
|
|||
|
How Do I Know Whether I Already Have a Shell Account?
|
|||
|
|
|||
|
First you need to get a program running that will connect you to a shell
|
|||
|
account. There are two programs with Windows 95 that will do this, as well
|
|||
|
as many other programs, some of which are excellent and free.
|
|||
|
|
|||
|
First we will show you how to use the Win 95 Telnet program because you
|
|||
|
already have it and it will always work. But it<69>s a really limited program,
|
|||
|
so I suggest that you use it only if you can<61>t get the Hyperterminal
|
|||
|
program to work.
|
|||
|
|
|||
|
1) Find your Telnet program and make a shortcut to it on your desktop.
|
|||
|
<EFBFBD> One way is to click Start, then Programs, then Windows Explorer.
|
|||
|
<EFBFBD> When Explorer is running, first resize it so it doesn<73>t cover the entire
|
|||
|
desktop.
|
|||
|
<EFBFBD> Then click Tools, then Find, then <20>Files or Folders.<2E>
|
|||
|
<EFBFBD> Ask it to search for <20>Telnet.<2E>
|
|||
|
<EFBFBD> It will show a file labeled C:\windows\telnet (instead of C:\ it may have
|
|||
|
another drive). Right click on this file.
|
|||
|
<EFBFBD> This will bring up a menu that includes the option <20>create shortcut.<2E>
|
|||
|
Click on <20>create shortcut<75> and then drag the shortcut to the desktop and
|
|||
|
drop it.
|
|||
|
<EFBFBD> Close Windows Explorer.
|
|||
|
|
|||
|
2) Depending on how your system is configured, there are two ways to connect
|
|||
|
to the Internet. The easy way is to skip to step three. But if it fails, go
|
|||
|
back to this step. Start up whatever program you use to access the Internet.
|
|||
|
Once you are connected, minimize the program. Now try step three.
|
|||
|
|
|||
|
3) Bring up your Telnet program by double clicking on the shortcut you just
|
|||
|
made.
|
|||
|
<EFBFBD> First you need to configure Telnet so it actually is usable. On the
|
|||
|
toolbar click <20>terminal,<2C> then <20>preferences,<2C> then <20>fonts.<2E> Choose <20>Courier
|
|||
|
New,<2C> <20>regular<61> and 8 point size. You do this because if you have too big a
|
|||
|
font, the Telnet program is shown on the screen so big that the cursor from
|
|||
|
your shell program can end up being hidden off the screen. OK, OK, you can
|
|||
|
pick other fonts, but make sure that when you close the dialog box that the
|
|||
|
Telnet program window is entirely visible on the screen. Now why would there
|
|||
|
be options that make Telnet impossible to use? Ask Microsoft.
|
|||
|
<EFBFBD> Now go back to the task bar to click Connect, then under it click <20>Remote
|
|||
|
system.<2E> This brings up another dialog box.
|
|||
|
<EFBFBD> Under <20>host name<6D> in this box type in the last two parts of your email
|
|||
|
address. For example, if your email address is jane_doe@boring.ISP.com, type
|
|||
|
<EFBFBD>ISP.com<6F> for host name.
|
|||
|
<EFBFBD> Under <20>port<72> in this box, leave it the way it is, reading <20>telnet.<2E>
|
|||
|
<EFBFBD> Under <20>terminal type,<2C> in this box, choose <20>VT100.<2E>
|
|||
|
<EFBFBD> Then click the Connect button and wait to see what happens.
|
|||
|
<EFBFBD> If the connection fails, try entering the last three parts of your email
|
|||
|
address as the host, in this case <20>boring.ISP.com.<2E>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Now if you have a shell account you should next get a message asking you to
|
|||
|
login. It may look something like this:
|
|||
|
|
|||
|
Welcome to Boring Internet Services, Ltd.
|
|||
|
|
|||
|
Boring.com S9 - login: cmeinel
|
|||
|
Password:
|
|||
|
Linux 2.0.0.
|
|||
|
Last login: Thu Apr 10 14:02:00 on ttyp5 from pm20.kitty.net.
|
|||
|
sleepy:~$
|
|||
|
|
|||
|
If you get something like this you are in definite luck. The important thing
|
|||
|
here, however, is that the computer used the word <20>login<69> to get you
|
|||
|
started. If is asked for anything else, for example <20>logon,<2C> this is not a
|
|||
|
shell account.
