3776 lines
173 KiB
Plaintext
3776 lines
173 KiB
Plaintext
------------------------------------------------------------------------------
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
% %
|
|
% THE NEOPHYTE'S GUIDE TO HACKING %
|
|
% =============================== %
|
|
% 1993 Edition %
|
|
% Completed on 08/28/93 %
|
|
% Modification 1.1 Done on 10/10/93 %
|
|
% Modification 1.2 Done on 10/23/93 %
|
|
% by %
|
|
%% >>>>> Deicide <<<<< %%
|
|
%%% %%%
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
< The author of this file grants permission to reproduce and >
|
|
< redistribute this file in any way the reader sees fit, >
|
|
< including the inclusion of this file in newsletters of any >
|
|
< media, provided the file is kept whole and complete, >
|
|
< without any modifications, deletions or ommissions. >
|
|
< (c) 1993, Deicide >
|
|
|
|
TABLE OF CONTENTS
|
|
=================
|
|
|
|
1. INTRODUCTION
|
|
|
|
2. ETHICS/SAFETY
|
|
|
|
3. WHERE TO START
|
|
|
|
4. PACKET-SWITCHED NETWORKS
|
|
A. Intro to PSNs
|
|
B. How packet-switching works
|
|
C. The Internet
|
|
1. Introduction
|
|
2. Getting access
|
|
3. FTP
|
|
D. X.25 Networks
|
|
1. NUAs
|
|
2. PADs & NUIs
|
|
3. CUGs
|
|
4. SprintNet
|
|
5. BT Tymnet
|
|
6. Datapac
|
|
7. DNIC List
|
|
|
|
5. SYSTEM PENETRATION
|
|
A. Unix
|
|
B. VMS
|
|
C. MPE (HP3000 mainframes)
|
|
D. VM/CMS
|
|
E. Primos
|
|
F. TOPS 10/20
|
|
G. IRIS
|
|
H. NOS
|
|
I. DECServer
|
|
J. GS/1
|
|
K. XMUX
|
|
L. Starmaster/PACX
|
|
M. Access 2590
|
|
N. PICK
|
|
O. AOS/VS
|
|
P. RSTS
|
|
Q. WindowsNT
|
|
R. Novell Netware
|
|
S. System75/85
|
|
T. AS400
|
|
U. TSO
|
|
|
|
6. BRUTE FORCE
|
|
A. Passwords
|
|
B. Usernames
|
|
C. Services
|
|
|
|
7. SOCIAL ENGINEERING
|
|
|
|
8. TRASHING
|
|
|
|
9. ACRONYMS
|
|
|
|
10. CONCLUSION
|
|
A. Last words
|
|
B. Recommended Reading
|
|
C. BBSes
|
|
D. References
|
|
E. And finally..
|
|
F. Disclaimer
|
|
|
|
|
|
INTRODUCTION:
|
|
============
|
|
------------
|
|
|
|
Over four years ago the final version of the LOD/H's Novice's Guide to
|
|
Hacking was created and distributed, and during the years since it has served
|
|
as a much needed source of knowledge for the many hackers just beginning to
|
|
explore the wonders of system penetration and exploration.
|
|
The guide was much needed by the throng of newbies who hadn't the
|
|
slightest clue what a VAX was, but were eager to learn the arcane art of
|
|
hacking. Many of today's greats and moderates alike relied the guide as a
|
|
valuable reference during their tentative(or not) steps into the nets.
|
|
However, time has taken it's toll on the silicon networks and the guide is
|
|
now a tad out of date. The basic manufacturer defaults are now usually secured
|
|
, and more operating systems have come on the scene to take a large chunk of
|
|
the OS percentile. In over four years not one good attempt at a sequel has
|
|
been made, for reasons unbeknownst to me.
|
|
So, I decided to take it upon myself to create my own guide to hacking..
|
|
the "Neophyte's Guide to Hacking" (hey..no laughing!) in the hopes that it
|
|
might help others in furthering their explorations of the nets.
|
|
This guide is modelled after the original, mainly due to the fact that the
|
|
original *was* good. New sections have been added, and old sections expanded
|
|
upon. However, this is in no means just an update, it is an entirely new guide
|
|
as you'll see by the difference in size. This guide turned out to be over 4
|
|
times the size of The Mentor's guide.
|
|
Also, this guide is NOT an actual "sequel" to the original; it is not
|
|
LOD/H sponsored or authorized or whatever, mainly because the LOD/H is now
|
|
extinct.
|
|
One last thing.. this guide is in no way complete. There are many OS's I
|
|
did not include, the main reasons being their rarity or my non-expertise with
|
|
them. All the major OS's are covered, but in future releases I wish to include
|
|
Wang, MVS, CICS, SimVTAM, Qinter, IMS, VOS, and many more. If you
|
|
feel you could help, contact me by Internet email or on a board or net(if you
|
|
can find me). Same thing applies for further expansion of current topics and
|
|
operating systems, please contact me.
|
|
Ok, a rather long intro, but fuck it.. enjoy as you wish..
|
|
Deicide - deicide@west.darkside.com
|
|
|
|
ETHICS/SAFETY:
|
|
=============
|
|
-------------
|
|
|
|
One of the most integral parts of a hacker's mindset is his set of ethics.
|
|
And ethics frequently go hand in hand with safety, which is obviously the most
|
|
critical part of the process of hacking and the system exploration, if you
|
|
plan to spend your life outside of the gaol.
|
|
A hacker's ethics are generally somewhat different from that of an average
|
|
joe. An average joe would be taught that it is bad to break laws, even though
|
|
most do anyways. I am encouraging you to break laws, but in the quest for
|
|
knowledge. In my mind, if hacking is done with the right intentions it is not
|
|
all that criminal. The media likes to make us out to be psychotic sociopaths
|
|
bent on causing armageddon with our PCs. Not likely. I could probably turn the
|
|
tables on the fearmongering media by showing that the average joe who cheats
|
|
on his taxes is harming the system more than a curious interloper, but I
|
|
refrain.. let them wallow..
|
|
The one thing a hacker must never do is maliciously hack(also known
|
|
as crash, trash, etc..) a system. Deleting and modifying files unnecessary is
|
|
BAD. It serves no purpose but to send the sysadmins on a warhunt for your head
|
|
, and to take away your account. Lame. Don't do it.
|
|
Anyways, if you don't understand all of these, just do your best to follow
|
|
them, and take my word for it. You'll understand the reasoning behind these
|
|
guidelines later.
|
|
|
|
I. Don't ever maliciously hack a system. Do not delete or modify files
|
|
unnecessarily, or intentionally slow down or crash a system.
|
|
The lone exception to this rule is the modification of system logs and
|
|
audit trails to hide your tracks.
|
|
|
|
II. Don't give your name or real phone number to ANYONE, it doesn't matter
|
|
who they are. Some of the most famous phreaks have turned narcs because
|
|
they've been busted, and they will turn you in if you give them a
|
|
chance. It's been said that one out of every three hackers is a fed, and
|
|
while this is an exaggeration, use this as a rule and you should do
|
|
fine. Meet them on a loop, alliance, bbs, chat system, whatever, just
|
|
don't give out your voice number.
|
|
|
|
III. Stay away from government computers. You will find out very fast that
|
|
attempting to hack a MilTac installation is next to impossible, and will
|
|
get you arrested before you can say "oh shit". Big Brother has infinite
|
|
resources to draw on, and has all the time it needs to hunt you down.
|
|
They will spend literally years tracking you down. As tempting as it may
|
|
be, don't rush into it, you'll regret it in the end.
|
|
|
|
IV. Don't use codes from your own home, ever! Period. This is the most
|
|
incredibly lame thing i've seen throughout my life in the 'underground';
|
|
incredible abuse of codes, which has been the downfall of so many people.
|
|
Most PBX/950/800s have ANI, and using them will eventually get you
|
|
busted, without question. And calling cards are an even worse idea.
|
|
Codes are a form of pseudo-phreaking which have nothing to do with the
|
|
exploration of the telephone networks, which is what phreaking is about.
|
|
If you are too lazy to field phreak or be inventive, then forget about
|
|
phreaking.
|
|
|
|
V. Don't incriminate others, no matter how bad you hate them. Turning in
|
|
people over a dispute is a terrible way to solve things; kick their ass,
|
|
shut off their phones/power/water, whatever, just don't bust them.
|
|
It will come back to you in the end..
|
|
|
|
VI. Watch what you post. Don't post accounts or codes over open nets as a
|
|
rule. They will die within days, and you will lose your new treasure.
|
|
And the posting of credit card numbers is indeed a criminal offense
|
|
under a law passed in the Reagan years.
|
|
|
|
VII. Don't card items. This is actually a worse idea than using codes, the
|
|
chances of getting busted are very high.
|
|
|
|
VIII. If for some reason you have to use codes, use your own, and nothing
|
|
else. Never use a code you see on a board, because chances are it has
|
|
been abused beyond belief and it is already being monitored.
|
|
|
|
IX. Feel free to ask questions, but keep them within reason. People won't
|
|
always be willing to hand out rare accounts, and if this is the case
|
|
don't be surprised. Keep the questions technical as a rule. Try and
|
|
learn as much as you can from pure hands on experience
|
|
|
|
X. And finally, be somewhat paranoid. Use PGP to encrypt your files, keep
|
|
your notes/printouts stored secretly, whatever you can do to prolong
|
|
your stay in the h/p world.
|
|
|
|
XI. If you get busted, don't tell the authorities ANYTHING. Refuse to speak
|
|
to them without a lawyer present.
|
|
|
|
XII. If police arrive at your residence to serve a search warrant, look it
|
|
over carefully, it is your right. Know what they can and can't do, and
|
|
if they can't do something, make sure they don't.
|
|
|
|
XIII. If at all possible, try not to hack off your own phoneline. Splice your
|
|
neighbour's line, call from a Fortress Fone, phreak off a junction box,
|
|
whatever.. if you hack long enough, chances are one day you'll be
|
|
traced or ANI'd.
|
|
Don't believe you are entirely safe on packet-switched networks either,
|
|
it takes a while but if you scan/hack off your local access point they
|
|
will put a trace on it.
|
|
|
|
XIV. Make the tracking of yourself as difficult as possible for others.
|
|
Bounce the call off several outdials, or try to go through at least two
|
|
different telco companies when making a call to a dialup.
|
|
When on a packet-switched network or a local or wide area network,
|
|
try and bounce the call off various pads or through other networks
|
|
before you reach your destination. The more bounces, the more red tape
|
|
for the investigator and the easier it is for you to make a clean
|
|
getaway.
|
|
Try not to stay on any system for *too* long, and alternate your calling
|
|
times and dates.
|
|
|
|
XV. Do not keep written notes! Keep all information on computer, encrypted
|
|
with PGP or another military-standard encryption program.
|
|
Written notes will only serve to incriminate you in a court of law.
|
|
If you write something down originally, shred the paper.. itty bitty
|
|
pieces is best, or even better, burn it! Feds DO trash, just like us,
|
|
and throwing out your notes complete will land in their hands, and
|
|
they'll use it against you.
|
|
|
|
XVI. Finally, the day/night calling controversy. Some folks think it is a
|
|
better idea to call during the day(or whenever the user would normally
|
|
use his account) as to not arouse the sysadmin's suspicion of abnormal
|
|
calling times, while others think it is better to call when nobody is
|
|
around.
|
|
This is a tough one, as there is no real answer. If the sysadmin keeps
|
|
logs(and reads over them) he will definetly think it strange that a
|
|
secretary calls in at 3 am.. he will probably then look closer and find
|
|
it even stranger that the secretary then grabbed the password file and
|
|
proceeded to set him/herself up with a root shell.
|
|
On the other hand, if you call during the time the user would normally
|
|
call, the real owner of the account may very well log in to see his
|
|
name already there, or even worse be denied access because his account
|
|
is already in use.
|
|
In the end, it is down to your opinion.
|
|
And remember, when you make a decision stick to it; remember the time
|
|
zone changes.
|
|
|
|
WHERE TO START
|
|
==============
|
|
--------------
|
|
|
|
Probably the hardest period in hacking is that of when you are first
|
|
starting. Finding and penetrating your first system is a major step, and can
|
|
be approached in many ways. The common ways to find a system to hack are;
|
|
|
|
- UNIVERSITIES : Universities commonly have hundreds of users, many of
|
|
which aren't too computer literate, which makes
|
|
hacking a relatively simple chore. And security is
|
|
often poor, so if you don't abuse the system too much
|
|
your stay could be a long one.
|
|
On the other hand, for a nominal fee you can usually
|
|
pick up a cheap *legitimate* (now there's a concept)
|
|
account. Or you could enroll in the university for
|
|
a few credits, and just go until the accounts are
|
|
handed out. Unfortunely, if you are caught hacking
|
|
off your own account it won't be hard to trace it
|
|
back to you. If you get a legimate account at first,
|
|
you might be best to hack a student's account for your
|
|
other-system hacking.
|
|
The other fun part about universities is often they
|
|
will provide access to a number of nets, usually
|
|
including the Internet.
|
|
Occasionally you'll have access to a PSN as well.
|
|
|
|
- CARRIER SCANNING: Carrier scanning in your LATA(Local Access Transport
|
|
Area), commonly known as wardialing, was popularized
|
|
in the movie War Games.
|
|
Unfortunely, there are a few problems inherent in
|
|
finding systems this way; you are limited to the
|
|
systems in your area, so if you have a small town you
|
|
may find very little of interest, and secondly,
|
|
ANI is a problem within your own LATA, and tracing is
|
|
simple, making security risks high. If you are going
|
|
to hack a system within your own lata, bounce it at
|
|
least once.
|
|
There are many programs, such as ToneLoc and CodeThief
|
|
(ToneLoc being superior to all in my humble opinion),
|
|
which will automate this process.
|
|
|
|
- PACKET-SWITCHED : This is my favorite by far, as hacking on PSNs is how
|
|
NETWORKS I learned nearly all I know. I've explored PSNs
|
|
world-wide, and never ran out of systems to hack.
|
|
No matter what PSN you try you will find many
|
|
different, hackable systems. I will go more indepth
|
|
on PSNs in the next section.
|
|
|
|
|
|
PACKET-SWITCHED NETWORKS
|
|
========================
|
|
------------------------
|
|
|
|
Intro to PSNs
|
|
=============
|
|
|
|
First off, PSNs are also known as PSDNs, PSDCNs, PSSs and VANs to name
|
|
a few. Look up the acronyms in the handy acronym reference chart<g>.
|
|
The X.25 PSNs you will hear about the most are; Sprintnet(formerly
|
|
Telenet), BT Tymnet(the largest), and Datapac(Canada's largest).
|
|
All these networks have advantages and disadvantages, but i'll say this;
|
|
if you are in the United States, start with Sprintnet. If you are in Canada,
|
|
Datapac is for you.
|
|
The reason PSNs are so popular for hackers are many. There are literally
|
|
thousands of systems on PSNs all around the world, all of which(if you have
|
|
the right facilities) are free of charge for you to reach. And because of the
|
|
immense size of public PSNs, it is a rare thing to ever get caught for
|
|
scanning. Tracing is also a complicated matter, especially with a small
|
|
amount of effort on your part to avoid a trace.
|
|
|
|
How packet-switching works
|
|
==========================
|
|
|
|
The following explanation applies for the most part to all forms of
|
|
packet-switching, but is specifically about PSNs operating on the X series of
|
|
protocols, such as Datapac & SprintNet, as opposed to the Internet which
|
|
operates on TCP/IP. It is the same principle in essense, however.
|
|
Packet-Switched Networks are kinda complicated, but I'll attempt to
|
|
simplify the technology enough to make it easy to understand.
|
|
You, the user, connect to the local public access port for your PSN,
|
|
reachable via a phone dialup. You match communications parameters with the
|
|
network host and you are ready to go.
|
|
From there, all the data you send across the network is first bundled into
|
|
packets, usually of 128 or 256 bytes. These packets are assembled using
|
|
Packet Assembly/Disassembly, performed by the public access port, also known
|
|
as a public PAD(Packet Assembler/Disassembler), or a DCE(Data Communicating
|
|
Equipment or Data Circuit-Terminating Equipment).
|
|
The packets are sent along the network to their destination by means of
|
|
the various X protocols, standardly X.25 with help from X.28, X.29 & X.3
|
|
within your home network, and internationally using X.75/X.121. The X protocol
|
|
series are the accepted CCITT standards.
|
|
The host system(DTE: Data Terminal Equipment, also a PAD) which you are
|
|
calling then receives the packet and disassembles the packet using Packet
|
|
Assembly/Disassembly once again into data the system understands.
|
|
The DTE then assembles it's data in response to your packet, and sends it
|
|
back over the network to your PAD in packet form, which disassembles the
|
|
packet into readable data for you, the user.
|
|
And that is the simplified version!
|
|
|
|
The Internet
|
|
============
|
|
|
|
Introduction
|
|
------------
|
|
|
|
Contrary to popular belief, the Internet is a packet-switched network;
|
|
just not an X.25 packet-switched network. The Internet operates on the TCP/IP
|
|
protocols(as a rule), which is why it is sometimes disregarded as a
|
|
packet-switched network. In fact, the Internet's predecessor, the ARPAnet,
|
|
was the first large-scale experiment in packet-switching technology. What was
|
|
then Telenet came later.
|
|
The confusion comes from peoples ignorance of the principles of
|
|
packet-switching, which is simply a type of network, explained in technical
|
|
detail earlier. It doesn't matter what protocols the network may use, if
|
|
packet-switching is in use it is obviously a packet-switched network.
|
|
Ok, now you may have noticed that the Internet has a rather small section,
|
|
which is true. The reasons are many. This is a hacking guide, not an Internet
|
|
tutorial, so I didn't include the IRC or Archie or whatever. And the main
|
|
reason is I spent about 100% more time on X.25 nets than I did the Internet.
|
|
Nonetheless, I decided to include the essential aspects of the Internet.
|
|
You should be able to take it from there.
|
|
The following section is derived mostly from personal experience, but
|
|
the Gatsby's Internet file helped out somewhat, specifically in the classes
|
|
of IP addresses.
|
|
|
|
Getting Access
|
|
--------------
|
|
|
|
Getting access is somewhere between easy and very difficult, depending
|
|
where you live and how good(or lucky!) a hacker you are.
|
|
First of all, if you are going to hack on the Internet then you must be
|
|
on a system that has full Internet access, not just mail. That cuts Compuserve
|
|
and Prodigy out of the picture.
|
|
Most universities and some high schools have Internet access, see what
|
|
you can do to get yourself an account, legitimatly or not.
|
|
Some BBSes offer full Internet access for a fairly reasonable price, and
|
|
that would be a good choice.
|
|
If you are in an area with a FreeNet, then you get full Internet access..
|
|
for free! Check around with local hackers or PD boards to inquire where the
|
|
nearest FreeNet is.
|
|
Some businesses provide Internet access, for a price. Check with local
|
|
netters to see what local options there are.
|
|
And lastly, you can try and hack your way on. When you hack a system,
|
|
check and see if they are on the net. Usually this is accomplished by doing
|
|
a test call using telnet.. explained later.
|
|
|
|
FTP
|
|
---
|
|
|
|
FTP is the acronym for File Transfer Protocol, and it is the primary means
|
|
of transporting remote files onto your own system(actually, usually the
|
|
system which you are calling the Internet through).
|
|
I will only provide a brief overview, as FTP is fairly easy to use, has
|
|
help files online and comprehensive documentation offline at your local h/p
|
|
BBS.
|
|
First off, FTP can be initialized by typing 'ftp' at any system which
|
|
has it. Most do, even if they don't have the Internet online. That a
|
|
frustrating lesson more than a few novices has learned.. if you hack into a
|
|
system that has FTP or telnet on line, it does not necessarily(and usually
|
|
doesn't) have Internet access. Some SunOS's will have two sets of ftp and
|
|
telnet utilities. The standard ftp and telnet commands can be used for local
|
|
network connects, but not Internet. Another set of commands, itelnet, iftp
|
|
and ifinger (and occasionally iwhois) is used for the Internet.
|
|
When you enter the FTP utility, you'll usually find yourself at a 'ftp>'
|
|
prompt, and typing 'help' should bring up a small set of help files. The
|
|
commands available, along with the help files, vary from system to system.
|
|
Procedure is then defined by what type of system you are on, as again,
|
|
it varies. But what you usually do next is open a connection to the system you
|
|
want to get a file off of. Type 'open' followed by the host name or IP
|
|
address of the system you wish to connect to.. explained later.
