238 lines
11 KiB
Plaintext
238 lines
11 KiB
Plaintext
|
UNIXSYSV.HAK
|
||
|
|
||
|
|
||
|
UNIXSYSV.HAK - File on hacking Unix System V's
|
||
|
|
||
|
|
||
|
|
||
|
From THE HACKER'S GUIDE TO W.S.U. comes
|
||
|
the ultimate in weekend entertainment
|
||
|
|
||
|
|
||
|
|
||
|
------------
|
||
|
How to Hack UNIX System V
|
||
|
-------------------------
|
||
|
includes the INTRODUCTION TO HACKING
|
||
|
and HOW TO NOT GET CAUGHT
|
||
|
-------------------------
|
||
|
------------
|
||
|
|
||
|
|
||
|
|
||
|
Last Revision: 1-18-89
|
||
|
Version: 2.0
|
||
|
|
||
|
|
||
|
|
||
|
INTRODUCTION TO HACKING
|
||
|
=======================
|
||
|
Hacking is the art of attempting everything until something finally works.
|
||
|
The average hacker is usually only armed with educated guesses. Why hack?
|
||
|
Generally, you have some reason. My favorite reason being that it's fun. But
|
||
|
these days are getting pretty suspicious and you have to watch yourself when
|
||
|
hacking even if you don't have malicious intents. Hacking is lots of work and
|
||
|
is also dangerous. So be careful and don't get caught!
|
||
|
|
||
|
HOW TO NOT GET CAUGHT
|
||
|
=====================
|
||
|
Okay great, how do I avoid getting caught? That depends on what you are
|
||
|
doing. In this file I will be discussing UNIX System V and therefore my
|
||
|
suggestions should only be taken as pertaining to that. Even if you follow
|
||
|
my suggestions, you can still get caught. Some operators are extremely
|
||
|
persistant and will stop at nothing to nail you. If modems start answering
|
||
|
when you pick up a phone, or you become known as the "human carrier" by your
|
||
|
friends, then I suggest you lay low for awhile.
|
||
|
Here are some obvious things to be aware of when you are hacking by modem,
|
||
|
I thought I'd include them in case you overlook them. You should always be
|
||
|
on the lookout for these types of suspicious activity.
|
||
|
1] Excessive line noise in an area that usually has none.
|
||
|
2] You hear other voices simultaneously on the phone line.
|
||
|
This occasionally happens normally with the old analog FDM
|
||
|
multiplex equipment. But it also can be caused by a wire tap,
|
||
|
so try to be careful here! * See the note on wire taps.
|
||
|
3] Any van or minivan parked next to:
|
||
|
a] A telephone pole.
|
||
|
b] An underground steam vent hole.
|
||
|
c] Also watch for cloth tee-pees with MA BELL symbols on them
|
||
|
near poles or steam vents.
|
||
|
This is a *DEAD GIVAWAY*!!! If you see this, cease all hacking
|
||
|
for at least a month! (An make sure that the vans are GONE,
|
||
|
--NOT-- just moved to another location!)
|
||
|
>> Check for wires going to the van from the pole, or vent. And
|
||
|
check to see if the van is white (FBI uses these alot) or a
|
||
|
phone co. van.
|
||
|
4] Watch the abandoned rooms in your building, if they suddenly have
|
||
|
lots of equipment in them, take note here!
|
||
|
5] Anything unusual about the way your phone service operates that
|
||
|
the neighbors don't seem to have going on!
|
||
|
That's all I can come up with right now. But I'm sure there are more.
|
||
|
|
||
|
WIRE TAPS
|
||
|
=========
|
||
|
Belive it or not, this is still one of the most commonly used methods
|
||
|
of nabbing a hacker. The above list is a good guide to detecting an active
|
||
|
wire tap. If you can afford the equipment, you can do what is know as a
|
||
|
"sweep" of the phone line every now and then. Another thing you can do is
|
||
|
build a device which monitors the phone line voltage. If the voltage suddenly
|
||
|
drops during use, you either have a wire tap or someone picked up an extension.