|
|||
|
|
|||
|
As soon as you login, in the case of Boring Internet Services you have a
|
|||
|
Unix shell prompt on your screen. But instead of something this simple you
|
|||
|
may get something like:
|
|||
|
|
|||
|
BSDI BSD/OS 2.1 (escape.com) (ttyrf)
|
|||
|
|
|||
|
login: galfina
|
|||
|
Password:
|
|||
|
Last login: Thu Apr 10 16:11:37 from fubar.net
|
|||
|
Copyright 1992, 1993, 1994, 1995 Berkeley Software Design, Inc.
|
|||
|
Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
|
|||
|
The Regents of the University of California. All rights reserved.
|
|||
|
|
|||
|
__________________________________________________________________
|
|||
|
|
|||
|
___________________ ______ ______________
|
|||
|
___ / ___/ ___/ \/ \/ __ / ___/
|
|||
|
_____ / ___/\__ / /__/ / / /___/ ___/
|
|||
|
_______ / / / / / / / / / / / /
|
|||
|
_________ \_____/\_____/\_____/\__/___/\_/ \_____/ .com
|
|||
|
[ ESCAPE.COM ]
|
|||
|
|
|||
|
__________________________________________________________________
|
|||
|
|
|||
|
PLEASE NOTE:
|
|||
|
|
|||
|
Multiple Logins and Simultaneous Dialups From Different Locations Are
|
|||
|
_NOT_ Permitted at Escape Internet Access.
|
|||
|
|
|||
|
__________________________________________________________________
|
|||
|
|
|||
|
Enter your terminal type, RETURN for vt100, ? for list:
|
|||
|
|
|||
|
Setting terminal type to vt100.
|
|||
|
Erase is backspace.
|
|||
|
|
|||
|
|
|||
|
MAIN
|
|||
|
Escape Main Menu
|
|||
|
----[05:45PM]-----------------------------------------------------
|
|||
|
|
|||
|
==> H) HELP Help & Tips for the Escape Interface. (M)
|
|||
|
I) INTERNET Internet Access & Resources (M)
|
|||
|
U) USENETM Usenet Conferences (Internet Distribution) (M)
|
|||
|
L) LTALK Escape Local Communications Center (M)
|
|||
|
B) BULLETINS Information on Escape, Upgrades, coming events. (M)
|
|||
|
M) MAIL Escape World Wide and Local Post Office (M)
|
|||
|
F) HOME Your Home Directory (Where all your files end up)
|
|||
|
C) CONFIG Config your user and system options (M)
|
|||
|
S) SHELL The Shell (Unix Environment) [TCSH]
|
|||
|
X) LOGOUT Leave System
|
|||
|
|
|||
|
BACK MAIN HOME MBOX ITALK LOGOUT
|
|||
|
|
|||
|
----[Mesg: Y]------------[ TAB key toggles menus ]-------[Connected: 0:00]---
|
|||
|
CMD>
|
|||
|
|
|||
|
In this case you aren<65>t in a shell yet, but you can see an option on the
|
|||
|
menu to get to a shell. So hooray, you are in luck, you have a shell
|
|||
|
account. Just enter <20>S<EFBFBD> and you<6F>re in.
|
|||
|
|
|||
|
Now depending on the ISP you try out, there may be all sorts of different
|
|||
|
menus, all designed to keep the user from having to ever stumble across the
|
|||
|
shell itself. But if you have a shell account, you will probably find the
|
|||
|
word <20>shell<6C> somewhere on the menu.
|
|||
|
|
|||
|
If you don<6F>t get something obvious like this, you may have to do the single
|
|||
|
most humiliating thing a wannabe hacker will ever do. Call tech support and
|
|||
|
ask whether you have a shell account and, if so, how to login. It may be
|
|||
|
that they just want to make it really, really hard for you to find your
|
|||
|
shell account.
|
|||
|
|
|||
|
Now personally I don<6F>t care for the Win 95 Telnet program. Fortunately there
|
|||
|
are many other ways to check whether you have a shell account. Here<72>s how to
|
|||
|
use the Hyperterminal program, which, like Telnet, comes free with the
|
|||
|
Windows 95 operating system. This requires a different kind of connection.
|
|||
|
Instead of a PPP connection we will do a simple phone dialup, the same sort
|
|||
|
of connection you use to get on most computer bulletin board systems (BBS).
|
|||
|
|
|||
|
1) First, find the program Hyperteminal and make a shortcut to your desktop.
|
|||
|
This one is easy to find. Just click Start, then Programs, then Accessories.