|
|
Next, you will usually find yourself at a sort of login prompt. If you
|
|
have a username on that system, then type it in. If not, try 'anonymous'.
|
|
Anonymous is a great little guest account that is now being built in to some
|
|
OS's. Conscientious sysadmins may disable it, for obvious reasons. If however,
|
|
it is not, you will be asked for a password. Type anything, it doesn't matter
|
|
really. Type a few d's if you want, it really doesn't matter(as a rule don't
|
|
sit on your keyboard though.. it may not like it.. type something boring).
|
|
Next you simply use the 'get' command to get the file you want. Usually
|
|
it is a good idea to not put the files in a directory that they will be
|
|
noticed.. the sysadmin will suspect something is up if he runs into a few
|
|
files that he supposedly copied into his own directory. Which brings us to
|
|
the next segment.. give your files benign names, especially if they are
|
|
something like /etc/passwd files or issues of Phrack.
|
|
A note about FTPing /etc/passwds. It rarely works. Oh yes, you will get
|
|
an /etc/passwd file, but rarely on the Internet will it be the real
|
|
/etc/passwd. Check the size of the file first.. if it is 300 bytes or less,
|
|
then it will likely be a substitute. Telnet will, however, get the real
|
|
/etc/passwd on most occasions.
|
|
Now quit the FTP utility and peruse your new files.. be sure to remove
|
|
them when done.
|
|
|
|
Telnet
|
|
------
|
|
|
|
While FTP has no real parallel in X.25 networks, you could equate telnet
|
|
to a private PAD. Telnet lets you connect to and operate on Internet systems
|
|
over the Internet as if you were connected locally.
|
|
Telnet is initialized by typing 'telnet' at your shell. The operative
|
|
command is, again, 'open'. Again, type 'open' followed by the domain name
|
|
or the IP address. When connected, you will be at a login prompt of some
|
|
kind(usually..). Enter a username if you have one, and if not you can either
|
|
attempt to hack one or see if the system accepts the 'anonymous' guest user,
|
|
explained in the FTP section.
|
|
If all goes well, you should have a remote connection of some kind, and
|
|
what follows depends on the system you are connected to, just like in any
|
|
other network.
|
|
|
|
Domain Names and IP Addresses - Intro
|
|
-------------------------------------
|
|
|
|
For those of you unfamiliar with those terms I will give a small,
|
|
condensed explanation of what the two are.
|
|
One or the other is needed for connecting to a remote system, either by
|
|
FTP or Telnet. The IP address could be equated to the X.25 net's Network User
|
|
Address. The Domain name is a mnemonic name, used for convience more than
|
|
anything, as it is generally easier to remember.
|
|
If you wish to scan for systems on the Internet it is usually much easier
|
|
to scan by IP address, as you won't know the mnemonic for most systems.
|
|
IP addresses are 4 digit-combinations separated by dots. Address examples
|
|
are 192.88.144.3(EFF) and 18.72.2.1(MIT).
|
|
Addresses fall into three classes;
|
|
Class A - 0 to 127
|
|
Class B - 128 to 191
|
|
Class C - 192 to 223
|
|
The earliest Internet systems are all in Class A, but it is more common
|
|
to find class B or C systems. Moreover, a lot of systems are placed
|
|
specifically in the 128 or 192 address prefix, as opposed to 184 or 201 or
|
|
whatever. Scanning an IP address set can be accomplished in many fashions.
|
|
One of which would be to pick a prefix, add two random one to two digit
|
|
numbers, and scan the last portion. ie: take 192.15.43 and scan the last
|
|
digit from 0 to 255.
|
|
Unfortunely, the last portion (or last two portions in the case of Class
|
|
C) are ports, meaning you may come up completely blank or you might hit the
|
|
jack pot.
|
|
Experiment to your own liking, after a while you will fall into a
|
|
comfortable groove.
|
|
You can also connect to specific systems using the domain name, if you
|
|
know or can guess the domain name. To guess a domain name you will need to
|
|
know the company or organization's name, and the type of organization it is.
|
|
This is possible because host names must follow the Domain Name System, which
|
|
makes guessing a lot easier. Once you have both, you can usually take a few
|
|
educated guesses at the domain name. Some are easier than others.
|
|
First of all, you will need to understand the principle of top-level
|
|
domains. The top level is at the end of a domain name; in the case of eff.org,
|
|
the top-level is 'org'. In the case of mit.edu, the top-level is 'edu'.
|
|
Top levels fall into a few categories;
|
|
com - commercial institutions
|
|
org - non-profit organizations
|
|
edu - educational facilities
|
|
net - networks
|
|
gov - government systems (non military)
|
|
mil - non-classified military
|
|
Along with various country codes. The country codes are two letters used
|
|
for international calls; the US's is 'US', Brazil's is 'BR'.
|
|
Determine which top-level the system falls under, and then make a few
|
|
guesses. Examples are;
|
|
compuserve.com
|
|
xerox.com
|
|
mit.edu
|
|
eff.org
|
|
For further reading, I suggest picking up a few of the printed Internet
|
|
guides currently on the market, as well as the Gatsby's file on the Internet,
|
|
printed in Phrack 33.
|
|
|
|
X.25 Networks
|
|
=============
|
|
|
|
From here on in the PSN section of this file is dedicated to X.25
|
|
networks. I use the acronym PSN interchangably with X.25 networks, so don't
|
|
get PSN confused with all the other types of PSN networks. From here on in,
|
|
it is all X.25.
|
|
|
|
Network User Addresses
|
|
----------------------
|
|
|
|
NUAs(Network User Addresses) are the PSNs equivalent of a phone number.
|
|
They are what you need to connect to systems on PSNs around the world, and
|
|
thanks to the DNIC(Data Network Identifier Code), there are no two the same.
|
|
The format for entering NUAs is different from PSN to PSN. For example,
|
|
on Datapac you must include 0's, but on Sprintnet 0's are not necessary.
|
|
Tymnet uses 6 digits NUAs rather than the standard 8.
|
|
But the standard NUA format is this;
|
|
|
|
PDDDDXXXXXXXXSS,MMMMMMMMMM
|
|
|
|
Where; P is the pre-DNIC digit
|
|
D is the DNIC
|
|
X is the NUA
|
|
S is the LCN(Logical Channel Number, subaddressing)
|
|
M is the Mnemonic
|
|
|
|
Various segments may be omitted depending on your PSN and where you are
|
|
calling.
|
|
The P is commonly a 0, but is a 1 on Datapac. It is not usually even counted
|
|
as part of the NUA, but must be included(usage varying) when making calls
|
|
to another PSN other than your own. Within your own PSN it is not necessary
|
|
to include the pre DNIC digit.
|
|
The D is the DNIC also known as the DCC(Data Country Code). The DNIC is the
|
|
4 digit country code, which insures that each NUA worldwide is unique. The
|
|
DNIC is only used in calling international NUAs. If you are in Datapac(DNIC
|
|
3020) you do not have to include the DNIC for Datapac when making calls to
|
|
NUAs within Datapac, but if you are in another PSN you must include the DNIC
|
|
for calls to Datapac.
|
|
The X symbolizes the actual NUA, which along with the optional S
|
|
(subaddressing) must always be included. You can simplify the NUA even greater
|
|
using this format;
|
|
|
|
PPPXXXXX
|
|
|
|
Where P is the prefix of the NUA, and the X's are the suffix. The prefix
|
|
corresponds to an Area Code in most cases in that the NUAs within that prefix
|
|
are in a certain part of the country the PSN serves. In the case of Sprintnet,
|
|
the prefix corresponds directly with the Area Code(ie: all NUAs in the 914
|
|
prefix on Sprintnet are in New York, and all phone numbers in the 914 Area
|
|
Code are in New York).
|
|
Subaddressing, S on the diagram, is a somewhat complicated thing to explain.
|
|
Subaddressing is used when desired by the owner of the DTE, and is used to
|
|
connect to specified system on the same NUA. You may find more than one system
|
|
on the same NUA, and these can be reached using subaddresses.
|
|
ie:
|
|
NUA SYSTEM
|
|
PPPXXXXXSS
|
|
========== ===================
|
|
Ex.1 12300456 Unix
|
|
Ex.2 123004561 VMS
|
|
Ex.3 1230045699 HP3000
|
|
|
|
In this example, the normal NUA is 12300456(assuming DNIC and pre-DNIC digit
|
|
are not used). This NUA takes you to a Unix system. But when the LCN(Logical
|
|
Channel Number, subaddress) of 1 is used, you are taken to a VMS. And the
|
|
subaddress of 99 takes you to a HP3000. The systems on 12300456 are all owned
|
|
by the same person/company, who wished to have one NUA only, but by using
|
|
subaddresses he can give access to multiple systems on a lone NUA.
|
|
Subaddresses are also used occasionally as extra security. If you hit a system
|
|
that gives you an error message such as 'REMOTE PROCEDURE ERROR' or 'REMOTE
|
|
DIRECTIVE', you will either need a subaddress or a mnemonic. You may choose to
|
|
go through the entire possible subaddresses, 1 to 99, or if you are just
|
|
scanning i would suggest these: 1,2,50,51,91,98,99
|
|
Mnemonics, M, are another tricky one to explain. They are not documented by
|
|
the PSNs, I discovered them on my own. Mnemonics are also used to select
|
|
systems on a single NUA as a kind of port selector, but they are more commonly
|
|
used as a kind of external password, which prevents you from even seeing the
|
|
system in question.
|
|
The same error messages as in LCNs occur for mnemonics, but again, even if you
|
|
can reach a system with a standard NUA, there is a possibly a system only
|
|
reachable by mnemonic exists. Here is a list of commonly used mnemonics;
|
|
SYSTEM CONSOLE PAD DIAL MODEM X25 X28 X29 SYS HOST
|
|
|
|
Bypassing Reverse Charging Systems: Private PADs and NUIs
|
|
---------------------------------------------------------
|
|
|
|
Occasionally on PSNs you will run into systems which give you the
|
|
error message 'COLLECT CALL REFUSED'. This denotes a reverse-charging system.
|
|
When you make a call to a system on a PSN, the call is automatically collect.
|
|
But a lot of sysadmins do not want to pay for your connect charges, and if all
|
|
of their users have NUIs or private PADs, it is a good idea for them to make
|
|
their system reverse-charging, which saves them money, but also acts as yet
|
|
another security barrier from casual snoopers.
|
|
But again, this can be avoided by using a private PAD or a NUI.
|
|
Before we go into the details of these, remember that a private PAD is a
|
|
different thing than your public access port PAD. A private PAD is a PAD which
|
|
automatically assumes all connect charges. So, the reverse charging systems
|
|
will let you past the reverse charging, as you agree to accept the charges.
|
|
NUI's(Network User Identifiers) work the same way. You can think of a NUI
|
|
as .. say a Calling Card. The Calling Card is billed for all the charges made
|
|
on it, regardless of who made them; the owner gets the bill. The NUI works the
|
|
same way. NUIs are used legitimatly by users willing to accept the connect
|
|
charges. But, as hackers are known to do, these NUIs get stolen and used to
|
|
call all NUAs all around the world, and the legitimate owner gets the bill.
|
|
But unlike CCs, you will usually get away with using a NUI.
|
|
However, as you can guess, private PADs and NUIs are fairly hard to come
|
|
by. If somebody manages to get ahold of one, they usually won't be willing to
|
|
share it. So, it comes down to you; you probably will have to find your own.
|
|
PADs are only found by scanning on PSNs, and by hacking onto systems on
|
|
PSNs. There are programs on Unix and Primos systems,for example, that serve as
|
|
a private PAD. And there are some private PADs that are set up solely for the
|
|
purpose of being a private PAD. But, these are almost always passworded, so it
|
|
is up to you to get in.
|
|
NUIs are somewhat the same thing. NUIs are different from PSN to PSN, some
|
|
will tell you if a NUI is wrong, letting you guess one, but others will not.
|
|
And of course, you still have to guess the password. I've heard stories of
|
|
people carding NUIs, but i'm not sure i quite believe it, and the safety of
|
|
such a practice is questionable.
|
|
|
|
Closed User Groups
|
|
------------------
|
|
|
|
One of the most effective security measures i've ever seen is the CUG
|
|
(Closed User Group). The CUG is what generates the 'CALL BLOCKED' message when
|
|
scanning on PSNs. A CUG will only accept calls into the DTE from specified
|
|
DCE NUAs. Meaning, if your NUA has not been entered into the list of
|
|
acceptable NUAs, you won't be allowed to even see the system. However, CUGs
|
|
aren't for everybody. If you have a system with many users that all call in
|
|
from different points, CUGs are unusable. And a good thing for us. I've never
|
|
heard of anyone finding a way past a CUG. I've got a few theories but..
|
|
|
|
Sprintnet
|
|
---------
|
|
|
|
Now i'll go a bit more into the major US and Canadian PSNs, starting with
|
|
the most popular in the States, Sprintnet
|
|
To find a public indial port for Sprintnet you may possibly be able to
|
|
find it in your telefone book(look under Sprintnet) or by Directory Assistance.
|
|
If not, try Sprintnet Customer Service at 1-800-336-0437. This also will
|
|
probably only function between 8:30 and 5:00 EST, maybe a bit different.
|
|
Also, for a data number for in-dial look ups try 1-800-424-9494 at
|
|
communication parameters 7/E/1(or 8/N/1 also i believe). Type <CR> twice
|
|
or @D for 2400bps and press enter so Sprintnet can match your communications
|
|
parameters. It will display a short herald then a TERMINAL= prompt.
|
|
At the TERMINAL= prompt type VT100 for VT100 terminal emulation, if you are
|
|
using a personal computer i think D1 works, or just <CR> for dumb terminal.
|
|
Then type "c mail", at the username prompt type "phones", and for password
|
|
type "phones" again. It is menu driven from there on.
|
|
Now that you have your Sprintnet public dial port number, call it up like
|
|
you would a BBS, then when it connnects type the two <CR>s for 300/1200bps
|
|
or the @D for 2400bps, then it will display its herald, something like:
|
|
|
|
SPRINTNET(or in some cases TELENET)
|
|
123 11A (where 123 is your area code & Sprintnet's address prefix
|
|
and 11A is the port you are using)
|
|
TERMINAL=(type what you did previously eg:VT100,D1,<ENTER>)
|
|
|
|
then when Sprintnet displays the @ prompt you know you are connected to
|
|
a Sprintnet public PAD and you are ready to enter NUAs.
|
|
As i mentioned before, Sprintnet NUA prefixes correspond directly with
|
|
Area Codes, so to scan Sprintnet simply take an AC and suffix it with the
|
|
remaining digits, usually in sequence. Since Sprintnet ignores 0's, NUAs
|
|
can be as small as 4 digits. When scanning, go from lowest to highest,
|
|
stopping as soon as it seems NUAs have run dry(take it a hundred NUAs further
|
|
to be sure..best to take it right to 2000, maybe higher if you have time).
|
|
|
|
BT Tymnet
|
|
---------
|
|
|
|
BT Tymnet is owned by British Telecom, and is the biggest PSN by far, but
|
|
it does have some extra security.
|
|
For finding Tymnet dial-ins the procedure is much the same, look in the
|
|
phone book under Tymnet or BT Tymnet, or phone directory assistance and ask
|
|
for BT Tymnet Public Dial Port numbers, or you can call Tymnet customer
|
|
Service at 1-800-336-0149. Generally try between 8:30 and 5:00 EST. I don't
|
|
have the Tymnet data number for finding in-dials, but once you are on Tymnet
|
|
type INFORMATION for a complete list of in-dials as well as other things.
|
|
Once you have your in-dial number set your communication parameters at
|
|
either 8/N/1 or 7/E/1 then dial the number just like you would a BBS. At
|
|
connect you will see a string of garbage characters or nothing at all.
|
|
Press <CR> so Tymnet can match your communication parameters. You will then
|
|
see the Tymnet herald which will look something like this:
|
|
-2373-001-
|
|
please type your terminal identifier
|
|
If it wants a terminal identifier press A(if you want, you can press A
|
|
instead of <CR> at connect so it can match your communication parameters and
|
|
get your terminal identifer all at once).
|
|
After this initial part you will see the prompt:
|
|
please log in:
|
|
This shows Tymnet is ready for you to enter NUAs. A great deal of the NUAs on
|
|
Tymnet are in plain mnemonic format however. To reach these, just enter the
|
|
mnemonic you wish, nothing else(ie: CPU or SYSTEM). To enter digital NUAs you
|
|
need a NUI though. Tymnet will let you know when a NUI is wrong. Just keep
|
|
guessing NUIs and passwords until you find one. BUT, keep in mind, one of the
|
|
biggest security features Tymnet has is this: it will kick you off after three
|
|
incorrect attempts at anything. Thus, you'll have to call again and again, and
|
|
if you are in a digital switching system such as ESS it is not a good idea to
|
|
call anywhere an excessive amount of time. So keep it in moderation if you
|
|
choose to try Tymnet.
|
|
|
|
Datapac
|
|
-------
|
|
|
|
I am the most fond of Datapac, because I grew up on it. Nearly all the
|
|
hacking i've done to this day was on Datapac or the international PSNs i've
|
|
been able to reach through private PADs i've found on Datapac.
|
|
To connect to the Datapac network from Canada you will need to dial into
|
|
your local Datapac node, which is accessible in most cities via your local
|
|
Datapac dial-in number.
|
|
There are quite a few ways to find your local Datapac dial-in. It will
|
|
usually be in your telephone book under "DATAPAC PUBLIC DIAL PORT". If
|
|
not, you could try directory assistance for the same name. Alternatively,
|
|
there are a couple phone #'s for finding your dial port(these are also
|
|
customer assistance):
|
|
|
|
1-800-267-6574 (Within Canada)
|
|
1-613-781-6798
|
|
|
|
Also, these numbers function only from 8:30 to 5:00 EST(Eastern Standard
|
|
Time).Also, the Datapac Information Service(DIS) at NUA 92100086 has a
|
|
complete list of all public dial-ins.
|
|
I think you can use both communication parameter settings work, but 8/N/1
|
|
(8 data bits, No parity, 1 stop bit) is used most frequently, so set it
|
|
initially at that. Some NUA's on Datapac use 7/E/1, change to it if needed
|
|
after you are connected to a Datapac dial-in.
|
|
Ok,if you have your Datapac 3000 Public Indial number, you've set your
|
|
communication parameters at 8/N/1, then you are now set to go. Dial your
|
|
indial just like a BBS(duh..) and once connnected:
|
|
You will have a blank screen;
|
|
Type 3 periods and press RETURN (this is to tell Dpac to initialize itself)
|
|
The Datapac herald will flash up stating:
|
|
DATAPAC : XXXX XXXX (your in-dial's NUA)
|
|
You are now ready to enter commands to Datapac.
|
|
|
|
Example:
|
|
(YOU ENTER) atdt 16046627732
|
|
(YOU ENTER) ...
|
|
(DATAPAC RESPONDS) DATAPAC : 6710 1071
|
|
|
|
Now you are all set to enter the NUA for your destination.
|
|
NUAs on Datapac must be 8 to 10 digits(not including mnemonics).
|
|
8 is standard, but 9 or 10 is possible depending on usage of subaddressing.
|
|
NUA prefixes on Datapac are handed out in blocks, meaning they do not
|
|
correspond to Area Codes, but by looking at the surrounding prefixes, you can
|
|
tell where a prefix is located. When scanning on Datapac, keep in mind most of
|
|
the valid NUAs are found in the low numbers, so to sample a prefix go from
|
|
(example) 12300001 to 12300200. It is a good idea, however, to scan the prefix
|
|
right up until 2000, the choice is yours.
|
|
|
|
DNIC List
|
|
---------
|
|
|
|
Here is a list of the previous PSN's DNICs, and most of the other DNICs
|
|
for PSNs world wide. This was taken from the DIS, with a number of my own
|
|
additions that were omitted(the DIS did not include other Canadian or
|
|
American PSNs). The extras DNICs came from my own experience and various
|
|
BBS lists.
