319 lines
11 KiB
Plaintext
319 lines
11 KiB
Plaintext
-= Hacking Control Data Corporation's Cyber =-
|
|
|
|
This article will cover getting into and using NOS (Networking
|
|
Operating System) version 2.5.2 running on a Cyber 730 computer. Cybers
|
|
generally run this operating system so I will just refer to this environ-
|
|
ment as Cyber. Also, Cyber is a slow and outdated operating system that
|
|
is primarily used only for college campuses for running compilers. First
|
|
off after you have scanned a bunch of carriers you will need to know how
|
|
Cyber identifies itself. It goes like this:
|
|
WeLCOME TO THE NOS SOFTWARE SYSTEM.
|
|
COPYRIGHT CONTROL DATA 1978, 1987.
|
|
88/02/16. 02.36.53. N265100
|
|
CSUS CYBER 170-730. NOS 2.5.2-678/3.
|
|
FAMILY:
|
|
You would normally just hit return at the family prompt. Next prompt is:
|
|
USER NAME:
|
|
Usernames are in the format abcdxxx where a is the location of where
|
|
the account is being used from (A-Z). the b is a grouping specifying
|
|
privs and limits for the account- usually A-G -where A is the lowest
|
|
access. Some examples of how they would be used in a college system:
|
|
A = lowest access - class accounts for students
|
|
B = slightly higher than A (for students working on large projects)
|
|
C = Much higher limits, these accounts are usually not too hard to get
|
|
and they will normally last a long time! Lab assistants use these.
|
|
D = Instructors, Lecturers, Professors.. etc..
|
|
E = same... (very hard to get these!)
|
|
The C and D positions are usually constant according to the groupings.
|
|
For example, a class would have accounts ranging from NADRAAA-AZZ
|
|
^^^ ^^^
|
|
These can also be digits
|
|
There are also special operator accounts which start with digits instead
|
|
of numbers. (ie 7ETPDOC) These accounts can run programs such as the
|
|
monitor which can observe any tty connected to the system...
|
|
The next prompt will be for the password, student account passwords cannot
|
|
be changed and are 7 random letters by default, other account passwords
|
|
can be changed. You get 3 tries until you are logged out. It is very
|
|
difficult if not impossible to use a brute force hacker or try to guess
|
|
someones account.. so how do you get on? Here's one easy way...
|
|
Go down to your local college (make sure they have a cyber computer!)
|
|
then just buy a class catalog (they only cost around 50 cents) or you
|
|
could look, borrow, steal someone else's... then find a pascal or fortran
|
|
class that fits your schedule! You will only have to attend the class
|
|
3 or 4 times max. Once you get there you should have no trouble, but
|
|
if the instructor asks you questions about why you are not on the roll,
|
|
just tell him that you are auditing the class (taking it without enrolling
|
|
so it won't affect your GPA). The instructor will usually pass out
|
|
accounts on the 3rd or 4th day of class.. this method also works well
|
|
with just about any system they have on campus! Another way to get
|
|
accounts is to go down to the computer lab and start snooping! Look
|
|
over someones shoulder while they type in their password, or look thru
|
|
someones papers while they're in the bathroom, or look thru the assistants
|
|
desk while he is helping someone... (I have acquired accounts both ways,
|
|
and the first way is alot easier with less hassles) Also, you can use
|
|
commas instead of returns when entering username and password.
|
|
Example: at the family prompt, you could type ,nadrajf,dsfgkcd
|
|
or at the username prompt nadrajf,dsfgkcd
|
|
After you enter your info, the system will respond with:
|
|
JSN: APXV, NAMIAF
|
|
/
|
|
The 'APXV, NAMIAF' could be different depending on what job you were
|
|
attached to. The help program looks alot neater if you have vt100
|
|
emulation, if you do, type [screen,vt100] (don't type the brackets! from
|
|
now on, all commands I refer to will be enclosed in brackets)
|
|
Then type help for an extensive tutorial or a list of commands.
|
|
Your best bet at this point is to buy a quick reference guide at the
|
|
campus because I am only going to describe the most useful commands.
|
|
The / means you are in the batch subsystem, there are usually 6 or 7
|
|
other subsystems like basic, fortran, etc... return to batch mode by
|
|
typing [batch].
|
|
Some usefull commands:
|
|
CATLIST - will show permanant files in your directory.
|
|
ENQUIRE,F - displays temporary files in your workspace.
|
|
LIMITS - displays your priveledges.
|
|
INFO - get more online help.
|
|
R - re-execute last command.
|
|
GET,fn - loads fn into the local file area.