|
|||
|
You<EFBFBD>ll find Hyperterminal on the accessories menu. Clicking on it will bring
|
|||
|
up a window with a bunch of icons. Click on the one labeled
|
|||
|
<EFBFBD>hyperterminal.exe.<2E>
|
|||
|
|
|||
|
2) This brings up a dialog box called <20>New Connection.<2E> Enter the name of
|
|||
|
your local dialup, then in the next dialog box enter the phone dialup number
|
|||
|
of your ISP.
|
|||
|
|
|||
|
3) Make a shortcut to your desktop.
|
|||
|
|
|||
|
4) Use Hyperterminal to dial your ISP. Note that in this case you are making
|
|||
|
a direct phone call to your shell account rather than trying to reach it
|
|||
|
through a PPP connection.
|
|||
|
|
|||
|
Now when you dial your ISP from Hyperterminal you might get a bunch of
|
|||
|
really weird garbage scrolling down your screen. But don<6F>t give up. What is
|
|||
|
happening is your ISP is trying to set up a PPP connection with
|
|||
|
Hyperterminal. That is the kind of connection you need in order to get
|
|||
|
pretty pictures on the Web. But Hyperterminal doesn<73>t understand PPP.
|
|||
|
Unfortunately I<>ve have not been able to figure out why this happens
|
|||
|
sometimes or how to stop it. But the good side of this picture is that the
|
|||
|
problem may go away the next time you use Hyperterminal to connect to your
|
|||
|
ISP. So if you dial again you may get a login sequence. I<>ve found it often
|
|||
|
helps to wait a few days and try again. Of course you can complain to tech
|
|||
|
support at your ISP. But it is likely that they won<6F>t have a clue on what
|
|||
|
causes their end of things to try to set up a PPP session with your
|
|||
|
Hyperterminal connection. Sigh.
|
|||
|
|
|||
|
But if all goes well, you will be able to log in. In fact, except for the
|
|||
|
PPP attempt problem, I like the Hyperterminal program much better than Win
|
|||
|
95 Telnet. So if you can get this one to work, try it out for awhile. See if
|
|||
|
you like it, too.
|
|||
|
|
|||
|
There are a number of other terminal programs that are really good for
|
|||
|
connecting to your shell account. They include Qmodem, Quarterdeck Internet
|
|||
|
Suite, and Bitcom. Jericho recommends Ewan, a telnet program which also runs
|
|||
|
on Windows 95. Ewan is free, and has many more features than either
|
|||
|
Hyperterminal or Win 95 Telnet. You may download it from jericho<68>s ftp site
|
|||
|
at sekurity.org in the /utils directory.
|
|||
|
|
|||
|
OK, let<65>s say you have logged into your ISP with your favorite program. But
|
|||
|
perhaps it still isn<73>t clear whether you have a shell account. Here<72>s your
|
|||
|
next test. At what you hope is your shell prompt, give the command <20>ls
|
|||
|
-alF.<2E> If you have a real, honest-to-goodness shell account, you should get
|
|||
|
something like this:
|
|||
|
|
|||
|
> ls -alF
|
|||
|
total 87
|
|||
|
drwx--x--x 5 galfina user 1024 Apr 22 21:45 ./
|
|||
|
drwxr-xr-x 380 root wheel 6656 Apr 22 18:15 ../
|
|||
|
-rw-r--r-- 1 galfina user 2793 Apr 22 17:36 .README
|
|||
|
-rw-r--r-- 1 galfina user 635 Apr 22 17:36 .Xmodmap
|
|||
|
-rw-r--r-- 1 galfina user 624 Apr 22 17:36 .Xmodmap.USKBD
|
|||
|
-rw-r--r-- 1 galfina user 808 Apr 22 17:36 .Xresources
|
|||
|
drwx--x--x 2 galfina user 512 Apr 22 17:36 www/
|
|||
|
etc.
|
|||
|
|
|||
|
This is the listing of the files and directories of your home directory.
|
|||
|
Your shell account may give you a different set of directories and files
|
|||
|
than this (which is only a partial listing). In any case, if you see
|
|||
|
anything that looks even a little bit like this, congratulations, you
|
|||
|
already have a shell account!
|
|||
|
|
|||
|
*******************************************************
|
|||
|
Newbie note: The first item in that bunch of dashes and letters in front of
|
|||
|
the file name tells you what kind of file it is. <20>d<EFBFBD> means it is a
|
|||
|
directory, and <20>-<2D> means it is a file. The rest are the permissions your
|
|||
|
files have. <20>r<EFBFBD> = read permission, <20>w<EFBFBD> = write permission, and <20>x<EFBFBD> = execute
|
|||
|
permission (no, <20>execute<74> has nothing to do with murdering files, it means
|
|||
|
you have permission to run the program that is in this file). If there is a
|
|||
|
dash, it means there is no permission there.