|
|
|
|
COUNTRY NETWORK DNIC DIRECTION
|
|
------- ------- ---- ---------
|
|
|
|
ANDORRA ANDORPAC 2945 BI-DIR
|
|
ANTIGUA AGANET 3443 INCOMING
|
|
ARGENTINA ARPAC 7220 BI-DIR
|
|
ARPAC 7222 BI-DIR
|
|
AUSTRIA DATEX-P 2322 BI-DIR
|
|
DATEX-P TTX 2323 BI-DIR
|
|
RA 2329 BI-DIR
|
|
AUSTRALIA AUSTPAC 5052 BI-DIR
|
|
OTC DATA ACCESS 5053 BI-DIR
|
|
AZORES TELEPAC 2680 BI-DIR
|
|
BAHAMAS BATELCO 3640 BI-DIR
|
|
BAHRAIN BAHNET 4263 BI-DIR
|
|
BARBADOS IDAS 3423 BI-DIR
|
|
BELGIUM DCS 2062 BI-DIR
|
|
DCS 2068 BI-DIR
|
|
DCS 2069 BI-DIR
|
|
BELIZE BTLDATAPAC 7020 BI-DIR
|
|
BERMUDA BERMUDANET 3503 BI-DIR
|
|
BRAZIL INTERDATA 7240 BI-DIR
|
|
RENPAC 7241 BI-DIR
|
|
RENPAC 7248 INCOMING
|
|
RENPAC 7249 INCOMING
|
|
BULGARIA BULPAC 2841 BI-DIR
|
|
BURKINA FASO BURKIPAC 6132 BI-DIR
|
|
CAMEROON CAMPAC 6242 BI-DIR
|
|
CANADA DATAPAC 3020 BI-DIR
|
|
GLOBEDAT 3025 BI-DIR
|
|
CNCP PACKET NET 3028 BI-DIR
|
|
CNCP INFO SWITCH 3029 BI-DIR
|
|
CAYMAN ISLANDS IDAS 3463 BI-DIR
|
|
CHAD CHADPAC 6222 BI-DIR
|
|
CHILE ENTEL 7302 BI-DIR
|
|
CHILE-PAC 7303 INCOMING
|
|
VTRNET 7305 BI-DIR
|
|
ENTEL 7300 INCOMING
|
|
CHINA PTELCOM 4600 BI-DIR
|
|
COLOMBIA COLDAPAQ 7322 BI-DIR
|
|
COSTA RICA RACSAPAC 7120 BI-DIR
|
|
RACSAPAC 7122 BI-DIR
|
|
RACSAPAC 7128 BI-DIR
|
|
RACSAPAC 7129 BI-DIR
|
|
CUBA CUBA 2329 BI-DIR
|
|
CURACAO DATANET-1 3621 BI-DIR
|
|
CYPRUS CYTAPAC 2802 BI-DIR
|
|
CYTAPAC 2807 BI-DIR
|
|
CYTAPAC 2808 BI-DIR
|
|
CYTAPAC 2809 BI-DIR
|
|
DENMARK DATAPAK 2382 BI-DIR
|
|
DATAPAK 2383 BI-DIR
|
|
DJIBOUTI STIPAC 6382 BI-DIR
|
|
DOMINICAN REP. UDTS-I 3701 INCOMING
|
|
EGYPT ARENTO 6020 BI-DIR
|
|
ESTONIA ESTPAC 2506 BI-DIR
|
|
FIJI FIJIPAC 5420 BI-DIR
|
|
FINLAND DATAPAK 2441 BI-DIR
|
|
DATAPAK 2442 BI-DIR
|
|
DIGIPAK 2443 BI-DIR
|
|
FRANCE TRANSPAC 2080 BI-DIR
|
|
NTI 2081 BI-DIR
|
|
TRANSPAC 2089 BI-DIR
|
|
TRANSPAC 9330 INCOMING
|
|
TRANSPAC 9331 INCOMING
|
|
TRANSPAC 9332 INCOMING
|
|
TRANSPAC 9333 INCOMING
|
|
TRANSPAC 9334 INCOMING
|
|
TRANSPAC 9335 INCOMING
|
|
TRANSPAC 9336 INCOMING
|
|
TRANSPAC 9337 INCOMING
|
|
TRANSPAC 9338 INCOMING
|
|
TRANSPAC 9339 INCOMING
|
|
FR ANTILLIES TRANSPAC 2080 BI-DIR
|
|
FR GUIANA TRANSPAC 2080 BI-DIR
|
|
FR POLYNESIA TOMPAC 5470 BI-DIR
|
|
GABON GABONPAC 6282 BI-DIR
|
|
GERMANY F.R. DATEX-P 2624 BI-DIR
|
|
DATEX-C 2627 BI-DIR
|
|
GREECE HELPAK 2022 BI-DIR
|
|
HELLASPAC 2023 BI-DIR
|
|
GREENLAND KANUPAX 2901 BI-DIR
|
|
GUAM LSDS-RCA 5350 BI-DIR
|
|
PACNET 5351 BI-DIR
|
|
GUATEMALA GUATEL 7040 INCOMING
|
|
GUATEL 7043 INCOMING
|
|
HONDURAS HONDUTEL 7080 INCOMING
|
|
HONDUTEL 7082 BI-DIR
|
|
HONDUTEL 7089 BI-DIR
|
|
HONG KONG INTELPAK 4542 BI-DIR
|
|
DATAPAK 4545 BI-DIR
|
|
INET HK 4546 BI-DIR
|
|
HUNGARY DATEX-P 2160 BI-DIR
|
|
DATEX-P 2161 BI-DIR
|
|
ICELAND ICEPAK 2740 BI-DIR
|
|
INDIA GPSS 4042 BI-DIR
|
|
RABMN 4041 BI-DIR
|
|
I-NET 4043 BI-DIR
|
|
INDONESIA SKDP 5101 BI-DIR
|
|
IRELAND EIRPAC 2721 BI-DIR
|
|
EIRPAC 2724 BI-DIR
|
|
ISRAEL ISRANET 4251 BI-DIR
|
|
ITALY DARDO 2222 BI-DIR
|
|
ITAPAC 2227 BI-DIR
|
|
IVORY COAST SYTRANPAC 6122 BI-DIR
|
|
JAMAICA JAMINTEL 3380 INCOMING
|
|
JAPAN GLOBALNET 4400 BI-DIR
|
|
DDX 4401 BI-DIR
|
|
NIS-NET 4406 BI-DIR
|
|
VENUS-P 4408 BI-DIR
|
|
VENUS-P 9955 INCOMIMG
|
|
VENUS-C 4409 BI-DIR
|
|
NI+CI 4410 BI-DIR
|
|
KENYA KENPAC 6390 BI-DIR
|
|
KOREA REP HINET-P 4500 BI-DIR
|
|
DACOM-NET 4501 BI-DIR
|
|
DNS 4503 BI-DIR
|
|
KUWAIT BAHNET 4263 BI-DIR
|
|
LEBANON SODETEL 4155 BI-DIR
|
|
LIECHTENSTEIN TELEPAC 2284 BI-DIR
|
|
TELEPAC 2289 BI-DIR
|
|
LUXEMBOURG LUXPAC 2704 BI-DIR
|
|
LUXPAC 2709 BI-DIR
|
|
MACAU MACAUPAC 4550 BI-DIR
|
|
MADAGASCAR INFOPAC 6460 BI-DIR
|
|
MADEIRA TELEPAC 2680 BI-DIR
|
|
MALAYSIA MAYPAC 5021 BI-DIR
|
|
MAURITIUS MAURIDATA 6170 BI-DIR
|
|
MEXICO TELEPAC 3340 BI-DIR
|
|
MOROCCO MOROCCO 6040 BI-DIR
|
|
MOZAMBIQUE COMPAC 6435 BI-DIR
|
|
NETHERLANDS DATANET-1 2040 BI-DIR
|
|
DATANET-1 2041 BI-DIR
|
|
DABAS 2044 BI-DIR
|
|
DATANET-1 2049 BI-DIR
|
|
N. MARIANAS PACNET 5351 BI-DIR
|
|
NEW CALEDONIA TOMPAC 5460 BI-DIR
|
|
NEW ZEALAND PACNET 5301 BI-DIR
|
|
NIGER NIGERPAC 6142 BI-DIR
|
|
NORWAY DATAPAC TTX 2421 BI-DIR
|
|
DATAPAK 2422 BI-DIR
|
|
DATAPAC 2423 BI-DIR
|
|
PAKISTAN PSDS 4100 BI-DIR
|
|
PANAMA INTELPAQ 7141 BI-DIR
|
|
INTELPAQ 7142 BI-DIR
|
|
PAPUA-NEW GUINEA PANGPAC 5053 BI-DIR
|
|
PARAGUAY ANTELPAC 7447 BI-DIR
|
|
PERU DICOTEL 7160 BI-DIR
|
|
PHILIPPINES CAPWIRE 5150 INCOMING
|
|
CAPWIRE 5151 BI-DIR
|
|
PGC 5152 BI-DIR
|
|
GLOBENET 5154 BI-DIR
|
|
ETPI 5156 BI-DIR
|
|
POLAND POLAK 2601 BI-DIR
|
|
PORTUGAL TELEPAC 2680 BI-DIR
|
|
SABD 2682 BI-DIR
|
|
PUERTO RICO UDTS 3300 BI-DIR
|
|
UDTS 3301 BI-DIR
|
|
QATAR DOHPAC 4271 BI-DIR
|
|
REUNION (FR) TRANSPAC 2080 BI-DIR
|
|
RWANDA RWANDA 6352 BI-DIR
|
|
SAN MARINO X-NET 2922 BI-DIR
|
|
SAUDI ARABIA ALWASEED 4201 BI-DIR
|
|
SENEGAL SENPAC 6081 BI-DIR
|
|
SEYCHELLES INFOLINK 6331 BI-DIR
|
|
SINGAPORE TELEPAC 5252 BI-DIR
|
|
TELEPAC 5258 BI-DIR
|
|
SOLOMON ISLANDS DATANET 5400 BI-DIR
|
|
SOUTH AFRICA SAPONET 6550 BI-DIR
|
|
SAPONET 6551 BI-DIR
|
|
SAPONET 6559 BI-DIR
|
|
SPAIN TIDA 2141 BI-DIR
|
|
IBERPAC 2145 BI-DIR
|
|
SRI-LANKA DATANET 4132 BI-DIR
|
|
SWEDEN DATAPAK TTX 2401 BI-DIR
|
|
DATAPAK-2 2403 BI-DIR
|
|
DATAPAK-2 2407 BI-DIR
|
|
SWITZERLAND TELEPAC 2284 BI-DIR
|
|
TELEPAC 2285 BI-DIR
|
|
TELEPAC 2289 BI-DIR
|
|
TAIWAN PACNET 4872 BI-DIR
|
|
PACNET 4873 BI-DIR
|
|
UDAS 4877 BI-DIR
|
|
TCHECOSLOVAKA DATEX-P 2301 BI-DIR
|
|
THAILAND THAIPAC 5200 BI-DIR
|
|
IDAR 5201 BI-DIR
|
|
TONGA DATAPAK 5390 BI-DIR
|
|
TOGOLESE REP. TOGOPAC 6152 BI-DIR
|
|
TORTOLA IDAS 3483 INCOMING
|
|
TRINIDAD DATANETT 3745 BI-DIR
|
|
TEXTET 3740 BI-DIR
|
|
TUNISIA RED25 6050 BI-DIR
|
|
TURKEY TURPAC 2862 BI-DIR
|
|
TURPAC 2863 BI-DIR
|
|
TURKS&CAICOS IDAS 3763 INCOMING
|
|
U ARAB EMIRATES EMDAN 4241 BI-DIR
|
|
EMDAN 4243 BI-DIR
|
|
TEDAS 4310 INCOMING
|
|
URUGUAY URUPAC 7482 BI-DIR
|
|
URUPAC 7489 BI-DIR
|
|
USSR IASNET 2502 BI-DIR
|
|
U.S.A. WESTERN UNION 3101 BI-DIR
|
|
MCI 3102 BI-DIR
|
|
ITT/UDTS 3103 BI-DIR
|
|
WUI 3104 BI-DIR
|
|
BT-TYMNET 3106 BI-DIR
|
|
SPRINTNET 3110 BI-DIR
|
|
RCA 3113 BI-DIR
|
|
WESTERN UNION 3114 BI-DIR
|
|
DATAPAK 3119 BI-DIR
|
|
PSTS 3124 BI-DIR
|
|
UNINET 3125 BI-DIR
|
|
ADP AUTONET 3126 BI-DIR
|
|
COMPUSERVE 3132 BI-DIR
|
|
AT&T ACCUNET 3134 BI-DIR
|
|
FEDEX 3138 BI-DIR
|
|
NET EXPRESS 3139 BI-DIR
|
|
SNET 3140 BI-DIR
|
|
BELL SOUTH 3142 BI-DIR
|
|
BELL SOUTH 3143 BI-DIR
|
|
NYNEX 3144 BI-DIR
|
|
PACIFIC BELL 3145 BI-DIR
|
|
SWEST BELL 3146 BI-DIR
|
|
U.S. WEST 3147 BI-DIR
|
|
CENTEL 3148 BI-DIR
|
|
FEDEX 3150 BI-DIR
|
|
U.S. VIRGIN I UDTS 3320 BI-DIR
|
|
U. KINGDOM IPSS-BTI 2341 BI-DIR
|
|
PSS-BT 2342 BI-DIR
|
|
GNS-BT 2343 BI-DIR
|
|
MERCURY 2350 BI-DIR
|
|
MERCURY 2351 BI-DIR
|
|
HULL 2352 BI-DIR
|
|
VANUATU VIAPAC 5410 BI-DIR
|
|
VENEZUELA VENEXPAQ 7342 BI-DIR
|
|
YUGOSLAVIA YUGOPAC 2201 BI-DIR
|
|
ZIMBABWE ZIMNET 6484 BI-DIR
|
|
|
|
|
|
SYSTEM PENETRATION
|
|
==================
|
|
------------------
|
|
|
|
Ok, now that you've hopefully found some systems, you are going to need to
|
|
know how to identify and, with any luck, get in these newfound delights.
|
|
What follows is a list of as many common systems as i could find. The
|
|
accounts listed along with it are not, per say, 'defaults'. There are very
|
|
few actual defaults. These are 'common accounts', in that it is likely that
|
|
many of these will be present. So, try them all, you might get lucky.
|
|
The list of common accounts will never be complete, but mine is fairly
|
|
close. I've hacked into an incredible amount of systems, and because of this
|
|
I've been able to gather a fairly extensive list of common accounts.
|
|
Where I left the password space blank, just try the username(and anything
|
|
else you want), as there are no common passwords other than the username
|
|
itself.
|
|
And also, in the password space I never included the username as a
|
|
password, as it is a given in every case that you will try it.
|
|
And remember, passwords given are just guidelines, try what you want.
|
|
|
|
UNIX- Unix is one of the most widespread Operating Systems in the
|
|
world; if you scan a PSN, chances are you'll find a number of
|
|
Unixes, doesn't matter where in the world the PSN resides.
|
|
The default login prompt for a unix system is 'login', and
|
|
while that cannot be changed, additional characters might
|
|
be added to preface 'login', such as 'rsflogin:'. Hit <CR> a
|
|
few times and it should disappear.
|
|
Because UNIX is a non-proprietary software, there are many
|
|
variants of it, such as Xenix, SCO, SunOS, BSD, etc.., but
|
|
the OS stays pretty much the same.
|
|
As a rule, usernames are in lowercase only, as are passwords,
|
|
but Unix is case sensitive so you might want to experiment if
|
|
you aren't getting any luck.
|
|
You are generally allowed 4 attempts at a login/password, but
|
|
this can be increased or decreased at the sysadmins whim.
|
|
Unfortunely, UNIX does not let you know when the username
|
|
you have entered is incorrect.
|
|
UNIX informs the user of when the last bad login attempt was
|
|
made, but nothing more. However, the sysadmin can keep logs
|
|
and audit trails if he so wishes, so watch out.
|
|
When inside a UNIX, type 'cat /etc/passwd'. This will give
|
|
you the list of usernames, and the encrypted passwords.
|
|
The command 'who' gives a list of users online.
|
|
'Learn' and 'man' bring up help facilities.
|
|
Once inside, you will standardly receive the prompt $ or %
|
|
for regular users, or # for superusers.
|
|
The root account is the superuser, and thus the password
|
|
could be anything, and is probably well protected. I left
|
|
this blank, it is up to you. There won't be any common
|
|
passwords for root.
|
|
|
|
COMMON ACCOUNTS:
|
|
|
|
Username Password
|
|
-------- --------
|
|
root
|
|
daemon
|
|
adm admin, sysadm, sysadmin, operator, manager
|
|
uucp
|
|
bin
|
|
sys
|
|
123 lotus, lotus123
|
|
adduser
|
|
admin adm,sysadm,sysadmin,operator,manager
|
|
anon anonymous
|
|
anonuucp anon, uucp, nuucp
|
|
anonymous anon
|
|
asg device devadmin
|
|
audit
|
|
auth
|
|
backappl
|
|
backup save, tar
|
|
batch
|
|
bbx
|
|
blast
|
|
bupsched
|
|
cbm
|
|
cbmtest
|
|
checkfsys
|
|
control
|
|
cron
|
|
csr support, custsup
|
|
dbcat database, catalog
|
|
default user, guest
|
|
demo tour, guest
|
|
dev
|
|
devel
|
|
devshp
|
|
diag sysdiag, sysdiags, diags, test
|
|
diags diag, sysdiag, sysdiags
|
|
dialup
|
|
dos
|
|
fax
|
|
field fld, service, support, test
|
|
filepro
|
|
finger
|
|
fms
|
|
friend guest, visitor
|
|
games
|
|
general
|
|
gp
|
|
gsa
|
|
guest visitor, demo, friend, tour
|
|
help
|
|
host
|
|
hpdb
|
|
info
|
|
informix database
|
|
ingres database
|
|
inquiry
|
|
install
|
|
journal
|
|
journals
|
|
kcml
|
|
learn
|
|
lib library, syslib
|
|
link
|
|
listen
|
|
lp print spooler lpadmin
|
|
lpadmin lp, adm, admin
|
|
lpd
|
|
ls
|
|
mail
|
|
maint sysmaint, service
|
|
makefsys
|
|
man
|
|
manager mgr, man, sysmgr, sysman, operator
|
|
mdf
|
|
menu
|
|
mountfsys
|
|
ncrm ncr
|
|
net network
|
|
netinst inst, install, net, network
|
|
netman net, man, manager, mgr, netmgr, network
|
|
netmgr net, man, manager, mgr, netmgr, network
|
|
network net
|
|
newconv
|
|
news
|
|
nobody anon
|
|
nuucp anon
|
|
oasys oa
|
|
odt opendesktop
|
|
online
|
|
openmail mail
|
|
oper operator,manager,adm,admin,sysadmin,mgr
|
|
operator sysop, oper, manager
|
|
opp
|
|
oracle database
|
|
oraclev5 oracle, database
|
|
oradev oracle
|
|
pcs
|
|
pcsloc
|
|
pctest
|
|
postmaster mail
|
|
powerdown shutdown
|
|
priv private
|
|
prod
|
|
pub public
|
|
public pub
|
|
reboot
|
|
remote
|
|
report
|
|
rha
|
|
rje
|
|
rsm
|
|
rsmadm rsm, adm, admin
|
|
rusr
|
|
sales
|
|
sas
|
|
save backup
|
|
savep
|
|
service field, support
|
|
setup
|
|
shutdown
|
|
smtp mail
|
|
softwork
|
|
space
|
|
startup
|
|
su
|
|
sundiag sysdiag, diag, diags, sysdiags
|
|
suoper su, oper, operator
|
|
super supervisor, manager, operator
|
|
support field, service
|
|
sync
|
|
sysadm adm, admin, operator, manager
|
|
sysdiag diag, diags, sysdiags
|
|
sysinfo info
|
|
sysmaint maint, service
|
|
sysman manager,mgr,man,admin,operator,sysadmin
|
|
sysmgr manager,mgr,man,admin,operator,sysadmin
|
|
system sys, unix, shell, syslib, lib, operator
|
|
systest test, tester, testuser, user
|
|
test tester, testuser, systest, user
|
|
tester test, user, testuser
|
|
testuser test, tester, user, systest
|
|
tftp
|
|
tour demo, guest, user, visitor
|
|
transfer
|
|
tty
|
|
tutor
|
|
tutorial
|
|
umountfsys
|
|
unix
|
|
unixmail mail, unix
|
|
user guest, demo
|
|
userp user
|
|
usr user
|
|
usrlimit
|
|
utest
|
|
uucpadm adm, admin, uucp
|
|
uuadm uucp, adm
|
|
uuadmin uucp, admin
|
|
uuhost uucp, host
|
|
uulog uucp, log
|
|
uunx uucp
|
|
uupick uucp, pick
|
|
uustat uucp, stat
|
|
uuto uucp, to
|
|
uux uucp
|
|
va
|
|
vashell
|
|
vax
|
|
visitor guest, friend, demo, tour
|
|
vlsi
|
|
vmsys vm, face
|
|
vsifax
|
|
who
|
|
wp
|
|
wp51
|
|
x25 pad
|
|
x25test test
|
|
x400
|
|
|
|
VMS- DEC's Virtual Memory System commonly runs on VAX computers.