|
||
|
Here are some specs for monitoring line voltage:
|
||
|
Ringer voltage:90V at 20-30Hz
|
||
|
On-Line:30-50V
|
||
|
Clear voltage:600V (Watch out! This will toast any MOV you have
|
||
|
in your modem! Usually this is used to fuse noisy
|
||
|
phone lines shut.)
|
||
|
The average cops don't have the equipment to properly implement a wire tap,
|
||
|
much less a data tap. However, I have heard of data cops in Seattle and
|
||
|
Chicago.
|
||
|
|
||
|
TRACING PHONE CALLS
|
||
|
===================
|
||
|
Here is yet another way you can get your butt caught. It is getting
|
||
|
easier and easier for the average person to trace phone calls. I just
|
||
|
found out a few days ago that dialing 33 on an on-campus phone will trace
|
||
|
the last call to that phone. Rest assured that an operator will use this
|
||
|
to nab you if he can. This however, only affects remote dial-ups, and not
|
||
|
the on-campus links. Remote dial-ups used to be so safe, but no more...
|
||
|
-- more --A good place to hack from is a nearby terminal room. *NOT* in the same
|
||
|
building that you live in! Do it at night, so if there is a system operator
|
||
|
at all on duty late he will probably be sleeping.
|
||
|
|
||
|
RFI READING
|
||
|
===========
|
||
|
This is a fairly new method of catching hackers, and I really don't think
|
||
|
the average hacker has much to worry from it. It is too complex to implement
|
||
|
and doesn't even work most of the time. Especially if you're in an area that
|
||
|
has lots of TV's or computer monitors. The device used basicly reads the
|
||
|
faint radio frequencies created by your monitor and translates them back into
|
||
|
a video signal. When it actually does work the guy running it can see exactly
|
||
|
what you are seeing on your monitor. Pretty tricky, but he has to be able to
|
||
|
pick out your signal first.
|
||
|
|
||
|
ESS -- IT'S BAD
|
||
|
===============
|
||
|
Alright boys and girls, on top of everything else in the world we now are
|
||
|
bless with the wonders of Electronic Standardized Switching. Or otherwise
|
||
|
known as ESS. Remember that sharp increase in your phone bill about a year
|
||
|
ago? "It's a new computerized system designed to allow quicker routing of
|
||
|
your calls". Bullshit. It sole purpose is to catch phreakers. That's all
|
||
|
it does, and it does it well. With this, the phone co. can trace a call in
|
||
|
-- more --.55 seconds to anywhere. It keeps records on all calls, including local!
|
||
|
And just about every phone box in the books will not only refuse to work,
|
||
|
ESS will notify the cops when you try to use it!
|
||
|
Have some faith. ESS is not exactly the end of the world either. Like
|
||
|
every system ever come up with, people will hack it. And eventually it will
|
||
|
be just as easy to hack ESS as it was to do on the old phone system.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++
|
||
|
Okay! Enough beginner's stuff!
|
||
|
Onward to hacking UNIX System V !
|
||
|
+++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
Not much here: I just started this paper, and am still looking for
|
||
|
anything I can add to it!
|
||
|
Remember: The operator can see what you are doing at all times! But
|
||
|
usually they don't care or the information scrolls by so
|
||
|
fast they don't have time to read it.
|
||
|
Note: If you flub up your password or try to access secured files, the
|
||
|
system will automaticly record everything that you do! And on
|
||
|
some systems, the system will record everything you do anyway!
|
||
|
|
||
|
|
||
|
HOW TO LOG ON UNDER ANOTHER USER'S NAME
|
||
|
=======================================
|
||
|
This is the heart of hacking a UNIX system. You don't want to do any
|
||
|
hacking under any ID that can be associated with you. And you don't want
|
||
|
to use another user's ID more than once if at all possible.