|
|||
|
|
|||
|
The symbols in the second, third and fourth place from the left are the
|
|||
|
permissions that you have as a user, the following three are the permissions
|
|||
|
everyone in your designated group has, and the final three are the
|
|||
|
permissions anyone and everyone may have. For example, in galfina<6E>s
|
|||
|
directory the subdirectory <20>www/<2F> is something you may read, write and
|
|||
|
execute, while everyone else may only execute. This is the directory where
|
|||
|
you can put your Web page. The entire world may browse (<28>execute<74>) your Web
|
|||
|
page. But only you can read and write to it.
|
|||
|
|
|||
|
If you were to someday discover your permissions looking like:
|
|||
|
|
|||
|
drwx--xrwx newbie user 512 Apr 22 17:36 www/
|
|||
|
|
|||
|
Whoa, that <20>r<EFBFBD> in the third place from last would mean anyone can hack your
|
|||
|
Web page!
|
|||
|
******************************************************
|
|||
|
|
|||
|
Another command that will tell you whether you have a shell account is
|
|||
|
<EFBFBD>man.<2E> This gives you an online Unix manual. Usually you have to give the
|
|||
|
man command in the form of <20>man <command><3E> where <command> is the name of
|
|||
|
the Unix command you want to study. For example, if you want to know all
|
|||
|
the different ways to use the <20>ls<6C> command, type <20>man ls<6C> at the prompt.
|
|||
|
|
|||
|
On the other hand, here is an example of something that, even though it is
|
|||
|
on a Unix system, is not a shell account:
|
|||
|
|
|||
|
BSDI BSD/386 1.1 (dub-gw-2.compuserve.com) (ttyp7)
|
|||
|
|
|||
|
Connected to CompuServe
|
|||
|
|
|||
|
Host Name: cis
|
|||
|
|
|||
|
Enter choice (LOGON, HELP, OFF):
|
|||
|
|
|||
|
The immediate tip-off that this is not a shell account is that it asks you
|
|||
|
to <20>logon<6F> instead of <20>login:<3A>
|
|||
|
|
|||
|
|
|||
|
How to Get a Shell Account
|
|||
|
|
|||
|
|
|||
|
What if you are certain that you don<6F>t already have a shell account? How do
|
|||
|
you find an ISP that will give you one?
|
|||
|
|
|||
|
The obvious place to start is your phone book. Unless you live in a really
|
|||
|
rural area or in a country where there are few ISPs, there should be a
|
|||
|
number of companies to choose from.
|
|||
|
|
|||
|
So here<72>s your problem. You phone Boring ISP, Inc. and say, <20>I<EFBFBD>d like a
|
|||
|
shell account.<2E> But Joe Dummy on the other end of the phone says, <20>Shell?
|
|||
|
What<EFBFBD>s a shell account?<3F> You say <20>I want a shell account. SHELL ACCOUNT!!!<21>
|
|||
|
He says, <20>Duh?<3F> You say <20>Shell account. SHELL ACCOUNT!!!<21> He says, <20>Um, er,
|
|||
|
let me talk to my supervisor.<2E> Mr. Uptight Supervisor gets on the phone. <20>We
|
|||
|
don<EFBFBD>t give out shell accounts, you dirty &%$*# hacker.<2E>
|
|||
|
|
|||
|
Or, worse yet, they claim the Internet access account they are giving you a
|
|||
|
shell account but you discover it isn<73>t one.
|
|||
|
|
|||
|
To avoid this embarrassing scene, avoid calling big name ISPs. I can
|
|||
|
guarantee you, America Online, Compuserve and Microsoft Network don<6F>t give
|
|||
|
out shell accounts.
|
|||
|
|
|||
|
What you want to find is the seediest, tiniest ISP in town. The one that
|
|||
|
specializes in pasty-faced customers who stay up all night playing MOOs and
|
|||
|
MUDs. Guys who impersonate grrrls on IRC. Now that is not to say that MUD
|
|||
|
and IRC people are typically hackers. But these definitely are your serious
|
|||
|
Internet addicts. An ISP that caters to people like that probably also
|
|||
|
understands the kind of person who wants to learn Unix inside and out.
