219 lines
11 KiB
Plaintext
219 lines
11 KiB
Plaintext
|
________________________
|
|||
|
// Creating Unix Accounts \
|
|||
|
\\ by the Kryptic Night /
|
|||
|
// and the \
|
|||
|
\\ Servants of the /
|
|||
|
// Mushroom Cloud \
|
|||
|
\\________________________/
|
|||
|
\<5C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
So, you've hacked the *ROOT* account on some unix system?
|
|||
|
You have the full power of the unix system at your hands, and you
|
|||
|
want to keep it that way for a long time? Using the root account
|
|||
|
is not the way to do this! This short little file will describe
|
|||
|
a way that will allow you to keep your access for as long as possible.
|
|||
|
|
|||
|
<Note: This method works best on systems with a lot of users... A
|
|||
|
college computer is an excellent example. >
|
|||
|
|
|||
|
---------------------------------------------------------------------------
|
|||
|
|
|||
|
- - - Creating Unix Accounts - - -
|
|||
|
First, you need to logon to the Unix system as the root account.
|
|||
|
You should be confronted with a '#' or a '&', depending on which
|
|||
|
software the system is run on, and which shell it is under. Don't worry
|
|||
|
if it isn't one of these, many sysops like to create their own prompts.
|
|||
|
I've seen some as stupid as 'Hi! Steve! >' to 'Don't forget to backup! >'.
|
|||
|
|
|||
|
Set up your settings and check your security, you don't want to be
|
|||
|
interrupted by some moronic buffoon who is logged on at the same time as
|
|||
|
you...especially if it's the root's other account. To see if someone else
|
|||
|
is online, type 'who'. You will be assaulted by a list of users who are
|
|||
|
currently on the system at the same time as you. You should do a 'finger'
|
|||
|
to everyone of the users on their, looking for anything suspicious.
|
|||
|
If it tells you that he is the root, or sysop, you will want to call back
|
|||
|
later. Also, if it is convenient, change your settings to allow for
|
|||
|
backspaces, aliasing, etc.
|
|||
|
|
|||
|
Next, you should create your home directory. A home directory is the
|
|||
|
location of all your login scripts, your files, and the directory that is
|
|||
|
loaded upon login. This should be located in the same directory as all the
|
|||
|
legitimate users. If you see a directory with a multitude of names in it,
|
|||
|
odds are it's the user directory. Most often, it is the /usr or /user
|
|||
|
directory. From that directory type. . .
|
|||
|
|
|||
|
#mkdir XXXXX ; Don't type the '#', the XXXX is the name
|
|||
|
; of the user's home directory. This can
|
|||
|
; be anything you like, however, try for
|
|||
|
; something unsuspicious...a directory like
|
|||
|
; /usr/flaming_fag will catch attention
|
|||
|
|
|||
|
|
|||
|
Ok, we got that over with painlessly. Your next step is to go to the
|
|||
|
/etc directory.... A simple 'cd /etc' will do. If you do a ls -l, you will
|
|||
|
see a file called 'passwd' this is the password file, it is the only one on
|
|||
|
the system that is used. If you 'cat passwd' the file, you will see all
|
|||
|
the users able to log on. Here is an example of what a user may look like...
|
|||
|
|
|||
|
Bendover:iaKJhHkjahfuH:0:0:Asshole:/user/bend:/bin/csh
|
|||
|
\______/ \___________/\/\/\_______/\________/ \______/
|
|||
|
1 2 3 4 5 6 7
|
|||
|
|
|||
|
|
|||
|
1 - This is the name of the account used to logon.
|
|||
|
2 - This is the encrypted password. If you see something like....
|
|||
|
Bendover::0:0: <and so forth> it means that this is an account
|
|||
|
that doesn't require a password to logon. Most systems have one
|
|||
|
or two of these for things like netting, maintenance, and guest
|
|||
|
accounts.
|
|||
|
3 - This is the users level. A level of 0 is a superuser.
|
|||
|
4 - This is the number of the group the user is in.
|
|||
|
5 - This is a short description of the account. This is usually a full
|
|||
|
name or a position.
|
|||
|
6 - This tells where the home directory is located.
|
|||
|
7 - This is the default shell to use upon logon.
|
|||
|
csh - C Shell; sh - Bourne Shell; ksh - Korn Shell
|
|||
|
rsh - Restricted Bourne Shell
|
|||
|
|
|||
|
|
|||
|
To add a user to the password file, providing you have write access,
|
|||
|
you can do several things. The one I will explore is called redirection.
|
|||
|
With this method, you can add a new line to the file from the prompt.
|
|||
|
To do this you will need to type . . .
|
|||
|
|
|||
|
#echo XXXXXX::0:0:XXXXX:/XXXX/XXXX:/bin/XXX >>passwd
|
|||
|
|
|||
|
You will need to fill in the X's with appropriate information, an example
|
|||
|
I've used in the past is....
|
|||
|
|
|||
|
#echo mikeb::0:0:michael boyd:/usr1/mikeb:/bin/csh >>passwd
|
|||
|
|
|||
|
You may choose to use a different group number, it may catch the sysops
|
|||
|
attention more if he sees two 0's, versus just one. I've never done this,
|
|||
|
but it really shouldn't make a tremendous difference.
|
|||
|
|
|||
|
By now you should, if all went well, you should have another user!
|
|||
|
Just to verify your work, 'cat' the password file and look for your
|
|||
|
name at the bottom of the list. If it isn't their, try again. Make
|
|||
|
SURE you use TWO '>'s, or else you will destroy the passwd file...This
|
|||
|
is NOT good.