|
|
CHANGE - change certain specs on a file.
|
|
PERMIT - allow other users to use one of your files.
|
|
REWIND,* - rewinds all your local files.
|
|
NEW,fn - creates new file.
|
|
PURGE - deletes files.
|
|
LIST,F=fn - list file.
|
|
UPROC - create an auto-execute procedure file.
|
|
MAIL - send/receive private mail.
|
|
BYE - logoff.
|
|
Use the [helpme,cmd] command for the exact syntax and parameters of these
|
|
commands. There are also several machine specific 'application' programs
|
|
such as pascal, fortran, spitbol, millions of others that you can look
|
|
up with the INFO command... there are also the text editors; edit, xedit,
|
|
and fse (full screen editor). Xedit is the easiest to use if you are
|
|
not at a Telray 1061 terminal and it has full documentation. Simply
|
|
type [xedit,fn] to edit the file 'fn'.
|
|
Special control characters used with Cyber:
|
|
Control S and Control Q work normally, the terminate character is
|
|
Control T followed by a carriage return. If you wanted to break out of
|
|
an auto-execute login program, you would have to hit ^T C/R very fast
|
|
and repetitively in order to break into the batch subsystem. Control Z
|
|
is used to set environment variables and execute special low level
|
|
commands, example: [^Z TM C/R] this will terminate your connection...
|
|
So now you're thinking, what the hell is Cyber good for? Well, they
|
|
won't have any phone company records, and you can't get credit information
|
|
from one, and I am not going to tell you how to crash it since crashing
|
|
systems is a sin. There are uses for a cyber though, one handy use is
|
|
to set up a chat system, as there are normally 30-40 lines going into
|
|
a large university cyber system. I have the source for a chat program
|
|
called the communicator that I will be releasing soon. Another use is
|
|
some kind of underground information exchange that people frequently
|
|
set up on other systems, this can easily be done with Cyber.
|
|
Procedure files:
|
|
A procedure file is similiar to a batch file for MS-DOS, and a shell
|
|
script for UNIX. You can make a procedure file auto-execute by using
|
|
the UPROC command like [uproc,auto] will make the file 'auto', auto
|
|
execute. There is also a special procedure file called the procfile in
|
|
which any procedure may be accessed by simply a - in front of it. If your
|
|
procfile read:
|
|
.proc,cn.
|
|
.* sample procedure
|
|
$catlist/un=7etpdoc.
|
|
$exit.
|
|
then you could simply type -cn and the / prompt and it would execute
|
|
the catlist command. Now back to uprocs, you could easily write a whole
|
|
BBS in a procedure file or say you wanted to run a chat system and you
|
|
did not want people to change the password on your account, you could
|
|
do this:
|
|
.proc,chat,
|
|
PW"Password: "=(*A).
|
|
$ife,PW="cyber",yes.
|
|
$chat.
|
|
$revert.
|
|
$bye.
|
|
$else,yes.
|
|
$note./Wrong password, try again/.
|
|
$revert.
|
|
$bye.
|
|
$endif,yes.
|
|
This procedure will ask the user for a password and if he doesn't type
|
|
"cyber" he will be logged off. If he does get it right then he will be
|
|
dumped into the chat program and as soon as he exits the chat program,
|
|
he will be logged off. This way, the user cannot get into the batch
|
|
subsystem and change your password or otherwise screw around with the
|
|
account. The following is a listing of the procfil that I use on my
|
|
local system, it has a lot of handy utilities and examples...
|
|
---- cut here ----
|
|
.PROC,B.
|
|
.******BYE******
|
|
$DAYFILE.
|
|
$NOTE.//////////////////////////
|
|
$ASCII.
|
|
$BYE.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,TIME.
|
|
.******GIVES DAY AND TIME******
|
|
$NOTE./THE CURRENT DAY AND TIME IS/
|
|
$FIND,CLOCK./
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,SIGN*I,IN.
|
|
.******SIGN PRINT UTILITY******.
|
|
$GET,IN.
|
|
$FIND,SIGN,#I=IN,#L=OUT.
|
|
$NOTE./TO PRINT, TYPE: PRINT,OUT,CC,RPS=??/
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,TA.
|
|
.******TALK******
|
|
$SACFIND,AID,COMM.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,DIR,UN=,FILE=.
|
|
.******DIRECTORY LISTING OF PERMANENT FILES******
|
|
$GET(ZZZZDIR=CAT/#UN=1GTL0CL)
|
|
ZZZZDIR(FILE,#UN=UN)
|
|
$RETURN(ZZZZDIR)
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,Z19.