|
|||
|
|
|||
|
So you phone or email one of these ISPs on the back roads of the Net and
|
|||
|
say, <20>Greetings, d00d! I am an evil haxor and demand a shell account pronto!<21>
|
|||
|
|
|||
|
No, no, no! Chances are you got the owner of this tiny ISP on the other end
|
|||
|
of the line. He<48>s probably a hacker himself. Guess what? He loves to hack
|
|||
|
but he doesn<73>t want hackers (or wannabe hackers) for customers. He doesn<73>t
|
|||
|
want a customer who<68>s going to be attracting email bombers and waging hacker
|
|||
|
war and drawing complaints from the sysadmins on whom this deadly dude has
|
|||
|
been testing exploit code.
|
|||
|
|
|||
|
So what you do is say something like <20>Say, do you offer shell accounts? I
|
|||
|
really, really like to browse the Web with lynx. I hate waiting five hours
|
|||
|
for all those pretty pictures and Java applets to load. And I like to do
|
|||
|
email with Pine. For newsgroups, I luuuv tin!<21>
|
|||
|
|
|||
|
Start out like this and the owner of this tiny ISP may say something like,
|
|||
|
<EFBFBD>Wow, dude, I know what you mean. IE and Netscape really s***! Lynx uber
|
|||
|
alles! What user name would you like?<3F>
|
|||
|
|
|||
|
At this point, ask the owner for a guest account. As you will learn below,
|
|||
|
some shell accounts are so restricted that they are almost worthless.
|
|||
|
|
|||
|
But let<65>s say you can<61>t find any ISP within reach of a local phone call that
|
|||
|
will give you a shell account. Or the only shell account you can get is
|
|||
|
worthless. Or you are well known as a malicious hacker and you<6F>ve been
|
|||
|
kicked off every ISP in town. What can you do?
|
|||
|
|
|||
|
Your best option is to get an account on some distant ISP, perhaps even in
|
|||
|
another country. Also, the few medium size ISPs that offer shell accounts
|
|||
|
(for example, Netcom) may even have a local dialup number for you. But if
|
|||
|
they don<6F>t have local dialups, you can still access a shell account located
|
|||
|
*anywhere* in the world by setting up a PPP connection with your local
|
|||
|
dialup ISP, and then accessing your shell account using a telnet program on
|
|||
|
your home computer.
|
|||
|
|
|||
|
*************************************************
|
|||
|
Evil Genius Tip: Sure, you can telnet into your shell account from another
|
|||
|
ISP account. But unless you have software that allows you to send your
|
|||
|
password in an encrypted form, someone may sniff your password and break
|
|||
|
into your account. If you get to be well known in the hacker world, lots of
|
|||
|
other hackers will constantly be making fun of you by sniffing your
|
|||
|
password. Unfortunately, almost all shell accounts are set up so you must
|
|||
|
expose your password to anyone who has hidden a sniffer anywhere between the
|
|||
|
ISP that provides your PPP connection and your shell account ISP.
|
|||
|
|
|||
|
One solution is to insist on a shell account provider that runs ssh (secure
|
|||
|
shell).
|
|||
|
**************************************************
|
|||
|
|
|||
|
So where can you find these ISPs that will give you shell accounts? One good
|
|||
|
source is http://www.celestin.com/pocia/. It provides links to Internet
|
|||
|
Service Providers categorized by geographic region. They even have links to
|
|||
|
allow you to sign up with ISPs serving the Lesser Antilles!
|
|||
|
|
|||
|
***********************************************
|
|||
|
Evil Genius tip: Computer criminals and malicious hackers will often get a
|
|||
|
guest account on a distant ISP and do their dirty work during the few hours
|
|||
|
this guest account is available to them. Since this practice provides the
|
|||
|
opportunity to cause so much harm, eventually it may become really hard to
|
|||
|
get a test run on a guest account.
|
|||
|
***********************************************
|
|||
|
|
|||
|
But if you want to find a good shell account the hacker way, here<72>s what you
|
|||
|
do. Start with a list of your favorite hacker Web sites. For example, let<65>s
|
|||
|
try http://ra.nilenet.com/~mjl/hacks/codez.htm.
|
|||
|
|
|||
|
You take the beginning part of the URL (Universal Resource Locator) as your
|
|||
|
starting point. In this case it is <20>http://ra.nilenet.com.<2E> Try surfing to
|
|||
|
that URL. In many cases it will be the home page for that ISP. It should
|
|||
|
have instructions for how to sign up for a shell account. In the case of
|
|||
|
Nile Net we strike hacker gold:
|
|||
|
|
|||
|
Dial-up Accounts and Pricing
|
|||
|
|
|||
|
NEXUS Accounts
|
|||
|
|
|||
|
NEXUS Accounts include: Access to a UNIX Shell, full
|
|||
|
Internet access, Usenet newsgroups, 5mb of FTP and/or
|
|||
|
WWW storage space, and unlimited time.