|
||
|
|
||
|
There really is no way to get a name and password without first having
|
||
|
some level of access to the system. How do I get in then? I rely on the
|
||
|
fact that our GANDALF data switch is extremely unstable. 1 out of 5 logins
|
||
|
will drop you under someone else's name *NO QUESTIONS ASKED*. Just change
|
||
|
parity (8N1 to E71) alot while GANDALF is loading UNIX. Eventually, you
|
||
|
will get in this way. This happens because a user hung up on the phone
|
||
|
line without loggig off! So be sure to log yourself off the system when
|
||
|
you finish with *ANY* work.
|
||
|
|
||
|
They saw. A couple of days ago I was doing this and somehow I was
|
||
|
logged off of the system. The words "LOGOFF" just appeared on my command
|
||
|
prompt and entered themselfs. I suspect the guy whose number I used was in
|
||
|
-- more --the terminal room monitored by a superuser. And he just told the SU that
|
||
|
there appeared to be two of him. (Probably used the WHO command).
|
||
|
|
||
|
THE LOCK OUT
|
||
|
============
|
||
|
Believe it or not, UNIX will actually allow you to lock out other
|
||
|
users from the system. First, you select a target person. Then you place
|
||
|
the file VI.LOGIN in their default directory (the one that UNIX automaticly
|
||
|
loads them into when they log onto the system). You set up VI.LOGIN like
|
||
|
this:
|
||
|
|
||
|
VI.LOGIN (Just the file name!)
|
||
|
logout
|
||
|
|
||
|
So VI.LOGIN only contains one command. VI.LOGIN is automaticly executed
|
||
|
when a person logs onto the system. So as soon as your pigeon gets onto the
|
||
|
system he immeadiatly gets logged off!
|
||
|
|
||
|
Suggested Uses: On a Prof a few days before your assignment is due.
|
||
|
Someone you really don't like (wait a few weeks so they
|
||
|
don't figure it out right away!)
|
||
|
It might work on the ROOT (The SuperUser's name)
|
||
|
|
||
|
GETTING NEW NAMES
|
||
|
=================
|
||
|
Here is yet another way to gather SEVERAL users names AND PASSWORDS.
|
||
|
First, (the hard part) wait until the beginning of a semester. Now,
|
||
|
somehow you have to get a list of the ID numbers for students in UNIX-
|
||
|
oriented classes. You can usually find one of these lists posted outside
|
||
|
a professor's office (try the computer science building) or one of many
|
||
|
other places. Anyways, you have a list of student ID numbers.
|
||
|
|
||
|
Now, preferably on the first day of class, start logging in as a few
|
||
|
(maybe 3-4) students. I prefer to use ID's from low-level (100's) classes
|
||
|
as the students will just think that they've screwed up. Log into the
|
||
|
system, and if the student hasn't been on the system before, you will
|
||
|
be prompted for a password! And viola! You not only have access but also
|
||
|
you have the password of your choice. This happens because the computing
|
||
|
faculty is too lazy to pass out customized passwords to thier students.
|
||
|
New students are expected to select their own passwords, but that means
|
||
|
that the system won't be able to tell who is who!
|
||
|
|
||
|
Suggested Uses: Most likely your access won't stay good for more than
|
||
|
a few days. You might want to take full advantage of it
|
||
|
and really cause some havoc. For one thing, you could
|
||
|
lock out an entire computer class! (See LOCK OUT
|
||
|
described above). If you're really good, and can crack
|
||
|
the coded passwords in the PASSWRDS file, then you can
|
||
|
get the Super-User (SU) password and have all the fun
|
||
|
you want!
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
=========
|
||
|
THE END
|
||
|
=========
|
||
|
|
||
|
And Remember!
|
||
|
This paper was provided for educational purposes only!
|
||
|
|
||
|
Special thanks to:
|
||
|
==================
|
||
|
The Mad Phone-Man
|
||
|
The Grey Sorcerer
|
||
|
The Sneak Thief
|
||
|
Harry Hackalot
|
||
|
|
||
|
|
||
|
|
||
|
|