|
|
It is another very widespread system, with many users world
|
|
wide.
|
|
VMS will have a 'Username:' prompt, and to be sure just type
|
|
in a ',' for a username. A VMS will throw back an error
|
|
message on special delimeters.
|
|
You will standardly get 3 and only three login attempts, and
|
|
VMS is not kind enough to let you know when you have entered
|
|
an incorrect username.
|
|
Once inside you will find yourself at a $ prompt.
|
|
|
|
COMMON ACCOUNTS:
|
|
|
|
Username Password
|
|
-------- --------
|
|
backup
|
|
batch
|
|
dcl
|
|
dec
|
|
decmail mail
|
|
decnet
|
|
default default, user
|
|
dialup
|
|
demo guest
|
|
dsmmanager dsm, manager
|
|
dsmuser dsm, user
|
|
field field, service, support, test, digital
|
|
games
|
|
guest visitor, demo
|
|
help
|
|
helpdesk
|
|
help_desk helpdesk
|
|
host
|
|
info
|
|
ingres database
|
|
interactive
|
|
link
|
|
local
|
|
mail
|
|
mailer mail
|
|
mbmanager mb, manager, mgr, man
|
|
mbwatch watch, mb
|
|
mpdbadmin mpdb, admin
|
|
netcon net, network
|
|
netmgr net, manager, mgr, operator
|
|
netpriv network, private, priv, net
|
|
netserver
|
|
network net
|
|
newingres ingres
|
|
news
|
|
operations operations
|
|
operator oper, manager, mgr, admin,
|
|
opervax operator, vax
|
|
ops
|
|
oracle
|
|
pcsdba
|
|
pfmuser pfm, user
|
|
postmaster mail
|
|
priv private
|
|
remote
|
|
report
|
|
rje remote, job, entry
|
|
student
|
|
suggest suggest
|
|
sys
|
|
sysmaint sysmaint, maint, service, digital
|
|
system manager,operator,sys,syslib
|
|
systest uetp,test
|
|
systest_clig systest, test
|
|
tapelib
|
|
teledemo demo
|
|
test testuser, tester
|
|
uetp
|
|
user test, guest, demo
|
|
userp user
|
|
vax
|
|
vms
|
|
visitor guest, demo
|
|
wpusers
|
|
|
|
HP3000- HP3000 mainframes run the MPE series of operating systems,
|
|
such as MPE, V, ix, X, and XL.
|
|
The default login prompt is ':', but this can be prefaced
|
|
with characters(ie: 'mentor:') and in some cases the ':' may
|
|
be taken completely away (ie: 'mentor'). To check for a
|
|
HP3000, hit a <CR>, you will get an error message such as this;
|
|
EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON. (CIERR 1402)
|
|
To login type 'hello', followed by the login information,
|
|
which is in this format: USER.ACCOUNT,GROUP.
|
|
The group is optional, but may be needed in some cases, and
|
|
can give you different file sets and the sort.
|
|
A great thing about HP3000's is they tell you exactly what
|
|
is incorrect about the login name you've supplied them,
|
|
be it the account is valid but the username is wrong, or the
|
|
other way around.
|
|
But unfortunely, if the system operators choose, they may
|
|
password ALL of the login name segments; username, account
|
|
and group.
|
|
The internal prompt for MPE's is, again, :.
|
|
'Help' will give you help when inside a HP3000.
|
|
When entering accounts, i'd suggest not to use a group at
|
|
first. If you receive the error message 'not in home group',
|
|
then try the group PUB, then if even that fails, move on to
|
|
the common group list.
|
|
I didn't list passwords along with the accounts, as it would
|
|
be a bit of an awkward format, because of MPE's awkward
|
|
format. The only manufacturer default passwords I am aware
|
|
of are 'hponly', for mgr.telesup, 'lotus', for mgr.sys, and
|
|
'hpword' for field.support.
|
|
Just remember to try the various parts of the account as a
|
|
password, and anything else along those lines.
|
|
If you need a password for the following user.accounts &
|
|
groups, try the various parts of the name plus any
|
|
combinations of it or names with obvious links to it(ie:
|
|
field=service).
|
|
|
|
COMMON ACCOUNTS:
|
|
|
|
Username.Account
|
|
----------------
|
|
mgr.3000devs
|
|
mgr.acct
|
|
mgr.backup
|
|
manager.blast
|
|
manager.blast1
|
|
mgr.ccc
|
|
spool.ccc
|
|
mgr.cnas
|
|
manager.cognos
|
|
mgr.cognos
|
|
operator.cognos
|
|
mgr.common
|
|
mgr.company
|
|
mgr.conv
|
|
mgr.corp
|
|
mgr.cslxl
|
|
mgr.demo
|
|
operator.disc
|
|
mgr.easy
|
|
mgr.easydev
|
|
mgr.extend
|
|
mgr.hpdesk
|
|
mgr.hplanmgr
|
|
field.hpncs
|
|
mgr.hpncs
|
|
advmail.hpoffice
|
|
deskmon.hpoffice
|
|
mail.hpoffice
|
|
mailman.hpoffice
|
|
mailroom.hpoffice
|
|
mailtrck.hpoffice
|
|
manager.hpoffice
|
|
mgr.hpoffice
|
|
openmail.hpoffice
|
|
pcuser.hpoffice
|
|
spoolman.hpoffice
|
|
x400fer.hpoffice
|
|
x400xfer.hpoffice
|
|
wp.hpoffice
|
|
mgr.hponly
|
|
mgr.hpoptmgt
|
|
field.hpp187
|
|
mgr.hpp187
|
|
mgr.hpp189
|
|
mgr.hpp196
|
|
mgr.hppl85
|
|
mgr.hppl87
|
|
mgr.hppl89
|
|
mgr.hppl96
|
|
mgr.hpskts
|
|
mgr.hpspool
|
|
mgr.hpword
|
|
mgr.hpx11
|
|
dpcont.hq
|
|
mgr.hq
|
|
mgr.indhpe
|
|
mgr.infosys
|
|
mgr.intx3
|
|
manager.itf3000
|
|
mail.mail
|
|
mgr.netbase
|
|
mgr.netware
|
|
operator.netware
|
|
mgr.orbit
|
|
mgr.prod
|
|
mgr.rego
|
|
mgr.remacct
|
|
mgr.rje
|
|
manager.security
|
|
mgr.security
|
|
mgr.sldemo
|
|
mgr.snads
|
|
mgr.softrep
|
|
mgr.speedwre
|
|
mgr.spool
|
|
manager.starbase
|
|
field.support
|
|
mgr.support
|
|
operator.support
|
|
exploit.sys
|
|
manager.sys
|
|
mgr.sys
|
|
operator.sys
|
|
pcuser.sys
|
|
rsbcmon.sys
|
|
operator.syslib
|
|
sysrpt.syslib
|
|
mgr.sysmgr
|
|
operator.system
|
|
mgr.tech
|
|
mgr.techxl
|
|
mgr.telamon
|
|
field.hpword
|
|
mgr.opt
|
|
manager.tch
|
|
field.telesup
|
|
mgr.telesup
|
|
sys.telesup
|
|
mgr.tellx
|
|
monitor.tellx
|
|
mgr.utility
|
|
mgr.vecsl
|
|
manager.vesoft
|
|
mgr.vesoft
|
|
mgr.word
|
|
field.xlserver
|
|
mgr.xlserver
|
|
mgr.xpress
|
|
|
|
COMMON GROUPS:
|
|
|
|
admin
|
|
advmail
|
|
ask
|
|
brwexec
|
|
brwonlne
|
|
brwspec
|
|
bspadmin
|
|
bspdata
|
|
bspinstx
|
|
bsptools
|
|
catbin1
|
|
catbin2
|
|
catlib
|
|
classes
|
|
config
|
|
console
|
|
convert
|
|
creator
|
|
curator
|
|
currarc
|
|
current
|
|
dat
|
|
data
|
|
database
|
|
delivery
|
|
deskmon
|
|
devices
|
|
diadb
|
|
diag
|
|
diafile
|
|
diaipc
|
|
doc
|
|
docxl
|
|
document
|
|
dsg
|
|
easy
|
|
ems
|
|
emskit
|
|
etdaemon
|
|
example
|
|
examples
|
|
ezchart
|
|
galpics
|
|
graphics
|
|
hold
|
|
hpaccss
|
|
hpadvlk
|
|
hpadvml
|
|
hpdesk
|
|
hpdraw
|
|
hpecm
|
|
hpemm
|
|
hpenv
|
|
hpgal
|
|
hphpbkp
|
|
hplibry
|
|
hplist
|
|
hplt123
|
|
hpmail
|
|
hpmap
|
|
hpmenu
|
|
hpprofs
|
|
hpsw
|
|
hptelex
|
|
ibmpam
|
|
idl
|
|
idlc
|
|
idpxl
|
|
include
|
|
infoxl
|
|
instx
|
|
internal
|
|
itpxl
|
|
job
|
|
lib
|
|
libipc
|
|
library
|
|
mailconf
|
|
maildb
|
|
mailhelp
|
|
mailjob
|
|
maillib
|
|
mailserv
|
|
mailstat
|
|
mailtell
|
|
mailxeq
|
|
mediamgr
|
|
memo
|
|
memory
|
|
mgr
|
|
mmgrdata
|
|
mmgrxfer
|
|
mmordata
|
|
mmorxfer
|
|
monitor
|
|
mpexl
|
|
ndfiles
|
|
ndports
|
|
net
|
|
network
|
|
nwoconf
|
|
office
|
|
oldmail
|
|
oper
|
|
operator
|
|
out
|
|
pascalc
|
|
patchxl
|
|
pcbkp
|
|
ppcdict
|
|
ppcsave
|
|
ppcutil
|
|
prntmate
|
|
prog
|
|
prvxl
|
|
pub
|
|
pubxl
|
|
qedit
|
|
ref
|
|
request
|
|
restore
|
|
sample
|
|
sbase
|
|
sfiles
|
|
signal
|
|
sleeper
|
|
snax25
|
|
sql
|
|
sruntime
|
|
subfile
|
|
suprvisr
|
|
sx
|
|
sys
|
|
sysmgr
|
|
sysvol
|
|
tdpdata
|
|
telex
|
|
telexjob
|
|
text
|
|
tfm
|
|
ti
|
|
tools
|
|
transmit
|
|
user
|
|
users
|
|
validate
|
|
viewlib
|
|
visicalc
|
|
wp
|
|
wp3
|
|
x400data
|
|
x400db
|
|
x400fer
|
|
x400file
|
|
xspool
|
|
|
|
VM/CMS- The VM/CMS Operating System is found on IBM mainframes, and
|
|
while there are quite a few out there, they are commonly left
|
|
alone by hackers who prefer Unix or VMS.
|
|
VM/CMS systems are commonly found gated off Sim3278 VTAMs and
|
|
ISM systems as well.
|
|
The login prompt for CMS is '.', but additional information
|
|
might be given before the prompt, such as;
|
|
Virtual Machine/System Product
|
|
!
|
|
.
|
|
or;
|
|
VM/370
|
|
!
|
|
.
|
|
and frequently over to the side;
|
|
LOGON userid
|
|
DIAL userid
|
|
MSG userid message
|
|
LOGOFF
|
|
but they all represent a VM/CMS system.
|
|
To logon, type 'logon' followed by the username, which is
|
|
usually 1 to 8 characters in length.
|
|
To be sure it is a CMS, type 'logon' followed by some random
|
|
garbage. If it is a VM/CMS, it will reply;
|
|
Userid not in CP directory
|
|
This is one of the great things about CMS, it tells you if
|
|
the login ID you entered is incorrect, thus making the
|
|
finding of valid ones fairly easy.
|
|
One thing to watch out for.. if you attempt brute forcing
|
|
some systems will simply shut the account or even the login
|
|
facility for some time. If that is the case, find out the
|
|
limit and stay just underneath it.. drop carrier or clear the
|
|
circuit if necessary, but if you continually shut down the
|
|
login facilities you will raise a few eyebrows before you
|
|
even make it inside.
|
|
Once inside, typing 'help' will get you a moderate online
|
|
manual.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
$aloc$
|
|
admin operator, manager, adm, sysadmin, sysadm
|
|
alertvm alert
|
|
ap2svp
|
|
apl2pp
|
|
autolog1 autolog
|
|
autolog2 autolog
|
|
batch
|
|
batch1 batch
|
|
batch2 batch
|
|
botinstl
|
|
ccc
|
|
cms
|
|
cmsbatch cms, batch, batch1
|
|
cmsuser cms, user
|
|
cpms
|
|
cpnuc
|
|
cprm
|
|
cspuser user, csp
|
|
cview
|
|
datamove
|
|
demo1 demo
|
|
demo2 demo
|
|
direct
|
|
dirmaint dirmaint1
|
|
diskcnt
|
|
entty
|
|
erep
|
|
formplus
|
|
fsfadmin fsf, adm, sysadmin, sysadm, admin, fsfadm
|
|
fsftask1
|
|
fsftask2
|
|
gcs
|
|
gcsrecon
|
|
idms
|
|
idmsse
|
|
iips
|
|
infm-mgr infm, man, manager, mgr
|
|
inoutmgr mgr, manager
|
|
ipfappl
|
|
ipfserv
|
|
ispvm
|
|
ivpm1
|
|
ivpm2
|
|
maildel
|
|
mailman
|
|
maint service
|
|
moeserv
|
|
netview network, view, net, monitor
|
|
oltsep
|
|
op1
|
|
opbackup backup
|
|
operatns op, operator, manager, admin
|
|
operator op, operatns, manager, admin
|
|
opserver
|
|
pdm470
|
|
pdmremi
|
|
peng
|
|
presdbm dbm
|
|
procal
|
|
prodbm prod
|
|
promail
|
|
psfmaint maint
|
|
pssnews news
|
|
pvm
|
|
router
|
|
rscs
|
|
rscsv2
|
|
savsys
|
|
sfcm1 sfcm
|
|
sfcntrl
|
|
sim3278
|
|
smart
|
|
sna
|
|
sqldba database
|
|
sqluser user, sql
|
|
syncrony
|
|
sysadmin admin, adm, sysadm, manager, operator
|
|
sysckp
|
|
sysdump1 sysdump
|
|
syserr
|
|
syswrm
|
|
tdisk disk, temp
|
|
temp
|
|
tsafvm
|
|
vastest test
|
|
vm3812
|
|
vmarch
|
|
vmasmon
|
|
vmassys
|
|
vmbackup backup
|
|
vmbsysad
|
|
vmmap map
|
|
vmtape tape
|
|
vmtest test, testuser
|
|
vmtlibr
|
|
vmutil util, utils
|
|
vseipo
|
|
vsemaint maint
|
|
vseman
|
|
vsm
|
|
vtam
|
|
vtamuser user, vtam
|
|
x400x25
|
|
|
|
PRIMOS- Run on the Prime company's mainframes, the Primos Operating
|
|
System is in fairly wide use, and is commonly found on
|
|
Packet-Switched Networks worldwide.
|
|
Upon connect you will get a header somewhat like
|
|
PRIMENET 23.3.0 INTENG
|
|
This informs you that it is indeed a Primos computer, the
|
|
version number, and the system identifier the owner picked,
|
|
which is usually the company name or the city the Primos is
|
|
located in. If you find a Primos on a network, you will
|
|
receive the Primenet header, but if it is outside of a
|
|
network, the header may be different(ie:Primecon).
|
|
Hit a number of <CR>'s, and Primos will throw you the login
|
|
prompt 'ER!'.
|
|
At this point, type 'login' followed by your
|
|
username.
|
|
If hitting <CR>'s did not provoke an 'ER!', then type 'login'
|
|
followed by your username.
|
|
If you are blessed and you find some stone age company
|
|
running 18.0.0 or below, you are guaranteed access.
|
|
Just find a username and there will be no password prompt.
|
|
If for some reason passwording exists, a a few control-C's
|
|
should drop you in.
|
|
Unfortunely, Primos almost always allows one and one attempt
|
|
only at a username/password combination before it kicks you
|
|
off, and Primos will not tell you if the ID you've entered is
|
|
invalid.
|
|
Once you are inside, you will find yourself at the prompt
|
|
'OK'.
|
|
'help' brings up a so-so online help guide.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
backup
|
|
backup_terminal
|
|
batch_service
|
|
batch
|
|
bootrun
|
|
cmdnc0
|
|
demo
|
|
diag
|
|
dos
|
|
dsmsr dsm
|
|
dsm_logger dsm
|
|
fam
|
|
games
|
|
guest
|
|
guest1 guest
|
|
lib
|
|
libraries
|
|
login_server
|
|
mail
|
|
mailer
|
|
netlink net, primenet
|
|
netman manager, man, mgr, netmgr
|
|
network_mgt netmgt
|
|
network_server server
|
|
prime primos, system
|
|
primenet net, netlink
|
|
primos prime, system
|
|
primos_cs primos, prime, system
|
|
regist
|
|
rje
|
|
spool
|
|
spoolbin spool
|
|
syscol
|
|
sysovl
|
|
system prime, primos, sys1, operator
|
|
system_debug
|
|
system_manager
|
|
tcpip_manager
|
|
tele
|
|
test
|
|
timer_progress
|
|
tools
|
|
|
|
TOPS-10/20- An older and somewhat rare operating system, TOPS-10 ran on
|
|
the DEC-10/20 machines. You can usually recognize a TOPS-10 by
|
|
its' prompt, a lone period '.', while a TOPS-20 will have a
|
|
'@' in its place. Most systems allow you to enter the commands
|
|
'SYSTAT' or 'FINGER' from the login prompt, before logging in.
|
|
This command will let you see the users online, a valuable aide
|
|
in hacking.
|
|
To login, type 'login xxx,yyy', where the x and y's are
|
|
digits.
|
|
TOPS-10 does let you know when your username is incorrect.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
User ID Code Password
|
|
------------ --------
|
|
1,2 OPERATOR, MANAGER, ADMIN, SYSLIB, LIB
|
|
2,7 MAINT, MAINTAIN, SYSMAINT
|
|
5,30 GAMES
|
|
|
|
IRIS- Unfortunely, i have no experience with IRIS whatsoever. To
|
|
this day i haven't even seen one. So with regret i must
|
|
present old material, the following info comes entirely from
|
|
the LOD/H Technical Journal #3. Hopefully it will still be
|
|
applicable.
|
|
The IRIS Operating System used to run soley on PDP systems,
|
|
but now runs on many various machines.
|
|
IRIS will commonly present itself with a herald such as;
|
|
"Welcome to IRIS R9.1.4 timesharing"
|
|
And then an "ACCOUNT ID?" prompt.
|
|
IRIS is kind enough to tell you when you enter an incorrect
|
|
ID, it won't kick you off after too many attempts, and no
|
|
logs are kept. And strangely enough, passwords are not used!
|
|
So if you can find yourself an IRIS OS, try the following
|
|
defaults and you should drop in..