|
|||
|
|
|||
|
If everything worked out, logout. Try not to hang up, as this sometimes
|
|||
|
hangs the terminal you were logged on as. This may be a bit dangerous if
|
|||
|
the terminal connects to the next person who calls, dropping them into the
|
|||
|
root accounts shell. Call back in about a minute or so, and logon as the
|
|||
|
user you just created. It shouldn't ask for a 'password:' as you specified
|
|||
|
none. If
|
|||
|
|
|||
|
it does, then you probably typed in the name in different caps
|
|||
|
than you typed it into the password file. Remember, caps DO matter.
|
|||
|
|
|||
|
Assuming that you were able to log on, you will now be using your NEW
|
|||
|
account. That's about all that is really necessary. You will want to create
|
|||
|
your .login, and your .cshrc files eventually. But for now, you can just copy
|
|||
|
them from another user. Use a 'ls -al' in another users home directory to see
|
|||
|
if he has a copy of these files. If he does, copy them by
|
|||
|
|
|||
|
'cp .login <or .cshrc> /XXX/XXXX/.login <or .cshrc>'
|
|||
|
|
|||
|
The X's specify your home directory.
|
|||
|
|
|||
|
|
|||
|
- - - Conclusion - - -
|
|||
|
|
|||
|
This file is obviously slated for the person who is just beginning to learn
|
|||
|
Unix, although it is unlikely that a person who can attain a root account is
|
|||
|
ignorant of unix, it is easier for EVERYONE to understand like it is. If this
|
|||
|
file insults your intelligence, that's your problem. I've seen several people
|
|||
|
who have root accounts, know unix fairly well, and still cannot create users.
|
|||
|
I've tried to include as much information as I can, but I may have overlooked
|
|||
|
something that I think is simple, but may confound you. If I do, tell me, and
|
|||
|
I'll try to keep away from it in future releases. I'll also consider updating
|
|||
|
this file and re-releasing it.
|
|||
|
|
|||
|
-----------------------------------------------------------------------------
|
|||
|
|
|||
|
- - - Bibliography and Suggested Reading - - -
|
|||
|
|
|||
|
Unix Use and Security From the Ground Up: by the Prophet in 1986
|
|||
|
This is probably the BEST file I've ever seen on the subject
|
|||
|
of Unix. It is written for the beginner, and contains valuable
|
|||
|
information for the advanced user. The Prophet became a member
|
|||
|
of Lod/H and is currently serving a sentence of 20 months in
|
|||
|
relation to the big Lod/H bust of '90.
|
|||
|
|
|||
|
Articles on unix trojans and mischief: by Shooting Shark
|
|||
|
Shooting Shark presents some interesting information
|
|||
|
on various ways to commit havoc on Unix systems. You
|
|||
|
can find most of his essays in both Phrack and Lod
|
|||
|
magazines.
|
|||
|
|
|||
|
Lod/H Tech Journals
|
|||
|
The Legion of Doom/Hackers are perhaps the most skilled
|
|||
|
and knowledgable hackers in the underground society.
|
|||
|
Their 'Tech Journals' describe almost anything you'd ever
|
|||
|
want to know about illegal activities.
|
|||
|
|
|||
|
Phrack Magazines
|
|||
|
Phrack is also one of the best sources for information on
|
|||
|
a multitude of subjects, ranging from social engineering,
|
|||
|
to carding, to making explosives. For those with free time,
|
|||
|
download all of the 32 articles released to date.
|
|||
|
|
|||
|
----------------------------------------------------------------------------
|
|||
|
|
|||
|
Thanx go out to Emerikol the Chaotic <Scooter> for the idea of making this
|
|||
|
file, SiD for their quality releases, every SMC member, and all else who
|
|||
|
contribute to the free exchange of information in fascist Amerikkka.
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
| \
|
|||
|
| /\/\ / <20>\ <20><><EFBFBD>
|
|||
|
| / \ / <20> \ A <20> A
|
|||
|
| / |/| / / \ <20> / <20> /
|
|||
|
|/ | < \ <20>/ <20>/ U L T
|
|||
|
|\ RYPTIC / | \ \ / <20>\
|
|||
|
| \ / | \ <20> \
|
|||
|
|\ | | \
|
|||
|
| \ |
|
|||
|
| \|IGHT
|
|||
|
/ `
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Kryptic Night, Data Kult, Lord Logics, Shadow Walker, The Scorpian -
|
|||
|
Nacht Habicht
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
|||
|
|
|||
|
Another file downloaded from: NIRVANAnet(tm)
|
|||
|
|
|||
|
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
|
|||
|
Salted Slug Systems Strange 408-454-9368
|
|||
|
Burn This Flag Zardoz 408-363-9766
|
|||
|
realitycheck Poindexter Fortran 415-567-7043
|
|||
|
Lies Unlimited Mick Freen 415-583-4102
|
|||
|
Tomorrow's 0rder of Magnitude Finger_Man 408-961-9315
|
|||
|
My Dog Bit Jesus Suzanne D'Fault 510-658-8078
|
|||
|
|
|||
|
Specializing in conversations, obscure information, high explosives,
|
|||
|
arcane knowledge, political extremism, diversive sexuality,
|
|||
|
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
|
|||
|
|
|||
|
Full access for first-time callers. We don't want to know who you are,
|
|||
|
where you live, or what your phone number is. We are not Big Brother.
|
|||
|
|
|||
|
"Raw Data for Raw Nerves"
|
|||
|
|
|||
|
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|