|
|
.******SET SCREEN TO Z19******
|
|
$SCREEN,Z19.
|
|
$NOTE./SCREEN,Z19.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,VT.
|
|
.******SET SCREEN TO VT100******
|
|
$SCREEN,VT100.
|
|
$NOTE./SCREEN,VT100.
|
|
$REVERT,NOLIST
|
|
#EOR
|
|
.PROC,SC.
|
|
.******SET SCREEN TO T10******
|
|
$SCREEN,T10.
|
|
$NOTE./SCREEN,T10.
|
|
$REVERT,NOLIST
|
|
#EOR
|
|
.PROC,C.
|
|
.******CATLIST******
|
|
$CATLIST.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,CA.
|
|
.******CATLIST,LO=F******
|
|
$CATLIST,LO=F.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,MT.
|
|
.******BBS******
|
|
$SACFIND,AID,MTAB.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,LI,FILE=.
|
|
.******LIST FILE******
|
|
$GET,FILE.
|
|
$ASCII.
|
|
$COPY(FILE)
|
|
$REVERT.
|
|
$EXIT.
|
|
$CSET(NORMAL)
|
|
$REVERT,NOLIST. WHERE IS THAT FILE??
|
|
#EOR
|
|
.PROC,LOCAL.
|
|
.******DIRECTORY OF LOCAL FILES******
|
|
$RETURN(PROCLIB,YYYYBAD,YYYYPRC)
|
|
$GET(QQQFILE=ENQF/UN=1GTL0CL)
|
|
QQQFILE.
|
|
$REVERT,NOLIST.
|
|
$EXIT.
|
|
$REVERT. FILES ERROR
|
|
#EOR
|
|
.PROC,RL.
|
|
.******RAISE LIMITS******
|
|
$SETASL(*)
|
|
$SETJSL(*)
|
|
$SETTL(*)
|
|
$CSET(ASCII)
|
|
$NOTE./ Limits now at max validated levels.
|
|
$CSET(NORMAL)
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,CL.
|
|
.******CLEAR******
|
|
$CLEAR,*.
|
|
$CSET(ASCII)
|
|
$NOTE./LOCAL FILE AREA CLEARED
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,P,FILE=THING,LST=LIST.
|
|
.***********************************************************
|
|
$CLEAR.
|
|
$GET(FILE)
|
|
$PASCAL4,FILE,LST.
|
|
$REVERT.
|
|
$EXIT.
|
|
$REWIND,*.
|
|
$CSET(ASCII)
|
|
$COPY(LIST)
|
|
$CSET(NORMAL)
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,RE.
|
|
.******REWIND******
|
|
$REWIND,*.
|
|
$CSET(ASCII)
|
|
$NOTE./REWOUND.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,FOR,FILE,LST=LIST.
|
|
.********************************************************************
|
|
$CLEAR.
|
|
$GET(FILE)
|
|
$FTN5,I=FILE,L=LST.
|
|
$REPLACE(LST=L)
|
|
$CSET(ASCII)
|
|
$REVERT. Fortran Compiled
|
|
$EXIT.
|
|
$REWIND,*.
|
|
$COPY(LST)
|
|
$REVERT. That's all folks.
|
|
#EOR
|
|
.PROC,WAR.
|
|
.******WARBLES******
|
|
$SACFIND,AID,WAR.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,M.
|
|
.******MAIL/CHECK******
|
|
$MAIL/CHECK.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,MA.
|
|
.******ENTER MAIL******
|
|
$MAIL.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,HE,FILE=SUMPROC,UN=.
|
|
.******HELP FILE******
|
|
$GET,FILE/#UN=UN.
|
|
$COPY(FILE)
|
|
$REVERT.
|
|
$EXIT.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
.PROC,DYNAMO.
|
|
.******WHO KNOWS??******
|
|
$GET,DYNMEXP/UN=7ETPDOC.
|
|
$SKIPR,DYNMEXP.
|
|
$COPYBR,DYNMEXP,GO.
|
|
$FIND,DYNAMO,GO.
|
|
$REVERT,NOLIST.
|
|
#EOR
|
|
#EOR
|
|
#EOI
|
|
---- cut here ----
|
|
I have covered procfil's fairly extensively as I think it is the most
|
|
useful function of cyber for hackers. I will be realeasing source codes
|
|
for several programs including 'the communicator' chat utility, and a BBS
|
|
program with a full message base. If you have any questions about cyber
|
|
or you have gotten into one and don't know what to do, I can be contacted
|
|
at the Forgotten Realm BBS or via uucp mail at ...!uunet!ncoast!ghost.
|