|
|||
|
One Time Activation Fee: $20.00
|
|||
|
Monthly Service Fee: $19.95 or
|
|||
|
Yearly Service Fee: $199.95
|
|||
|
|
|||
|
Plus which they make a big deal over freedom of online speech. And they host
|
|||
|
a great hacker page full of these Guides to (mostly) Harmless Hacking!
|
|||
|
|
|||
|
How to Login to Your Shell Account
|
|||
|
|
|||
|
Now we assume you finally have a guest shell account and are ready to test
|
|||
|
drive it. So now we need to figure out how to login. Now all you hacker
|
|||
|
geniuses reading this, why don<6F>t you just forget to flame me for telling
|
|||
|
people how to do something as simple as how to login. Please remember that
|
|||
|
everyone has a first login. If you have never used Unix, this first time can
|
|||
|
be intimidating. In any case, if you are a Unix genius you have no business
|
|||
|
reading this Beginners<72> Guide. So if you are snooping around here looking
|
|||
|
for flamebait, send your flames to /dev/null.
|
|||
|
|
|||
|
***********************************************************
|
|||
|
Newbie note: <20>Flames<65> are insulting, obnoxious rantings and ravings done by
|
|||
|
people who are severely lacking in social skills and are a bunch of &$%@#!!
|
|||
|
but who think they are brilliant computer savants. For example, this newbie
|
|||
|
note is my flame against &$%@#!! flamers.
|
|||
|
<20>/dev/null<6C> stands for <20>device null.<2E> It is a file name in a Unix operating
|
|||
|
system. Any data that is sent to /dev/null is discarded. So when someone
|
|||
|
says they will put something in <20>/dev/null<6C> that means they are sending it
|
|||
|
into permanent oblivion.
|
|||
|
***********************************************************
|
|||
|
|
|||
|
The first thing you need to know in order to get into your shell account is
|
|||
|
your user name and password. You need to get that information from the ISP
|
|||
|
that has just signed you up. The second thing you need to remember is that
|
|||
|
Unix is <20>case sensitive.<2E> That means if your login name is <20>JoeSchmoe<6F> the
|
|||
|
shell will think <20>joeschmoe<6F> is a different person than <20>JoeSchmoe<6F> or
|
|||
|
<EFBFBD>JOESCHMOE.<2E>
|
|||
|
|
|||
|
OK, so you have just connected to your shell account for the first time. You
|
|||
|
may see all sorts of different stuff on that first screen. But the one thing
|
|||
|
you will always see is the prompt:
|
|||
|
|
|||
|
login:
|
|||
|
|
|||
|
Here you will type in your user name.
|
|||
|
|
|||
|
In response you will always be asked :
|
|||
|
|
|||
|
Password:
|
|||
|
|
|||
|
Here you type in your password.
|
|||
|
|
|||
|
After this you will get some sort of a prompt. It may be a simple as:
|
|||
|
|
|||
|
%
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
$
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
>
|
|||
|
|
|||
|
Or as complicated as:
|
|||
|
|
|||
|
sleepy:~$
|
|||
|
|
|||
|
Or it may even be some sort of complicated menu where you have to choose a
|
|||
|
<EFBFBD>shell<EFBFBD> option before you get to the shell prompt.
|
|||
|
|
|||
|
Or it may be a simple as:
|
|||
|
|
|||
|
#
|
|||
|
|
|||
|
**********************************************************
|
|||
|
Newbie note: The prompt <20>#<23> usually means you have the superuser powers of
|
|||
|
a <20>root<6F> account. The Unix superuser has the power to do *anything* to the
|
|||
|
computer. But you won<6F>t see this prompt unless either the systems
|
|||
|
administrator has been really careless -- or someone is playing a joke on
|
|||
|
you. Sometimes a hacker thinks he or she has broken into the superuser
|
|||
|
account because of seeing the <20>#<23> prompt. But sometimes this is just a trick
|
|||
|
the sysadmin is playing. So the hacker goes playing around in what he or she
|
|||
|
thinks is the root account while the sysadmin and his friends and the police
|
|||
|
are all laughing at the hacker.
|
|||
|
**********************************************************
|
|||
|
|
|||
|
Ready to star
|