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username
|
|
--------
|
|
accounting
|
|
boss
|
|
demo
|
|
manager
|
|
noname
|
|
pdp8
|
|
pdp11
|
|
software
|
|
tcl
|
|
|
|
NOS- The NOS(Network Operating System) is found on Cyber
|
|
mainframes made by CDC(the Control Data Corporation).
|
|
Cyber machines are commonly run by institutions such as
|
|
universities and atomic research facilities.
|
|
Cybers will usually give a herald of some sort, such as
|
|
Sheridan Park Cyber 180-830 Computer System
|
|
or
|
|
Sacremento Cyber 180-830 CSUS NOS Software System
|
|
The first login prompt will be 'FAMILY:', just hit <CR>.
|
|
The next prompt is 'USER NAME:'. This is more difficult,
|
|
usually 7 characters. The password is even worse,
|
|
commonly 7 random letters. Sound bad? It is. Brute forcing
|
|
an account is next to impossible.
|
|
I've never seen these defaults work, but they are better than
|
|
nothing. I got them out of the LOD/H Novice's Guide to
|
|
Hacking, written by the Mentor. There are no known passwords
|
|
for these usernames.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username
|
|
--------
|
|
$SYSTEM
|
|
SYSTEMV
|
|
|
|
DECSERVER- The Decserver, is as the name implies, a server made by the
|
|
Digital Equipment Corporation, the same company that makes
|
|
the VAX machines.
|
|
It is possible the owner of the server put a password on it,
|
|
if this is the case you will hit a # prompt. If the server
|
|
has PADs or outdials on it, you can bet this is the case.
|
|
You don't need a username, just the password. You will
|
|
commonly get 3 tries, but it can be modified.
|
|
The default password is 'access', but other good things to
|
|
try are ; server, dec, network, net, system (and whatever
|
|
else goes along with that).
|
|
If you get past the #, or there isn't one, you will hit the
|
|
prompt 'Enter Username>'. What you put really doesn't matter,
|
|
it is just an identifier. Put something normal sounding, and
|
|
not your hacker alias. It is actually interesting to look at
|
|
the users online at a Decserver, as commonly there will be a few users
|
|
with the username C or CCC or the like, usually meaning
|
|
they are probably a fellow hacker.
|
|
Also, at the Enter Username> prompt you are able to ask for
|
|
help with the 'help' command, which spews out fairly lengthly
|
|
logon help file.
|
|
If all went well you should end up at a 'Local>' prompt.
|
|
Decservers have a fairly nice set of help files, simply type
|
|
'help' and read all you want.
|
|
It is a good idea to do a 'show users' when you first logon,
|
|
and next do a 'show services' and 'show nodes'. The services
|
|
are computers hooked up to the Decserver, which you can
|
|
access. For obvious reasons you will often find many VAX/VMS
|
|
systems on Decservers, but pretty much anything can be found
|
|
Look for services titled Dial, Modem, PAD, X25,
|
|
Network, or anthing like that. Try pretty much everything
|
|
you see. Remember to try the usernames you see when you do
|
|
a 'show users' as users for the systems online.
|
|
Also, you will sometimes find your Decserver has Internet
|
|
(Telnet, SLIP or FTP) access, make sure you make full use of
|
|
this.
|
|
To connect to the services you see, use 'c XXXX', where the
|
|
X's represent the service name.
|
|
Once inside, the manufacturer's default for privs is 'system'
|
|
and it is rarely changed.
|
|
The maintenance password changes from version to version.
|
|
With the Decserver 200 & 500 it is 0000000000000000 (16 0's),
|
|
but with 300 it is simply 0.
|
|
|
|
GS/1- GS/1's are another server type system, but they are less
|
|
common than the Decservers. The default prompt is 'GS/1>',
|
|
but this can be changed to the sysadmins liking.
|
|
To check for a GS/1, do a 'sh d', which will print out some
|
|
statistics.
|
|
To find what systems are available from the server, type
|
|
'sh n' or a 'sh c', and a 'sh m' for the system macros.
|
|
|
|
XMUX- The XMUX is a multiplexing system that provides remote
|
|
access, made by Gandalf Technologies, Inc., Gandalf of Canada
|
|
Ltd. in Canada. As far as I can tell, the XMUX is used only on
|
|
Packet-Switched Networks, Datapac in particular but with usage
|
|
on PSNs world wide.
|
|
The XMUX is not usually thought of as a stand alone system,
|
|
but as a supportive system for multi-user networked systems,
|
|
having a bit to do with system monitoring, channel control,
|
|
and some of the features of multiplexing.
|
|
Thus, you'll commonly find a XMUX on a mnemonic or a
|
|
subaddress of another system, although you will find them
|
|
alone on their own NUA frequently as well.
|
|
To find the systems on a subaddress or a mnemonic, your best
|
|
bet is to go with mnemonics, as the LOGGER mnemonic cannot be
|
|
removed, while subaddressing is optional.
|
|
You won't always want to check every single system, so i'll
|
|
give a guideline of where to check;
|
|
(REMINDER: this is only for systems on PSNs, and may not
|
|
apply to your PSN)
|
|
|
|
- PACX/ : The PACX/Starmaster is also made by
|
|
Starmaster Gandalf, and the two are tightly
|
|
Systems interwoven. If mnemonics don't work, be
|
|
sure to try LCNs, as the CONSOLE on a
|
|
PACX/Starmaster is an entirely different
|
|
thing, and frequently using the mnemonic
|
|
CONSOLE will bring you to the PACX
|
|
console, not the XMUX console.
|
|
- BBS Systems : BBS Systems on PSNs frequently need some
|
|
help, and XMUXs are fairly commonly
|
|
found with them.
|
|
- Other misc. : Many of the other operating systems,
|
|
systems such as Unix, AOS/VS, Pick and HP3000
|
|
have the occasional XMUX along with it.
|
|
- Networked : A good portion of networked systems have
|
|
systems XMUXs.
|
|
|
|
If a system does have a XMUX also, you can reach it almost
|
|
always by the mnemonic CONSOLE, and if not, the node name of
|
|
the XMUX. If that doesn't work, try LCNs up to and including
|
|
15.
|
|
Occasionally the console of the XMUX will be unpassworded, in
|
|
which case you will drop straight into the console. The XMUX
|
|
console is self-explanatory and menued, so i will leave you
|
|
to explore it.
|
|
However, in all likeliness you will find yourself at the
|
|
password prompt, 'Password >'. This can not be modified, but
|
|
a one-line herald may be put above it.
|
|
To check for a XMUX, simply hit <CR>. It will tell you that
|
|
the password was invalid, and it must be 1 to 8 alphanumeric
|
|
characters.
|
|
As you can see, you do not need a username for the remote
|
|
console of a XMUX. UIDs are used, but internally within the
|
|
workstation.
|
|
As it says, the password format is 1 to 8 alphanumeric
|
|
characters. There is no default password, the console is left
|
|
unprotected unless the owner decides to password it.
|
|
However, there are common passwords. They are;
|
|
console, gandalf, xmux, system, password, sys, mux xmux1
|
|
I'll repeat them in the common passwords again later.
|
|
But these will not always work, as it is up to the owner to
|
|
pick the password(although they do like those).
|
|
Your next best bet is to find out the node name of the XMUX
|
|
(XMUXs are polling systems as well, usually hooked up somehow
|
|
to one of the regional hubs).
|
|
To do this, you must understand the parts of the XMUX.
|
|
The XMUX has 4 default parts; the CONSOLE, the FOX, the
|
|
LOGGER, and the MACHINE.
|
|
I'll try and define the usage of them a bit more;
|
|
CONSOLE- the main remote part of the XMUX, which performs all
|
|
the maintenance functions and system maintenance.
|
|
the actual system.
|
|
reachable usually on the LCN(subaddress) of 0 or
|
|
4/5, and the default mnemonic CONSOLE, which can be
|
|
changed.
|
|
FOX - a test system, which runs through never ending lines
|
|
of the alphabet and digits 0-9.
|
|
reachable on the LCN of 1, mnemonic FOX.
|
|
LOGGER - a device which displays log information, usually
|
|
one or two lines, including the node name.
|
|
reachable on the LCN of 2, mnemonic LOGGER.
|
|
MACHINE- a system which i do not yet understand fully.
|
|
performs some interesting functions.
|
|
the prompt is '#'.
|
|
type 'S' and you will(always) receive a short/long
|
|
(depending on how much the system is used) system
|
|
status report, containing among other things the
|
|
system node name.
|
|
if active, typing 'L' will bring up a more complete
|
|
system log. This is VERY useful. It contains the
|
|
NUAs of the systems which called the XMUX, and it
|
|
contains the UIDs if used.
|
|
As you can see, the XMUX is rather complicated upon
|
|
first look, but it is actually fairly simple. The easiest
|
|
way to grab the node name is to call the LOGGER.
|
|
The logger MUST be present, always. It is a non-removable
|
|
default. The LCN may be removed, but the mnemonic must stay.
|
|
I explained mnemonics earlier, but i'll refresh your memory.
|
|
To use the mnemonic, simply type the NUA, followed by a comma
|
|
and then the mnemonic, ie;
|
|
12300456,LOGGER
|
|
The very first thing in the data string you see is the node
|
|
name. If it is a blank space, you have run across a rarity,
|
|
a XMUX without a node name.
|
|
The node name is THE most popular thing other than the other
|
|
common passwords.
|
|
Try combinations of it, and combinations of it along with
|
|
the words XMUX and MUX.
|
|
And of course, if a herald is used, use whatever you can find
|
|
in the herald.
|
|
But again, if it is a company, they love to use the company
|
|
name or acronym as a password, and that acronym or name will
|
|
often be the node name.
|
|
Ok, have fun..
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Console Passwords
|
|
-----------------
|
|
CONSOLE
|
|
XMUX
|
|
GANDALF
|
|
SYSTEM
|
|
PASSWORD
|
|
MUX
|
|
XMUX1
|
|
SYS
|
|
(node name)
|
|
|
|
One other thing. I did not include the profile or remote
|
|
profile names, or the UIDs, as they are as far as i know
|
|
inapplicable from remote.
|
|
And a final comment. XMUXs are powerful and potentially
|
|
extremely harmful to a network. DO NOT DELETE ANYTHING. The
|
|
only submenus you will have reason to access are 'DEFINE' and
|
|
'DISPLAY'. Don't boot people off channels or add console
|
|
passwording or remove profiles..you will end up with your ass
|
|
in jail. Taking down a network is less than funny to the
|
|
people that run it. Explore, don't harm.
|
|
|
|
STARMASTER- The Starmaster/PACX 2000 is still a somewhat mysterious
|
|
/PACX system, but i have now explored all the security barriers as
|
|
well as the network and the internal functions, so i feel
|
|
this is fairly complete.
|
|
The Starmaster/PACX system is a networking/server system made
|
|
by, again, Gandalf Technologies Inc., Gandalf of Canada Ltd.,
|
|
in Canada, and is also known informally (and some what
|
|
incorrectly) as the 'Gandalf Access Server.' The Access is
|
|
similar, but different, as described later.
|
|
It is a fairly popular system on Datapac, and has some usage
|
|
in other regions of the world. Again, it is used mainly
|
|
on Packet-Switched Networks, although, thanks to the dialing
|
|
directory of a Sam24V outdial on a Starmaster, I have
|
|
discovered that Starmasters do indeed have dialin access.
|
|
The first possible security barrier is the dialin password,
|
|
which is rarely used, but you should know about.
|
|
The prompt is usually ;
|
|
DIALIN PASSWORD?
|
|
But can be changed, although it should remain similar.
|
|
Dialin passwords are 1 to 8 characters, and are usually
|
|
one of the following defaults;
|
|
GANDALF SERVER PACX NET NETWORK STARMAST DIALIN PASSWORD
|
|
ACCESS
|
|
If the Starmaster has a XMUX resident(explained in previous
|
|
system definition; XMUXs), find out the node name and try it.
|
|
The next possible security barrier is that the sysadmin
|
|
desires the users to enter a username/password before
|
|
entering the server.
|
|
You will find yourself at a prompt such as;
|
|
USERNAME?
|
|
This is the most common prompt.
|
|
Usernames are 1 to 8 characters, and the Starmaster will let
|
|
you know if it is wrong or not with an error message such as;
|
|
INCORRECT USERNAME
|
|
or
|
|
INVALID RESPONSE
|
|
This, like the username prompt, can be changed, but it will
|
|
usually be in all-caps.
|
|
You are allowed between 1 and 10 attempts at either a valid
|
|
username or a valid password, depending on the owners
|
|
preference.
|
|
This means(if it is set to ten tries) you can enter 9 invalid
|
|
usernames, and on the tenth enter a valid username, then have
|
|
10 attempts at a valid password.
|
|
The defaults for this(which i will list later also) prompt
|
|
are; TEST, TESTUSER, TESTER, GANDALF, SYSTEM, GUEST
|
|
USER, HP, CONSOLE, and finally OPERATOR.
|
|
Also, first names will work usually.
|
|
The next prompt you will face, or the first one if usernames
|
|
are not implemented, is the server prompt. This is the main
|
|
user prompt for a Starmaster, all major user commands are
|
|
used from here.
|
|
But as you can guess, commands aren't used really, it is
|
|
service names you desire.
|
|
Sometimes you will get a list upon entering the server, but
|
|
other times you will just hit the server prompt, which
|
|
usually looks something like;
|
|
SERVICE?
|
|
or
|
|
CLASS?
|
|
or even
|
|
service?
|
|
or
|
|
class?
|
|
or
|
|
service
|
|
Or whatever the sysadmin feels like. 'SERVICE?' is the
|
|
default, and the most common.
|
|
Keep in mind that the services CAN be passworded, but
|
|
rarely are. In the case of passwording, use your imagination.
|
|
Another thing; from the PACX console, where the services are
|
|
defined, there is an option which decides whether the service
|
|
is allowed for remote users. If this is set to NO, then you
|
|
are out of luck, you have to be in the workstation to use the
|
|
command. This is common for the CONSOLE and the MAIL, and
|
|
occasionally modems and PADs. You will get an error message
|
|
something like 'SERVICE NOT ALLOWED'.
|
|
I will give a more complete list of common services, but
|
|
I will list the defaults and the major ones now.
|
|
|
|
PAD, X25, X28- Will commonly take you to a Gandalf PAD,
|
|
(or name of for which the default prompt is '*'.
|
|
your PSN) 'HELP' will bring up a list of commands.
|
|
MAIL - A non-removable default, but i've never
|
|
seen it with the remote access flag in the
|
|
ON position.
|
|
CONNECT - Another non-removable default which i have
|
|
never seen with the remote access flag in
|
|
the on position.
|
|
MODEM, DIAL - And variations therof. The common outdial
|
|
is the Gandalf made Sam24V, which comes with
|
|
a great set of help files.
|
|
CONSOLE - The motherlode. The system controller,
|
|
maintenance computer, test machine, and
|
|
all of that. DON'T confuse the PACX console
|
|
with the XMUX console, they are two very
|
|
different things.
|
|
The console should be protected by the
|
|
sysadmin with his/her life, as every faction
|
|
of the Starmaster is controlled from within
|
|
the Console.
|
|
The CONSOLE is a non-removable service from
|
|
the server, BUT remote access can be removed
|
|
thus cutting off our means of getting to it.
|
|
Try it first, if it works the screen will
|
|
scroll down a number of lines and give this
|
|
herald/prompt;
|
|
GANDALF TECHNOLOGIES INCORPORATED, COPYRIGHT 1990
|
|
OPERATOR NAME?
|
|
This is not changable, it will remain the
|
|
same except for possibly the copyright date.
|
|
There can be 8 operators at the most, and
|
|
they will have 1 to 8 characters in their
|
|
name and password. And again, the PACX will
|
|
tell you if your operator name is incorrect.
|
|
You will be allowed 1 to 10 attempts at the
|
|
login name and then it resets to 0 for the
|
|
password attempt when you've found an
|
|
operator name, but same limit.
|
|
The same defaults for the usernames work
|
|
here, if you are lucky, with the exception
|
|
of HP. I'll list them again at the end.
|
|
Once you get in, it is all menued and
|
|
explanatory. DON'T FUCK THINGS UP. By that
|
|
I mean deleting or modifying. Look. There
|
|
is MUCH to see. The PACX console is
|
|
incredibly powerful, and you will have much
|
|
more fun exploring it.
|
|
Besides, once you are in the console, the
|
|
game is over. You have control over all the
|
|
services, users, and all security barriers.
|
|
If you get a high level console account,
|
|
you are the God of the PACX, no joke.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Usernames Passwords
|
|
--------- ---------
|
|
CONSOLE CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
|
|
GAND GAND
|
|
GANDALF GANDALF, SYSTEM, PACX, STARMAST, SYS
|
|
GUEST GUEST, VISITOR, USER
|
|
HP HP
|
|
OPERATOR OPERATOR, SYSTEM, SYSLIB, LIB, GANDALF
|
|
SYSTEM SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
|
|
TEST TEST, TESTUSER, USER, TESTER
|
|
TESTUSER TEST, TESTUSER, USER, TESTER
|
|
TESTER TEST, TESTUSER, USER, TESTER
|
|
USER USER, GUEST, TEST, VISITOR, GANDALF
|
|
(i've never seen an account such as MAINT, but i would guess
|
|
one exists, along with standard system defaults. Try
|
|
anything outside these lines)
|
|
|
|
Services
|
|
--------
|
|
1 (if it works; higher)
|
|
A (through Z)
|
|
10 (if it works; higher in sequence of tens)
|
|
BBS
|
|
CLUSTER
|
|
CONNECT
|
|
CONSOLE
|
|
DATABASE
|
|
DATAPAC
|
|
DEC
|
|
DIAL
|
|
DIALOUT
|
|
FILES
|
|
FTP
|
|
GATEWAY
|
|
GEAC
|
|
HELP
|
|
HP
|
|
INTERNET
|
|
LIB
|
|
LIBRARY
|
|
LOOP
|
|
MAIL
|
|
MENU
|
|
MODEM
|
|
MUX
|
|
NET
|
|
NETWORK
|
|
OUT
|
|
OUTDIAL
|
|
PACX12
|
|
PACX24
|
|
PACX96
|
|
PAD
|
|
PRIME
|
|
PRIMOS
|
|
PROD
|
|
SALES
|
|
SERVER
|
|
SUN
|
|
SUNOS
|
|
SYS
|
|
SYSTEM
|
|
TELNET
|
|
TYMNET
|
|
UNIX
|
|
VAX
|
|
VMS
|
|
X25
|
|
X28
|
|
XCON
|
|
XGATE
|
|
XMUX
|
|
|
|
And anything else you can think of.
|
|
First names are also fairly common.
|
|
|
|
Operator Name Password
|
|
------------- --------
|
|
TEST TEST, TESTUSER, USER, TESTER
|
|
TESTUSER TEST, TESTUSER, USER, TESTER
|
|
TESTER TEST, TESTUSER, USER, TESTER
|
|
GANDALF GANDALF, SYSTEM, PACX, CONSOLE, SYS
|
|
GUEST GUEST, VISITOR, USER
|
|
SYSTEM SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
|
|
CONSOLE
|
|
USER USER, GUEST, TEST, VISITOR, GANDALF
|
|
OPERATOR OPERATOR, SYSTEM, CONSOLE, GANDALF
|
|
CONSOLE CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
|
|
SYS SYS, SYSTEM, GANDALF, PACX, CONSOLE
|
|
|
|
|
|
And again, try first names and ANYTHING you can think of.
|
|
Getting into the console should be your main objective.
|
|
|
|
ACCESS2590- The Access2590 is another Gandalf creation. While it is a
|
|
server system, it is different in some respects to a PACX.
|
|
The Starmaster generally only connects computers on a local
|
|
or wide area network(they do connect to X.25 & IP addresses,
|
|
but they *usually* don't), while the Access 2590 connects
|
|
to local & wide area network services, X.25 address, and IP
|
|
addresses with suprising versatility. The PACX is, however,
|
|
in much wider distribution.
|
|
It will usually have an initial herald screen, often letting
|
|
you know that it is indeed an Access server made by Gandalf.
|
|
If the operator wishes he can include a menu of services
|
|
with their respective descriptions in this provided space.
|
|
Then you will find yourself at a prompt, the default being
|
|
"Access 2590 >". I haven't seen any sort of initial
|
|
protection before you hit that prompt, but i'm betting it
|
|
does exist, and it probably goes along the lines of the PACX.
|
|
Follow the trend I set with the PACX and you should do fine.
|
|
Anyways, the one thing I like so much more about the Access
|
|
2590 compared to the Starmaster is the command "show symbols"
|
|
. That was one of the big problems from a hacking point of
|
|
view with the PACX; it doesn't have a command available to
|
|
show you the services. If you get console access on the PACX
|
|
you can get a listing of services that way, but you simply
|
|
cannot hack a console account everytime, and besides that
|
|
often the owner will have turned the remote console access
|
|
flag off.
|
|
If the operator wanted to give you help with services he had
|
|
to take the initiative himself and design a herald screen or
|
|
implement a help service, and few do. But the "show symbols"
|
|
on an Access will give you a listing of all the available
|
|
"symbols", which is Gandalf's term for services. Connect to
|
|
them with "c xxx" where "xxx" is of course the service.
|
|
And yes, to you eager folks who have tasted the PACX
|
|
console's power, the Access does have a console. Type "c
|
|
console" to get to it.
|
|
Follow the PACX's guidelines, and you'll do fine.
|
|
|
|
PICK- The PICK system was created by Dick Pick(no joke), and is
|
|
a fairly widespread system, there are a few of them out there
|
|
on the major PSNs. I really dislike PICK, but for those of
|
|
you wishing to try it yourself, it is a fairly easy hack.
|
|
A normal PICK login prompt looks somewhat like;
|
|
07 JUN 1993 04:00:21 Logon please:
|
|
Additional data can be entered in that line, and a header
|
|
may be used above that. However, PICKs are usually
|
|
recognizable by that logon prompt which will normally
|
|
contain the date and time, as well as the 'Logon please:'.
|
|
If you aren't sure, enter the username 'SYSPROG', in ALL CAPS
|
|
, as PICK is case sensitive and SYSPROG will be in capitals.
|
|
SYSPROG is the superuser(or as PICK calls it the 'Ultimate
|
|
User') and is similar to root on a Unix; it must be present.
|
|
PICK lets you know when you've entered an invalid Username,
|
|
which is helpful when finding valid accounts.
|
|
Experiment with the upper and lower case if you wish, but
|
|
upper case is the norm.
|
|
The people who make PICK like to think of PICK as more a
|
|
DBMS than an OS, and it is often sold just as that. Because
|
|
of that, you may find it on Unix, MPE, and Primos based
|
|
systems among others.
|
|
One last note, internal passwording is possible on the PICK,
|
|
so don't be too suprised if you think you've found an
|
|
unpassworded system only to be hit by a password before the
|
|
internal prompt.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Usernames Passwords
|
|
--------- ---------
|
|
1
|
|
ACC
|
|
ACCT
|
|
ACCTNAME
|
|
ACCUMATH
|
|
ACCUPLOT
|
|
ACCUPLOT-DEMO ACCUPLOT, DEMO
|
|
ARCHIVE
|
|
AUDITOR
|
|
AUDITORS
|
|
BACKUP
|
|
BATCH
|
|
BLOCK-CONVERT
|
|
BLOCK-PRINT
|
|
COLDSTART
|
|
COMBINATION
|
|
COMM
|
|
COMTEST
|
|
CPA
|
|
CPA.DOC CPA, DOC
|
|
CPA.PROD CPA, PROD
|
|
CTRL.GROUP CTRL, CONTROL
|
|
DEMO
|
|
DA
|
|
DCG
|
|
DEV
|
|
DM DATA, MANAGER, MAN, MGR, DATAMGR, DATAMAN
|
|
DOS
|
|
ERRMSG
|
|
EXCEPTIONAL
|
|
EXECUTE-CONTROL
|
|
EXPRESS.BATCH EXPRESS, BATCH
|
|
FILE-SAVE FILESAVE, SAVE
|
|
FILE-TRANSFER
|
|
FINANCE
|
|
FLUSHER
|
|
FMS
|
|
FMS.PROD FMS, PROD
|
|
GAMES
|
|
GAMES.DOS GAMES
|
|
GENERAL
|
|
INSTANT
|
|
INSTANT.DOS INSTANT
|
|
JOB
|
|
KILL
|
|
LEARN
|
|
LEARN.DLR LEARN, DLR, LEARNDLR
|
|
LOGON
|
|
LOTUS
|
|
LOTUS.DOS LOTUS
|
|
MAIL.BOX MAIL
|
|
MINDER
|
|
MODEM-SECURITY
|
|
MOTD.DATA MOTD
|
|
NETCOM
|
|
NET.OFF
|
|
NETOFF
|
|
NETUSER
|
|
NETWORK
|
|
NEWAC
|
|
NOLOG
|
|
OLD.USER
|
|
ON-LINE-DIAGS DIAGS
|
|
PERFECT-BKGRND
|
|
POINTER-FILE
|
|
PRICE.DOS PRICE
|
|
PRICES.DOS PRICES
|
|
PROCLIB PROC, LIBRARY, LIB
|
|
PROD
|
|
PROMCOR
|
|
PROMIS-ARCHIVE PROMIS, ARCHIVE
|
|
PROMIS-BKGRND PROMIS, BKGRND
|
|
PROMO
|
|
PWP
|
|
QA QUALITY, CONTROL
|
|
SCC.SYSPROG SCC, SYSPROG
|
|
SCREENLIB
|
|
SECURITY
|
|
SET.PLF SET, PLF, PLFSET
|
|
SL
|
|
SPSYM
|
|
STUDENT
|
|
SUPPORT
|
|
SYM.DOS SYM
|
|
SYS
|
|
SYS.DOC SYS
|
|
SYSLIB SYSTEM, LIBRARY, SYS, LIB
|
|
SYSPROG SYSTEM, PROGRAM, SYS, PROG, OPERATOR, DM
|
|
SYSPROG-PL SYSPROG, PL
|
|
SYSTEM-ERRORS
|
|
TCL
|
|
TEMP
|
|
TEMP-SYSPROG TEMP, SYSPROG
|
|
TEST
|
|
TEST-BKGRND TEST
|
|
TRAINING
|
|
TRY.DOS TRY
|
|
ULTICALC
|
|
ULTILINK
|
|
ULTIMATION
|
|
UNIMAX
|
|
WORDS
|
|
WP
|
|
WP.DOS WP
|
|
WP42.DOS WP, WP42
|
|
WP50.DOS WP, WP50
|
|
WP51 WP, WP51
|
|
WP51.DOS WP, WP51
|
|
XES
|
|
|
|
AOS/VS- AOS/VS is made by Data General Corporation(DGC), and is in
|
|
my opinion the worst operating system i've seen yet.
|
|
But, in the quest of knowledge, and to broaden your computer
|
|
horizons, i suggest that you try to hack even this system,
|
|
for what it's worth.
|
|
The AOS/VS will usually readily identify itself with a
|
|
banner such as;
|
|
(yes, i'm overstepping my margin, i apologize)
|
|
|
|
**** AOS/VS Rev 7.62.00.00 / Press NEW-LINE to begin logging on ****
|
|
|
|
AOS/VS 7.62.00.00 / EXEC-32 7.62.00.00 11-Jun-93 0:27:31 @VCON1
|
|
|
|
Username:
|
|
|
|
The username prompt looks deceivingly like a VMS, but it is
|
|
not, and you can be sure by entering garbage for the username
|
|
and password. The AOS/VS will reply;
|
|
Invalid username - password pair
|
|
AOS/VS will not let you know when you've entered an incorrect
|
|
username.
|
|
And a standard system will let you have 5 tries at a username/
|
|
password combination, but after that it gives this annoying
|
|
message;
|
|
Too many attempts, console locking for 10 seconds
|
|
Having the system lock for 10 seconds does really nothing to
|
|
the hacker, except slow brute forcing down a small bit(10
|
|
seconds).
|
|
Anyways, once inside 'HELP' will give you a set of help files
|
|
which i didn't enjoy too much, and 'WHO' will list the users
|
|
online.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
guest
|
|
op operator, op
|
|
sysmgt sys, mgt, system, man, mgr, manager
|
|
test
|
|
user
|
|
|
|
RSTS- Probably the oldest OS that is still out there is RSTS. RSTS
|
|
was a very common OS a decade or so ago, but is now nearing
|
|
extinction. However, there are still a few out there on PSNs,
|
|
and thus you might want to attempt to hack in.
|
|
The RSTS will usually identify itself like;
|
|
RSTS V9.7-08 93.06.10 02:36
|
|
User:
|
|
Before attempting to hack, try the SYSTAT command. It is
|
|
likely it will be disabled, but it is worth a try.
|
|
RSTS will tell you if the ID you've entered is incorrect with
|
|
the error message;
|
|
?Invalid entry - try again
|
|
The UIDs are in the format xxx,yyy , where x and y are digits.
|
|
Just guess at UIDs until you hit one with a password.
|
|
Also, the IDs will generally not go above 255 in both the x
|
|
and y spots(ie: 255,255 is generally the highest ID).
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
User ID Password
|
|
------- --------
|
|
1,2 SYSLIB
|
|
|
|
WNT- I really don't know much about Windows NT, mostly having to
|
|
do with the fact that it was just released a little while ago
|
|
and I have not seen it in action to this date. I don't know
|
|
at what time in the future it will become widespread, but for
|
|
you future hackers I did a little research and came up with
|
|
the two manufacturer defaults; administrator and guest. Both
|
|
come unpassworded.. administrator is the equivalent to root
|
|
on a Unix, and guest is just as you'd expect .. a low level
|
|
guest account. Interestingly enough, in the manuals I saw WNT
|
|
sysadmins were encouraged to keep the guest account...
|
|
unpassworded at that! Highly amusing.. let's see how long that
|
|
lasts! Anyways..
|
|
Oh yeah.. case sensitive, too.. I'm pretty sure it is
|
|
lowercase, but it is possible that the first letter is
|
|
capitalized. Remember that when attempting to brute force new
|
|
accounts. Oh, and keep in mind possible accounts such as
|
|
"test" and "field" and the such.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username
|
|
--------
|
|
|
|
administrator
|
|
guest
|
|
|
|
NETWARE- Novell Netware is the most common PC LAN software and is a
|
|
popular among high-schools. The internal (and external for
|
|
that matter) security is poor.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
admin operator, supervisor, sysadm
|
|
backup
|
|
guest visitor, user
|
|
netware
|
|
novell netware
|
|
public
|
|
remote
|
|
server
|
|
staff
|
|
supervisor admin, operator, sysadm, supervis, manager
|
|
system1
|
|
tape backup
|
|
test testuser
|
|
user
|
|
visitor guest
|
|
|
|
Sys75/85- AT&T's System75/85 have made a big splash in recent months
|
|
despite their being around for years previous.. mostly due
|
|
to codez kids discovering the PBX functions.
|
|
Anyways, the hype has pretty much died down so it is probably
|
|
safe to post the defaults. If you don't like my doing this,
|
|
suck yourself. Anyone with access to this file probably has
|
|
them by now anyways. And if not, all the better. Free
|
|
information has always been one of our primary goals, and I
|
|
don't intend to change that for some insecure pseudo-hackers.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
browse looker
|
|
craft crftpw, craftpw
|
|
cust custpw
|
|
field support
|
|
inads indspw, inadspw
|
|
init initpw
|
|
rcust rcustpw
|
|
|
|
AS400- Another OS that was only really in use before my time, AS-400
|
|
is IBM made. I pulled this from the old UPT messages, thanks
|
|
to anybody who contributed.
|
|
It should in fact identify itself as an AS-400 at login time.
|
|
I'm unsure of the case-sensativity of the characters.. i'll
|
|
enter them as lowercase, but if unsuccessful use caps.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username
|
|
--------
|
|
qsecofr
|
|
qsysopr
|
|
quser
|
|
sedacm
|
|
sysopr
|
|
user
|
|
|
|
TSO- An IBM product, TSO can be found stand alone, but is commonly
|
|
found off an ISM.
|
|
Upon connect you should see a login prompt that looks like:
|
|
IKJ56700A ENTER USERID-
|
|
Or something close.
|
|
It will tell you if the username entered is incorrect:
|
|
IKJ5642OI USERID xxx NOT AUTHORIZED TO USE TSO
|
|
IKJ56429A REENTER-
|
|
Occasionally some of the accounts will have the STC attribute
|
|
and can not be used for remote login.
|
|
|
|
COMMON ACCOUNTS
|
|
|
|
Username Password
|
|
-------- --------
|
|
admin adm, sysadm, op
|
|
guest
|
|
init
|
|
maint
|
|
systest test
|
|
test1 test
|
|
tso
|
|
|
|
|
|
BRUTE FORCE
|
|
===========
|
|
-----------
|
|
|
|
Passwords
|
|
=========
|
|
|
|
Occasionally you will find yourself in a position where you wish to
|
|
penetrate a system, but defaults are taken off and social engineering is not
|
|
possible.
|
|
The dedicated hacker then begins the tedious process of trying password
|
|
after password, hoping to crowbar his way into the system. Thus the term
|
|
'Brute Force' was born, aptly describing this process.
|
|
Brute force is the absolute ugliest way of obtaining an account, but is
|
|
is often effective. It is ugly for a number of reasons, having to do with the
|
|
fact that you will have to call the system hundreds of times if the account is
|
|
not easily brute forced.
|
|
However, first i will explain a modified form of brute force; intelligent
|
|
brute force. In this process, the hacker tries the users first name, as that
|
|
is the most common password of all, and a database of 20-100 common passwords.
|
|
The difference between this and the normal brute forcing is you cut your
|
|
time down considerably, but your chances of getting in go down as well.
|
|
Normal brute forcing is rarely done nowadays; the greats of yesterday
|
|
would spend 6 hours at a sitting trying passwords, but people nowadays seem to
|
|
think 5 minutes is sufficient. Ugh.
|
|
If standard brute forcing is done, it is accomplished with automation,
|
|
usually. Meaning the hacker will set up a program or a script file to spew out
|
|
dictionary passwords for him, then go to the movies or whatever. Obviously,
|
|
any way you do it, standard brute forcing is fairly dangerous. A sysadmin is
|
|
more likely to notice you trying a username/password 2000 times than 50. If
|
|
you choose to do automated brute forcing, it might be a good idea to set up
|
|
a hacked system to do it for you, such as a procured Unix. I would not,
|
|
however, suggest wasting the powers of a Cray on such a menial task as brute
|
|
force. You can only go as fast as the host system will let you. The danger
|
|
in this is obvious, you will have to be connected to the remote system for
|
|
a long time, leaving you wide open for a trace. It is up to you.
|
|
And, of course, brute forcing requires a username. If you don't have a
|
|
username, you are probably out of luck.
|
|
One thing you should definetly do is make a list of first names, and make
|
|
it fairly complete. Buy/steal a baby names book or look inside your phone
|
|
book and copy down the more commmon names on to a piece of paper or into a
|
|
file. Other than first names, husband/wife, boyfriend/girlfriend and
|
|
childs names are the most common passwords.
|
|
Ok, here are the basics to intelligent brute force hacking;
|
|
1. try the users first name
|
|
2. try your list of first names, male and female
|
|
2. try the users first name, with a lone digit(1 to 9) after the
|
|
username
|
|
3. try the users first name, with a lone digit(1 to 9) after the
|
|
username
|
|
4. try the users first name, with a letter appended to the end(A to Z)
|
|
5. try anything related to the system you are on. If you are on a
|
|
VAX running VMS on the Datapac PSN, try VAX, VMS, Datapac, X25, etc
|
|
6. try anything related to the company/service the system is owned by.
|
|
if the user is on a system owned by the Pepsi Cola company, try
|
|
Pepsi, Cola, Pepsico, etc.
|
|
7. finally, try passwords from your list of common passwords. your
|
|
list of common passwords should not be above 200 words.
|
|
The most popular passwords are;
|
|
password secret money sex smoke beer x25 system
|
|
hello cpu aaa abc fuck shit
|
|
Add on popular passwords to that as you see fit.
|
|
Remember; most passwords are picked spontaneously, on whatever
|
|
enters the users mind at that time(you know the feeling, i bet).
|
|
Attempt to get into the users mind and environment, to think what
|
|
he would think. If you can't do that, just try whatever comes to
|
|
your mind, you'll get the hang of it.
|
|
|
|
Brute Forcing User Names
|
|
========================
|
|
|
|
A different form of brute force is that when you need a username to
|
|
hack passwords from. In order to guess a valid username, you must be on a
|
|
system that informs you when your username is invalid; thus VMS and Unix are
|
|
out of the question.
|
|
There are two types of usernames(by my definition); user and system.
|
|
The user usernames are the standard user's usernames. Examples would be
|
|
John, Smith, JMS, JSmith, and JohnS.
|
|
The system usernames are special usernames used by the system operators
|
|
to perform various functions, such as maintenance and testing. Since these
|
|
usernames are not owned by actual people(usually), they are given a name which
|
|
corresponds to their function.
|
|
Guessing either type is usually fairly easy.
|
|
User usernames are standardly in one of 2 formats; first name or last name
|
|
the more common format being first name. Less common formats are initials,
|
|
first initial/last name, and first name/last initial. Occasionally the
|
|
username formats will have nothing to do with names at all, and will instead
|
|
be 6 or 8 digit numbers. Have fun.
|
|
The users of a system will almost always have the same format as
|
|
each other. When you guess one, guessing more shouldn't be too hard.
|
|
For first names, again consult the list you made from the baby names book.
|
|
For last names, construct a list of the most common last names, ideally
|
|
out of the phone book, but if you are too lazy your mind will do fine. SMITH
|
|
and JONES are the most common non-foreign names.
|
|
For initials, use common sense. Guess at 3 letter combinations, and use
|
|
sensible formats. Meaning don't use XYZ as a rule, go for JMS, PSJ, etc, to
|
|
follow along with common first names and last names.
|
|
If you are getting no luck whatsoever, try switching your case(ie: from
|
|
all lower case to all upper case), the system might be case sensitive.
|
|
Usually guessing system names shouldn't be necessary; I gave a default
|
|
list for all the major systems. But if you run across a system not listed, you
|
|
will want to discover defaults of your own. Use common sense, follow along
|
|
with the name of the new OS and utilities that would fit with that name.
|
|
Attempt to find out the username restrictions for that system, if usernames
|
|
have to be 6 characters long, try only 6 character user names.
|
|
And finally, here is a list of common defaults(they are capitalized for
|
|
convienience, but as a rule use lower case);
|
|
OPERATOR SYSOP OP OPER MANAGER SYSMAN SYSMGR MGR MAN ADMIN
|
|
SYSADMIN ADM SYSADM BOSS MAIL SYSTEM SYS SYS1 MAINT SYSMAINT
|
|
TEST TESTER TESTUSER USER USR REMOTE PUB PUBLIC GUEST VISITOR
|
|
STUDENT DEMO TOUR NEWS HELP MGT SYSMGT SYSPROG PROD SALES
|
|
MARKET LIB LIBRARY FILES FILEMAN NET NETWORK NETMAN NETMGR
|
|
RJE DOS GAMES INFO SETUP STARTUP CONTROL CONFIG DIAG SYSDIAG
|
|
STAT SYSDIAGS DIAGS BATCH SUPRVISR SYSLIB MONITOR UTILITY
|
|
UTILS OFFICE CORP SUPPORT SERVICE FIELD CUST SECURITY WORD
|
|
DATABASE BACKUP FRIEND DEFAULT FINANCE ACCOUNT HOST ANON
|
|
SYSTEST FAX INIT INADS SETUP
|
|
|
|
Brute Forcing Services
|
|
======================
|
|
|
|
There is also the time when you are on a server system, and you need
|
|
places to go. You will surely be told if the service you've entered is
|
|
incorrect, so just try things that come to mind, and the following list;
|
|
(the server may be case sensitive..use upper or lower case as you wish)
|
|
(NOTE: Try digits(1 +) and letters(A-Z) also)
|
|
SERVER NETWORK NET LINK LAN WAN MAN CONNECT LOG LOGIN HELP DIAL
|
|
OUT OUTDIAL DIALOUT MODEM MODEMOUT INTERNET TELNET PAD X25 X28 FTP
|
|
SYSTEM SYS SYS1 SYSTEM1 UNIX VAX VMS HP CONSOLE INFO CMDS LIST
|
|
SERVICES SERVICE SERVICE1 COMP COMPUTER CPU CHANNEL CHANNEL1 CH1
|
|
CH01 GO DO ? LOG ID USERS SHOW WHO PORT1 PORT NODE1 NODE LINK1
|
|
DISPLAY CONFIG CONTROL DIAGS SYSDIAGS DIAG SYSDIAG HELLO EMAIL
|
|
MAIL SET DEFINE PARAMS PRINT PHONE PHONES SESSION SESSION1 BEGIN
|
|
INIT CUST SERVICE SUPPORT BUSINESS ACCT ACCOUNT FINANCE SALES
|
|
BUFFER QUEUE STAT STATS SYSINFO SYSTAT FTP ACCESS DISK LIB SYSLIB
|
|
LIBRARY FILES BBS LOOP TEST SEARCH MACRO CALL COMMANDS TYPE FIND
|
|
ASK QUERY JOIN ATTACH JOB REMOTE COM1 COM CALLER LOGGER MACHINE
|
|
BULLITEN CLUSTER RUN HELLO PAYROLL DEC
|
|
|
|
SOCIAL ENGINEERING
|
|
==================
|
|
------------------
|
|
|
|
While I am in no way going to go indepth on SE(social engineering) at this
|
|
point, i will explain the premise of SE to those new to it.
|
|
Social engineering can be defined any number of ways, but my definition
|
|
goes along the lines of; "Misrepresentation of oneself in a verbal manner to
|
|
another person in order to obtain knowledge that is otherwise unattainable."
|
|
Which in itself is a nice way of putting "manipulation, lying and general
|
|
bullshitting".
|
|
Social engineering is almost always done over the phone.
|
|
I'll give an example. The hacker needs information, such as an account,
|
|
which he cannot get by simple hacking. He calls up the company that owns the
|
|
system he wishes to penetrate, and tells them he is Joe Blow of the Computer
|
|
Fixing Company, and he is supposed to fix their computers, or test them
|
|
remotely. But gosh, somebody screwed up and he doesn't have an account. Could
|
|
the nice lady give him one so he can do his job and make everybody happy?
|
|
See the idea? Misrepresentation of the truth; pretending to be someone you
|
|
aren't.
|
|
If you are skeptical, you shouldn't be. SE is tried and true, due to the
|
|
fact that any company's biggest security leak is their employees. A company
|
|
can design a system with 20 passwords, but if an uncaring employee unwittingly
|
|
supplies a hacker with all of these passwords, the game is over.
|
|
You *must* have the voice for it. If you sound like a 12 year old, you
|
|
aren't going to get shit. If you can't help it, there are telephone-voice
|
|
changers(which any SE practicer should have anyways) that will do it for you.
|
|
If the person wishes to contact higher authority(who will probably suspect
|
|
somethings up), get mad. Don't go into a rage, but do get angry. Explain that
|
|
you have a job to do, and be persuasive.
|
|
I won't go more into SE, there are tons of text files out there on it
|
|
already. Just remember to keep calm, have a back up plan, and it is a good
|
|
idea to have the script on paper, and practice it a bit before hand. If you
|
|
sound natural and authorative, you will get whatever you want.
|
|
And practice makes perfect.
|
|
|
|
TRASHING
|
|
========
|
|
--------
|
|
|
|
Trashing is another thing i will not go too indepth on, but i will provide
|
|
a very quick overview.
|
|
Trashing is the name given to the process of stealing a companies trash,
|
|
then rooting through it and saving the valuable information.
|
|
Trashing is practiced most often on the various RBOCs, but if you are
|
|
attempting to hack a system local to you, it might be a good idea to go
|
|
trashing for a few weeks, you might find a printout or a scrap of paper with
|
|
a dialup or username and password written on it.
|
|
|
|
ACRONYMS
|
|
========
|
|
--------
|
|
|
|
This is a basic list of H/P acronyms I've compiled from various sources..
|
|
it should be big enough to serve as an easy reference without being incredibly
|
|
cumbersome
|
|
|
|
ABSBH: Average Busy Season Busy Hour
|
|
AC: Area code
|
|
ACC: Automatic Communications Control
|
|
ACC: Asynchronous Communications Center
|
|
ACD: Automatic Call Distributor
|
|
ACE: Automatic Calling Equipment
|
|
ACF: Advanced Communications Functions
|
|
ACN: Area Code + Number
|
|
ADPCM: Adaptive Differential Pulse Code Modulation
|
|
AIS: Automatic Intercept System
|
|
ALFE: Analog Line Front End
|
|
ALRU: Automatic Line Record Update
|
|
AM: Account Manager
|
|
AM: Access Module
|
|
AM: Amplitude Modulation
|
|
AMA: Automatic Message Accounting
|
|
AMSAT: American Satellite
|
|
AN: Associated Number
|
|
ANI: Automatic Number Identification
|
|
ANXUR: Analyzer for Networks with Extended Routing
|
|
AOSS: Auxiliary Operator Services System
|
|
AP: Attached Processor
|
|
ARC: Automatic Response Control
|
|
ARP: Address Resolution Protocol
|
|
ARPA: Advanced Reasearch Projects Agency
|
|
ARS: Automatic Response System
|
|
ARSB: Automated Repair Service Bureau
|
|
AT: Access Tandem
|
|
ATB: All Trunks Busy
|
|
ATH: Abbreviated Trouble History
|
|
ATM: Automated Teller Machine
|
|
ATM: Asynchronous Transfer Mode
|
|
AT&T: American Telegraph and Telephone Company
|
|
AVD: Alternate Voice Data
|
|
BCD: Binary Coded Decimal
|
|
BCUG: Bilateral CUG
|
|
BELLCORE: Bell Communications Research
|
|
BGP: Border Gateway Protocol
|
|
BHC: Busy Hour Calls
|
|
BLV: Busy Line Verification
|
|
BOC: Bell Operating Company
|
|
BOR: Basic Output Report
|
|
BOS: Business Office Supervisor
|
|
BSC: Binary Synchronous Module
|
|
BSCM: Bisynchronous Communications Module
|
|
BSOC: Bell Systems Operating Company
|
|
CA: Cable
|
|
CADV: Combined Alternate Data/Voice
|
|
CAMA: Centralized Automatic Message Accounting
|
|
CATLAS Centralized Automatic Trouble Locating & Analysis System
|
|
CAU: Controlled Access Unit
|
|
CAVD: Combined Alternated Voice/Data
|
|
CBC Cipher Block Chaining
|
|
CBS: Cross Bar Switching
|
|
CBX: Computerized Branch Exchange
|
|
CBX: Computerized Business Exchange
|
|
CC: Calling Card
|
|
CC: Common Control
|
|
CC: Central Control
|
|
CC: Country Code
|
|
CCC: Central Control Complex
|
|
CCC: Clear Channel Capability
|
|
CCC: Central Control Computer
|
|
CCIS: Common Channel Interoffice Signalling
|
|
CCITT: International Telephone and Telegraph Consultative Committee
|
|
CCM: Customer Control Management
|
|
CCNC: Common Channel Network Controller
|
|
CCNC: Computer Communications Network Center
|
|
CCS: Common Channel Signalling
|
|
CCSA: Common Control Switching Arrangement
|
|
CCSA: Common Central Switching Arrangement
|
|
CCSS: Common Channel Signalling System
|
|
CCT: Central Control Terminal
|
|
CCTAC: Computer Communications Trouble Analysis Center
|
|
CDA: Call Data Accumulator
|
|
CDA: Crash Dump Analyzer
|
|
CDA: Coin Detection and Announcement
|
|
CDAR: Customer Dialed Account Recording
|
|
CDC: Control Data Corporation
|
|
CDI: Circle Digit Identification
|
|
CDO: Community Dial Office
|
|
CDPR: Customer Dial Pulse Receiver
|
|
CDR: Call Dial Recording
|
|
CDS: Cicuit Design System
|
|
CEF: Cable Entrance Facility
|
|
CERT: Computer Emergency Response Team
|
|
CF: Coin First
|
|
CGN: Concentrator Group Number
|
|
CI: Cluster Interconnect
|
|
CIC: Carrier Identification Codes
|
|
CICS: Customer Information Control System
|
|
CID: Caller ID
|
|
CII: Call Identity Index
|
|
CIS: Customer Intercept Service
|
|
CISC: Complex Instruction Set Computing
|
|
CLASS: Custom Local Area Signalling Service
|
|
CLASS: Centralized Local Area Selective Signalling
|
|
CLDN: Calling Line Directory Number
|
|
CLEI: Common Language Equipment Identification
|
|
CLI: Calling Line Identification
|
|
CLID: Calling Line Identification
|
|
CLLI: Common Language Location Indentifier
|
|
CLNP: Connectionless Network Protocol
|
|
CMAC: Centralized Maintenance and Administration Center
|
|
CMC: Construction Maintenance Center
|
|
CMDF: Combined Main Distributing Frame
|
|
CMDS: Centralized Message Data System
|
|
CMIP: Common Management Information Protocol
|
|
CMS: Call Management System
|
|
CMS: Conversational Monitoring System
|
|
CMS: Circuit Maintenance System
|
|
CMS: Communications Management Subsystem
|
|
CN/A: Customer Name/Address
|
|
CNA: Communications Network Application
|
|
CNAB: Customer Name Address Bureau
|
|
CNCC: Customer Network Control Center
|
|
CNI: Common Network Interface
|
|
CNS: Complimentary Network Service
|
|
CO: Central Office
|
|
COC: Central Office Code
|
|
COCOT: Customer Owned Coin Operated Telephone
|
|
CODCF: Central Office Data Connecting Facility
|
|
COE: Central Office Equipment
|
|
COEES: Central Office Equipmet Engineering System
|
|
COER: Centarl Office Equipment Reports
|
|
COLT: Central Office Line Tester
|
|
COMSAT: Communications Satellite
|
|
COMSEC: Communications Security
|
|
COMSTAR: Common System for Technical Analysis & Reporting
|
|
CONS: Connection-Oriented Network Service
|
|
CONTAC: Central Office Network Access
|
|
COS: Class of Service
|
|
COSMIC: Common Systems Main Inter-Connection
|
|
COR: Class Of Restriction
|
|
COSMOS: Computerized System For Mainframe Operations
|
|
COT Central Office Terminal
|
|
CP: Control Program
|
|
CPBXI: Computer Private Branch Exchange Interface
|
|
CPC: Circuit Provisioning Center
|
|
CPD: Central Pulse Distributor
|
|
CPMP: Carrier Performance Measurement Plan
|
|
CRAS: Cable Repair Administrative System
|
|
CRC: Customer Record Center
|
|
CRC: Customer Return Center
|
|
CREG: Concentrated Range Extension & Gain
|
|
CRG: Central Resource Group
|
|
CRIS: Customer Record Information System
|
|
CRS: Centralized Results System
|
|
CRSAB: Centralized Repair Service Answering Bureau
|
|
CRT: Cathode Ray Tube
|
|
CRTC: Canadian Radio-Television and Telecommunications Commission
|
|
CSA: Carrier Servicing Area
|
|
CSAR: Centralized System for Analysis and Reporting
|
|
CSC: Cell Site Controller
|
|
CSC: Customer Support Center
|
|
CSDC: Circuit Switch Digital Capability
|
|
CSP: Coin Sent Paid
|
|
CSMA/CD: Carrier Sense Multiple Access/Collission Detection
|
|
CSR: Customer Service Records
|
|
CSS: Computer Special Systems
|
|
CSS: Computer Sub-System
|
|
CSU: Channel Service Unit
|
|
CT: Current Transformer
|
|
CTC: Channel Termination Charge
|
|
CTC: Central Test Center
|
|
CTM: Contac Trunk Module
|
|
CTMS: Carrier Transmission Measuring System
|
|
CTO: Call Transfer Outside
|
|
CTSS: Compatible Time Sharing System
|
|
CTSS: Cray Time Sharing System
|
|
CTTN: Cable Trunk Ticket Number
|
|
CTTY: Console TeleType
|
|
CU: Control Unit
|
|
CU: Customer Unit
|
|
CUG: Closed User Group
|
|
CWC: City-Wide Centrex
|
|
DA: Directory Assistance
|
|
DACC: Directort Assistance Call Completion
|
|
DAA: Digital Access Arrangements
|
|
DACS: Digital Access and Cross-connect System
|
|
DACS: Directory Assistance Charging System
|
|
DAIS: Distributed Automatic Intercept System
|
|
DAL: Dedicated Access Line
|
|
DAO: Directory Assistance Operator
|
|
DAP: Data Access Protocol
|
|
DARC: Division Alarm Recording Center
|
|
DARPA: Department of Defense Advanced Research Projects Agency
|
|
DARU: Distributed Automatic Response Unit
|
|
DAS: Device Access Software
|
|
DAS: Directory Assistance System
|
|
DAS: Distributor And Scanner
|
|
DAS: Dual Attachment Station
|
|
DASD: Direct Access Storage Device
|
|
DBA: Data Base Administrator
|
|
DBA: Digital Business Architecture
|
|
DBAC: Data Base Administration Center
|
|
DBAS: Data Base Administration System
|
|
DBC: Digital Business Center
|
|
DBM: Database Manager
|
|
DBMS: Data Base Management System
|
|
DBS: Duplex Bus Selector
|
|
DCA: Defense Communications Agency
|
|
DCC: Data Country Code
|
|
DCC: Data Collection Computer
|
|
DCE: Data Circuit-Terminating Equipment
|
|
DCE: Data Communicating Equipment
|
|
DCL: Digital Computer Language
|
|
DCLU: Digital Carrier Line Unit
|
|
DCM: Digital Carrier Module
|
|
DCMS: Distributed Call Measurement System
|
|
DCMU: Digital Concentrator Measurement Unit
|
|
DCO-CS: Digital Central Office-Carrier Switch
|
|
DCP: Duplex Central Processor
|
|
DCS: Digital Cross-Connect System
|
|
DCSS: Discontiguous Shared Segments
|
|
DCSS: Digital Customized Support Services
|
|
DCT: Digital Carrier Trunk
|
|
DDCMP: Digital Data Communications Message Protocol
|
|
DDD: Direct Distance Dialing
|
|
DDN: Defense Data Network
|
|
DDR: Datapac Design Request
|
|
DDS: Digital Data Service
|
|
DDS: Digital Data System
|
|
DDS: Dataphone Digital Service
|
|
DEC: Digital Equipment Corporation
|
|
DES: Data Encryption Standard
|
|
DF: Distributing Frame
|
|
DGC: Data General Corporation
|
|
DH: Distant Host
|
|
DID: Direct Inward Dialing
|
|
DIMA: Data Information Management Architecture
|
|
DINS: Digital Information Network Service
|
|
DIS: Datapac Information Service
|
|
DISA: Direct Inward System Access
|
|
DLC: Digital Loop Carrier
|
|
DLS: Dial Line Service
|
|
DM: Demultiplexer
|
|
DMA: Direct Memory Access
|
|
DN: Directory Numbers
|
|
DNA: Datapac Network Address
|
|
DNA: Digital Named Accounts
|
|
DNA: Digital Network Architecture
|
|
DNIC: Data Network Identifier Code
|
|
DNR: Dialed Number Recorder
|
|
DNS: Domain Name Service
|
|
DNS: Domain Name System
|
|
DOCS: Display Operator Console System
|
|
DOD: Department Of Defense
|
|
DOM: District Operations Manager
|
|
DPSA: Datapac Serving Areas
|
|
DPTX: Distributed Processing Terminal Executive
|
|
DSC: Data Stream Compatibility
|
|
DSI: Data Subscriber Interface
|
|
DSL: Digital Subscriber Line
|
|
DSN: Digital Services Network
|
|
DSU: Data Service Unit
|
|
DSU: Digital Service Unit
|
|
DSX: Digital Signal Cross-Connect
|
|
DTC: Digital Trunk Controller
|
|
DTE: Data Terminal Equipment
|
|
DTF: Dial Tone First
|
|
DTG: Direct Trunk Group
|
|
DTI: Digital Trunk Interface
|
|
DTIF: Digital Tabular Interchange Format
|
|
DTMF: Dual Tone Multi-Frequency
|
|
DTN: Digital Telephone Network
|
|
DTST: Dial Tone Speed Test
|
|
DVM: Data Voice Multiplexor
|
|
EAEO: Equal Access End Office
|
|
EA-MF: Equal Access-Multi Frequency
|
|
EBDI: Electronic Business Data Interchange
|
|
EC: Exchange Carrier
|
|
ECC: Enter Cable Change
|
|
EDC: Engineering Data Center
|
|
EDI: Electronic Data Interchange
|
|
EE: End to End Signaling
|
|
EEDP: Expanded Electronic Tandem Switching Dialing Plan
|
|
EGP: Exterior Gateway Protocol
|
|
EIES: Electronic Information Exchange System
|
|
EIU: Extended Interface Unit
|
|
EKTS: Electonic Key Telephone Service
|
|
ELDS: Exchange Line Data Service
|
|
EMA: Enterprise Management Architecture
|
|
EO: End Office
|
|
EOTT: End Office Toll Trunking
|
|
EREP: Environmental Recording Editing and Printing
|
|
ESA: Emergency Stand Alone
|
|
ESB: Emergency Service Bureau
|
|
ESN: Electronic Serial Number
|
|
ESP: Enhanced Service Providers
|
|
ESS: Electronic Switching System
|
|
ESVN: Executive Secure Voice Network
|
|
ETS: Electronic Tandem Switching
|
|
EWS: Early Warning System
|
|
FAC: Feature Access Code
|
|
FAM: File Access Manager
|
|
FCC: Federal Communications Commission
|
|
FCO: Field Change Order
|
|
FDDI: Fiber Distributed Data Interface
|
|
FDM: Frequency Division Multiplexing
|
|
FDP: Field Development Program
|
|
FEP: Front-End Processor
|
|
FEV: Far End Voice
|
|
FIFO: First In First Out
|
|
FIPS: Federal Information Procedure Standard
|
|
FM: Frequency Modulation
|
|
FMAP: Field Manufacturing Automated Process
|
|
FMIC: Field Manufacturing Information Center
|
|
FOA: First Office Application
|
|
FOIMS: Field Office Information Management System
|
|
FPB: Fast Packet Bus
|
|
FRL: Facilities Restriction Level
|
|
FRS: Flexible Route Selection
|
|
FRU: Field Replaceable Unit
|
|
FS: Field Service
|
|
FSK: Frequency Shift Keying
|
|
FT: Field Test
|
|
FTG: Final Trunk Group
|
|
FTP: File Transfer Protocol
|
|
FTPD: File Transfer Protocol Daemon
|
|
FX: Foreign Exchange
|
|
GAB: Group Access Bridging
|
|
GCS: Group Control System
|
|
GECOS: General Electric Comprehensive Operating System
|
|
GGP: Gateway-to-Gateway Protocol
|
|
GOD: Global Out Dial
|
|
GPS: Global Positioning System
|
|
GRINDER: Graphical Interactive Network Designer
|
|
GSA: General Services Administration
|
|
GSB: General Systems Business
|
|
GTE: General Telephone
|
|
HCDS: High Capacity Digital Service
|
|
HDLC: High Level Data Link Control
|
|
HLI: High-speed LAN Interconnect
|
|
HDSC: High-density Signal Carrier
|
|
HPO: High Performance Option
|
|
HUTG: High Usage Trunk Group
|
|
HZ: Hertz
|
|
IBM: International Business Machines
|
|
IBN: Integrated Business Network
|
|
IC: Intercity Carrier
|
|
IC: InterLATA Carrier
|
|
IC: Interexchange Carrier
|
|
ICAN: Individual Circuit Analysis Plan
|
|
ICH: International Call Handling
|
|
ICM: Integrated Call Management
|
|
ICMP: Internet Control Message Protocol
|
|
ICN: Interconnecting Network
|
|
ICPOT: Interexchange Carrier-Point of Termination
|
|
ICUG: International Closed User Group
|
|
ICVT: Incoming Verification Trunk
|
|
IDA: Integrated Digital Access
|
|
IDCI: Interim Defined Central Office Interface
|
|
IDDD: International Direct Distance Dialing
|
|
IDLC: Integrated Digital Loop Carrier
|
|
IDN: Integrated Digital Networks
|
|
IEC: Interexchange Carrier
|
|
IMP: Internet Message Processor
|
|
IMS: Information Management Systems
|
|
IMS: Integrated Management Systems
|
|
IMTS: Improved Mobile Telephone Service
|
|
INAP: Intelligent Network Access Point
|
|
INS: Information Network System
|
|
INTT: Incoming No Test Trunks
|
|
INWATS: Inward Wide Area Telecommunications Service
|
|
IOC: Interoffice Channel
|
|
IOC: Input/Output Controller
|
|
IOCC: International Overseas Completion Center
|
|
IP: Intermediate Point
|
|
IP: Internet Protocol
|
|
IPCF: Inter-Program Communication Facility
|
|
IPCH: Initial Paging Channel
|
|
IPCS: Interactive Problem Control System
|
|
IPL: Initial Program Load
|
|
IPLI: Internet Private Line Interface
|
|
IPLS: InterLATA Private Line Services
|
|
IPSS: International Packet-Switched Service
|
|
IRC: Internet Relay Chat
|
|
IRC: International Record Carrier
|
|
ISC: Inter-Nation Switching Center
|
|
ISDN: Integrated Services Digital Network
|
|
ISIS: Investigative Support Information System
|
|
ISO: International Standards Organization
|
|
ISSN: Integrated Special Services Network
|
|
ISU: Integrated Service Unit
|
|
ISWS: Internal Software Services
|
|
ITDM: Intelligent Time Division Multiplexer
|
|
ITI: Interactive Terminal Interface
|
|
ITS: Interactive Terminal Support
|
|
ITS: Incompatible Time-Sharing System
|
|
ITT: International Telephone and Telegraph
|
|
IVP: Installation Verification Program
|
|
IX: Interactive Executive
|
|
IXC: Interexchange Carrier
|
|
JCL: Job Control Language
|
|
JES: Job Entry System
|
|
KP: Key Pulse
|
|
LAC: Loop Assignment Office
|
|
LADS: Local Area Data Service
|
|
LADT: Local Area Data Transport
|
|
LAM: Lobe Access Module
|
|
LAN: Local Area Network
|
|
LAP: Link Access Protocol
|
|
LAPB: Link Access Protocol Balanced
|
|
LAPS: Link Access Procedure
|
|
LASS: Local Area Signalling Service
|
|
LASS: Local Area Switching Service
|
|
LAST: Local Area System Transport
|
|
LAT: Local Area Transport
|
|
LATA: Local Access Transport Area
|
|
LAVC: Local Area VAX Cluster
|
|
LBS: Load Balance System
|
|
LCDN: Last Call Directory Number
|
|
LCM: Line Concentrating Module
|
|
LCN: Logical Channel
|
|
LD: Long Distance
|
|
LDEV: Logical Device
|
|
LDM: Limited Distance Modem
|
|
LDS: Local Digital Switch
|
|
LEBC: Low End Business Center
|
|
LEC: Local Exchange Carrier
|
|
LEN: Low End Networks
|
|
LENCL: Line Equipment Number Class
|
|
LGC: Line Group Controller
|
|
LH: Local Host
|
|
LIFO: Last In First Out
|
|
LIP: Large Internet Protocol
|
|
LLC: Logical Link Control
|
|
LM: Line Module
|
|
LMOS: Loop Maintenance and Operations System
|
|
LSI: Large Scale Integration
|
|
LTC: Line Trunk Controller
|
|
LU: Local Use
|
|
LVM: Line Verification Module
|
|
MAC: Media Access Control
|
|
MAC: Message Authentication
|
|
MAN: Metropolitan Area Network
|
|
MAP: Maintenance and Administration Position
|
|
MAP: Manufacturing Automation Protocol
|
|
MAT: Multi-Access Trunk
|
|
MAU: Multistation Access Unit
|
|
MBU: Manufacturing Business Unit
|
|
MCA: Micro Channel Architecture
|
|
MCI: Microwave Communications, Inc.
|
|
MCP: Master Control Program
|
|
MCT: Manufacturing Cycle Time
|
|
MCU: Multi Chip Unit
|
|
MDR: Message Detail Record
|
|
MDS: Message Design Systems
|
|
MDU: Marker Decoder Unit
|
|
MF: Multi-Frequency
|
|
MFD: Main Distributing Frame
|
|
MFR: Mult-Frequency Receivers
|
|
MFT: Metallic Facility Terminal
|
|
MHZ: Mega-Hertz
|
|
MIB: Management Information Base
|
|
MIC: Management Information Center
|
|
MIF: Master Item File
|
|
MIS: Management Information Systems
|
|
MJU: MultiPoint Junction Unit
|
|
MLHG: Multiline Hunt Group
|
|
MLT: Mechanized Loop Testing
|
|
MNS: Message Network Basis
|
|
MOP: Maintenance Operation Protocol
|
|
MP: Multi-Processor
|
|
MPL: Multischedule Private Line
|
|
MPPD: Multi-Purpose Peripheral Device
|
|
MRAA: Meter Reading Access Arrangement
|
|
MSCP: Mass Storage Control Protocol
|
|
MSI: Medium Scale Integration
|
|
MTBF: Mean Time Between Failure
|
|
MTS: Message Telecommunication Service
|
|
MTS: Message Telephone Service
|
|
MTS: Message Transport Service
|
|
MTS: Mobile Telephone Service
|
|
MTSO: Mobile Telecommunications Switching Office
|
|
MTU: Maintenence Termination Unit
|
|
MUX: Multiplexer
|
|
MVS: Multiple Virutal Storage
|
|
MWI: Message Waiting Indicator
|
|
NAM: Number Assignment Module
|
|
NAS: Network Application Support
|
|
NC: Network Channel
|
|
NCCF: Network Communications Control Facility
|
|
NCI: Network Channel Interface
|
|
NCIC: National Crime Information Computer
|
|
NCP: Network Control Program
|
|
NCS: Network Computing System
|
|
NCTE: Network Channel Terminating Equipment
|
|
NDA: Network Delivery Access
|
|
NDC: Network Data Collection
|
|
NDIS: Network Device Interface Specification
|
|
NDNC: National Data Network Centre
|
|
NDS: Network Data System
|
|
NDU: Network Device Utility
|
|
NEBS: Network Equipment Building System
|
|
NECA: National Exchange Carriers Association
|
|
NFS: Network File Sharing
|
|
NFS: Network File System
|
|
NFT: Network File Transfer
|
|
NI: Network Interconnect
|
|
NI: Network Interface
|
|
NIC: Network Information Center
|
|
NIC: Network Interface Card
|
|
NJE: Network Job Entry
|
|
NLM: Netware Loadable Modules
|
|
NLM: Network Loadable Modules
|
|
NM: Network Module
|
|
NMR: Normal Mode Rejection
|
|
NOS: Network Operating System
|
|
NPA: Numbering Plan Area
|
|
NPA: Network Performance Analyzer
|
|
NSF: National Science Foundation
|
|
NSP: Network Services Protocol
|
|
NTE: Network Terminal Equipment
|
|
NUA: Network User Address
|
|
NUI: Network User Identifier
|
|
OC: Operator Centralization
|
|
OCC: Other Common Carrier
|
|
OD: Out Dial
|
|
ODA: Office Document Architecture
|
|
ODDB: Office Dependent Data Base
|
|
ODI: Open Data Interface
|
|
OGT: Out-Going Trunk
|
|
OGVT: Out-Going Verification Trunk
|
|
OIS: Office Information Systems
|
|
OLTP: On-Line Transaction Processing
|
|
ONI: Operator Number Identification
|
|
OPCR: Operator Actions Program
|
|
OPM: Outside Plant Module
|
|
OPM: Outage Performance Monitoring
|
|
OR: Originating Register
|
|
OS: Operating System
|
|
OSI: Open Systems Interconnection
|
|
OSL: Open System Location
|
|
OSS: Operator Services System
|
|
OST: Originating Station Treatment
|
|
OTC: Operating Telephone Company
|
|
OTR: Operational Trouble Report
|
|
OUTWATS: Outward Wide Area Telecommunications Service
|
|
PABX: Private Automated Branch Exchange
|
|
PACT: Prefix Access Code Translator
|
|
PAD: Packet Assembler/Disassembler
|
|
PADSX: Partially Automated Digital Signal Cross-Connect
|
|
PAM: Pulse Amplitude Modulation
|
|
PAX: Private Automatic Exchange
|
|
PBU: Product Business Unit
|
|
PBX: Private Branch Exchange
|
|
PC: Primary Center
|
|
PCM: Pulse Code Modulation
|
|
PCP: PC Pursuit
|
|
PFM: Pulse Frequency Modulation
|
|
PGA: Pin Grid Array
|
|
PIN: Personal Identification Number
|
|
PLA: Programmable Logic Array
|
|
PLD: Programmable Logic Device
|
|
PLS: Programmable Logic Sequencer
|
|
PM: Phase Modulation
|
|
PM: Peripheral Module
|
|
PMAC: Peripheral Module Access Controller
|
|
PMR: Poor Mans Routing
|
|
PNC: Primenet Node Controller
|
|
POC: Point of Contact
|
|
POF: Programmable Operator Facility
|
|
POP: Point of Presence
|
|
POS: Point Of Sale
|
|
POT: Point of Termination
|
|
POTS: Plain Old Telephone Service
|
|
PPN: Project Program Number
|
|
PPP: Point to Point Protocol
|
|
PPS: Public Packet Switching
|
|
PPSN: Public Packet Switched Network
|
|
PSAP: Public Safety Answering Point
|
|
PSDC: Public Switched Digital Capability
|
|
PSDCN: Packet-Switched Data Communication Network
|
|
PSDN: Packet-Switched Data Network
|
|
PSDS: Public Switched Digital Service
|
|
PSN: Packet-Switched Network
|
|
PSS: Packet-Switched Service
|
|
PSW: Program Status Word
|
|
PTE: Packet Transport Equipment
|
|
PTS: Position and Trunk Scanner
|
|
PTT: Postal Telephone & Telegraph
|
|
PVC: Permanent Virtual Call
|
|
PVN: Private Virtual Network
|
|
PWC: Primary Wiring Center
|
|
QPSK: Quadrature Phase-Shift Keying
|
|
RACF: Resource Access Control Facility
|
|
RAO: Revenue Accounting Office
|
|
RARP: Reverse Address Resolution Protocol
|
|
RBG: Realtime Business Group
|
|
RBOC: Regional Bell Operating Company
|
|
RC: Rate Center
|
|
RC: Regional Center
|
|
RDB: Relational Database
|
|
RDSN: Region Digital Switched Network
|
|
RDT: Restricted Data Transmissions
|
|
RDT: Remote Digital Terminal
|
|
REP: Reperatory Dialing
|
|
REXX: Restructured Extended Executer Language
|
|
RFC: Request For Comments
|
|
RIP: Routing Information Protocol
|
|
RIS: Remote Installation Service
|
|
RISC: Reduced Instruction Set Computer
|
|
RISD: Reference Information Systems Development
|
|
RJE: Remote Job Entry
|
|
RLCM: Remote Line Concentrating Module
|
|
RNOC: Regional Network Operations Center
|
|
ROTL: Remote Office Test Line
|
|
RPC: Remote Procedure Call
|
|
RPE: Remote Peripheral Equipment
|
|
RSA: Reference System Architecture
|
|
RSB: Repair Service Bureau
|
|
RSC: Remote Switching Center
|
|
RSCS: Remote Spooling Communications Subsystem
|
|
RSS: Remote Switching System
|
|
RSU: Remote Switching Unit
|
|
RTA: Remote Trunk Arrangement
|
|
RTG: Routing Generator
|
|
R/W: Read/Write
|
|
RX: Remote Exchange
|
|
SA: Storage Array
|
|
SABB: Storage Array Building Block
|
|
SAM: Secure Access Multiport
|
|
SARTS: Switched Access Remote Test System
|
|
SAS: Switched Access Services
|
|
SAS: Single Attachment System
|
|
SBB: System Building Block
|
|
SABM: Set Asynchronous Balanced Mode
|
|
SAC: Special Area Code
|
|
SBS: Satellite Business Systems
|
|
SC: Sectional Center
|
|
SCC: Specialized Common Carrier
|
|
SCC: Switching Control Center
|
|
SCCP: Signaling Connection Control Part
|
|
SCCS: Switching Control Center System
|
|
SCF: Selective Call Forwarding
|
|
SCF: Supervision Control Frequency
|
|
SCM: Station Class Mark
|
|
SCM: Subscriber Carrier Module
|
|
SCP: Signal Conversion Point
|
|
SCP: System Control Program
|
|
SCP: Service Control Point
|
|
SCR: Selective Call Rejection
|
|
SDLC: Synchronous Data Link Control
|
|
SF: Single-Frequency
|
|
SFE: Secure Front End
|
|
SIDH: System Identification Home
|
|
SIT: Special Information Tones
|
|
SLIC: Subscriber Line Interface Card
|
|
SLIM: Subscriber Line Interface Module
|
|
SLIP: Serial Line Internet Protocol
|
|
SLS: Storage Library System
|
|
SLU: Serial Line Unit
|
|
SM: System Manager
|
|
SMDI: Storage Module Disk Interconnect
|
|
SMDR: Station Manager Detail Recording
|
|
SMI: System Management Interrupt
|
|
SMP: Symmetrical Multi-Processing
|
|
SMS: Self-Maintenance Services
|
|
SMS: Station Management System
|
|
SMTP: Simple Mail Transfer Protocol
|
|
SNA: Systems Network Architecture
|
|
SNMP: Simple Network Management Protocol
|
|
SONDS: Small Office Network Data System
|
|
SOST: Special Operator Service Treatment
|
|
SP: Service Processor
|
|
SPC: Stored Program Control
|
|
SPCS: Stored Program Control System
|
|
SPCSS: Stored Program Control Switching System
|
|
SPM: Software Performance Montior
|
|
SQL/DS: Structured Query Language/Data System
|
|
SRC: System Resource Center
|
|
SS: Signaling System
|
|
SSAS: Station Signaling and Announcement System
|
|
SSCP: Systems Service Control Point
|
|
SSCP: Subsystem Services Control Point
|
|
SSP: Switching Service Points
|
|
SSS: Strowger Switching System
|
|
ST: Start
|
|
STC: Service Termination Charge
|
|
STD: Subscriber Trunk Dialing
|
|
STP: Signal Transfer Point
|
|
STS: Synchronous Transport Signal
|
|
SVC: Switched Virtual Call
|
|
SWG: Sub Working Group
|
|
SxS: Step-by-Step Switching
|
|
T-1: Terrestrial Digital Service
|
|
TAC: Trunk Access Code
|
|
TAC: Terminal Access Circuit
|
|
TAC: Terminal Access Center
|
|
TAS: Telephone Answering Service
|
|
TASI: Time Assignment Speech Interpolation
|
|
TBU: Terminals Business Unit
|
|
TC: Toll Center
|
|
TCAP: Transaction Capabilities ApplicationPart
|
|
TCC: Technical Consulting Center
|
|
TCC: Telecommunications Control Computer
|
|
TCF: Transparent Connect Facility
|
|
TCM: Time Compression Multiplexing
|
|
TCP: Transmission Control Protocol
|
|
TDAS: Traffic Data Administration System
|
|
TDCC: Transport Data Coordinating Committee
|
|
TDM: Time Division Multiplexer
|
|
TDMS: Terminal Data Management System
|
|
TDS: Terrestrial Digital Service
|
|
TH: Trouble History
|
|
TIDE: Traffic Information Distributor & Editor
|
|
TIS: Technical Information Systems
|
|
TLB: TransLAN Bridge
|
|
TM: Trunk Module
|
|
TMSCP: Tape Mass Storage Control Protocol
|
|
TNDS: Total Network Data System
|
|
TNPS: Traffic Network Planning Center
|
|
TO: Toll Office
|
|
TOP: Technical Office Protocol
|
|
TOPS: Traffic Operator Position System
|
|
TP: Transport Protocol
|
|
TP: Toll Point
|
|
TP: Transaction Processing
|
|
TPC: Transaction Processiong Performance Council
|
|
TREAT: Trouble Report Evaluation and Analysis Tool
|
|
TRIB: Throughput Rate in Information Bits
|
|
TRT: Tropical Radio and Telephone
|
|
TSB: Time Shared Basic Environment
|
|
TSG: Timing Signal Generator
|
|
TSN: Terminal Switching Network
|
|
TSO: Time Sharing Option
|
|
TSPS: Traffice Service Position System
|
|
TTL: Transistor-to-Transistor Logic
|
|
TTS: Trunk Time Switch
|
|
TWX: Type Writer Exchange
|
|
UA: Unnumbered Acknowledgement
|
|
UAE: Unrecoverable Application Error
|
|
UART: Universal Asynchronous Receiver Transmitter
|
|
UCS: Uniform Communication Standard
|
|
UDC: Universal Digital Channel
|
|
UDP: User Datagram Protocol
|
|
UDVM: Universal Data Voice Multiplexer
|
|
UID: User Identifier
|
|
UPC: Utility Port Conditioner
|
|
USC: Usage Surcharge
|
|
USDN: United States Digital Network
|
|
USTS: United States Transmission Systems
|
|
UUCP: Unix to Unix Copy Program
|
|
VAN: Value Added Networks
|
|
VAX: Virtual Address Extention
|
|
VCPI: Virtual Control Program Interface
|
|
VDU: Visual Display Unit
|
|
VF: Voice Frequency
|
|
VFU: Vertical Forms Unit
|
|
VFY: Verify
|
|
VIA: Vax Information Architecture
|
|
VLM: Virtual Loadable Module
|
|
VLSI: Very Large Scale Integration
|
|
VMB: Voice Mail Box
|
|
VMCF: Virtual Machine Communications Facility
|
|
VMS: Virtual Memory System
|
|
VMS: Voice Mail System
|
|
VM/SP: Virtual Machine/System Product
|
|
VPA: VAX Performance Advisor
|
|
VPS: Voice Processing System
|
|
VSAM: Virtual Storage Access Method
|
|
VSE: Virtual Storage Extended
|
|
VTAM: Virtual Telecommunications Access Method
|
|
VTOC: Volume Table Of Contents
|
|
VUIT: Visual User Interface Tool
|
|
VUP: Vax Unit of Processsing
|
|
WAN: Wide Area Network
|
|
WATS: Wide Area Telecommunications System
|
|
WATS: Wide Area Telephone Service
|
|
WC: Wiring Center
|
|
WCPC: Wire Center Planning Center
|
|
WDCS: Wideband Digital Cross-Connect System
|
|
WDM: Wavelength Division MultiPlexing
|
|
WES: Western Electronics Switching
|
|
WUI: Western Union International
|
|
XB: Crossbar Switching
|
|
XBAR: Crossbar Switching
|
|
XBT: Crossbar Tandem
|
|
XNS Xerox Network Systems
|
|
XSV Transfer Cost System Value
|
|
XTC Extended Test Controller
|
|
|
|
|
|
CONCLUSION
|
|
==========
|
|
----------
|
|
|
|
Last words
|
|
==========
|
|
|
|
Well, i sincerely hope that this file was of some use to you, and i would
|
|
encourage you to distribute it as far as you can. If you enjoyed it, hated it,
|
|
have suggestions, or whatever, feel free to email me at my Internet address(my
|
|
only permanent one for now) or at a BBS, if you can find me.
|
|
Have phun...
|
|
|
|
- Deicide -
|
|
|
|
Recommended Reading
|
|
===================
|
|
Neuromancer, Mona Lisa Overdrive, Count Zero and all the rest, by William
|
|
Gibson
|
|
The Hacker Crackdown, by Bruce Sterling
|
|
Cyberpunk, by Katie Hafner and John Markoff
|
|
The Cuckoo's Egg, by Cliff Stoll
|
|
2600: The best h/p printed zine. $21 in American funds, U.S. & Canada.
|
|
2600 Subscription Dept., P.O. Box 752, Middle Island NY 11953-0752
|
|
Office: 516-751-2600 Fax: 516-751-2608
|
|
The issues of CUD, cDc, & Phrack electronic newsletters, and the LOD/H TJs,
|
|
all of which can be found on the Internet and any good h/p oriented BBS.
|
|
|
|
BBSes
|
|
=====
|
|
|
|
Although most boards have a lifespan equivalent to that of a fruitfly,
|
|
I finally have a list which is somewhat stable.. getting on them is your
|
|
problem.. just be yourself and be willing to learn.
|
|
- Unphamiliar Territories
|
|
- Demon Roach Underground
|
|
- Temple of the Screaming Electron
|
|
- Burn This Flag
|
|
- Dark Side of the Moon
|
|
and Phrozen Realm if it returns..
|
|
|
|
References
|
|
==========
|
|
|
|
All the material used in this publication is original unless specifically
|
|
stated otherwise.
|
|
However, i'd like to thank Phrack and the LOD/H for their textfiles
|
|
which gave me a valuable push in the right direction..
|
|
And of course all the great h/p folks who have helped me along the way..
|
|
|
|
And finally
|
|
===========
|
|
Thanks to the EFF, for their continued support of all of the world's rights
|
|
in this technological era.
|
|
Thanks to all the folks running the FreeNets who continue to support the
|
|
right to free access to information in this world of cynicism.
|
|
Thanks to cDc, for not selling out after all these years...
|
|
Musical inspirations: Primus, Rage Against the Machine, Jimi Hendrix, Led
|
|
Zeppelin, Dead Kennedys, White Zombie, the Beastie Boys, etc, etc.
|
|
|
|
"Yes I know my enemies. They're the teachers who taught me to fight me.
|
|
Compromise, conformity, assimilation, submission, ignorance, hypocrisy,
|
|
brutality, the elite"
|
|
- /Know Your Enemy/ (c) Rage Against the Machine
|
|
|
|
- Deicide -
|
|
deicide@west.darkside.com
|
|
|
|
DISCLAIMER
|
|
==========
|
|
This file was provided for informational purposes only.
|
|
The author assumes no responsibilities for any individual's actions after
|
|
reading this file.
|
|
|