113 lines
5.2 KiB
Plaintext
113 lines
5.2 KiB
Plaintext
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo
|
||
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
%+% GAINING ENTRY +%+
|
||
%+% - +%+
|
||
%+% HACKING THE WANG O/S +%+
|
||
%+% - +%+
|
||
%+% BY +%+
|
||
%+% THE DARK KNIGHT +%+
|
||
%+% - +%+
|
||
%+% 14/4/90 +%+
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
|
||
|
||
DISCLAIMER:
|
||
|
||
The author takes no responsiblity for, nor does he assume any liability for,
|
||
damages resulting from the use of information in this document. This
|
||
document is for informational purposes only.
|
||
|
||
|
||
INTRODUCTION:
|
||
|
||
In the world as we know it WANG mainframes are in general use with many of
|
||
the largest companies trading today.
|
||
|
||
WANG has long boasted that their mainframes are one of the most secure
|
||
systems availible and in a bid to make this fact more valid they decided to
|
||
create what they thought was the most advanced and secure operating systems
|
||
availible for their machines.
|
||
|
||
WANG set out to make the operating system uncrackable by the hacker as we
|
||
know it. They decided that if the hacker could not get past the user id
|
||
and password he would be foiled, so the clever systems programers decided
|
||
that they would create the most elaberate encrypting routines possible for
|
||
the user ids and passwords, and this is exactly what they did!
|
||
|
||
|
||
CRACKING THE PASSWORD:
|
||
|
||
Say for example you wished to modify a wardialer program to find the
|
||
password for you... Taking the password to be six characters long, mixed
|
||
uper and lower case and no numeric characters. The wardialer makes a call
|
||
every 18 seconds on average and taking 10 seconds for three tries at the
|
||
password, running 24 hours a day, 7 days a week, 365 days a year, the
|
||
wardialer would take a maximum of 112 years to find a correct password!
|
||
This is assuming you have a valid user id to begin with! This is not
|
||
really what the hacker wants to hear, is it?!
|
||
|
||
Unfortunately there is also no guest or visitor id's availible on the
|
||
system so you can't drop into the operating system and take a look around!
|
||
|
||
|
||
GETTING IN:
|
||
|
||
It looks like WANG did a good job then doesn't it! Well not quite! A few
|
||
bugs have managed to creap through, aiding the hacker. For example some
|
||
nice systems programmer left a back door in the operating system!!
|
||
|
||
With the relevant user id and password the hacker has access to the system,
|
||
but at this level you can't really do much, certainly not play with the
|
||
hardware or jump to other systems, or can you? You can only run a few
|
||
applications, not much to write home about you may think, things like
|
||
documents and the odd file display program! Rooting about in a directory
|
||
called SYS or SYSTEM you may come across a file called USERLIST or
|
||
something similar (The file names are always eight characters long) Every
|
||
system has a log of its users, id's and passwords. Not much use you may
|
||
think as the id's and passwords have been encrypted by the system. This
|
||
was the major cockup on the part of WANG. The only thing they did not
|
||
encrypt was the user list!!!
|
||
|
||
Logging on under the user id of CSG (Computer Services Group) and using the
|
||
password SESAME takes you into the system, via the back door! At this
|
||
level you can run a program called DISPLAY to print up the userlist, non
|
||
encrypted! Capturing the user id's and passwords as they flood up the
|
||
screen you can enjoy them in the comfort of your own home! Every user on
|
||
the system will be in the list, including the system managers and
|
||
engineers!!
|
||
|
||
|
||
O/S USERS:
|
||
|
||
So now you know how to gain full access to the system you may want to know
|
||
who uses it!
|
||
|
||
There are hundreds of user worldwide and these include: FORD, VIKING
|
||
INTERNATIONAL (Travel Company), and the worlds largest DRUG MANUFACTURING
|
||
COMPANY (Have a guess!! - Not ICI -) There are many more, more details
|
||
availble from me on request.
|
||
|
||
Many governments use the system, but have had the back door erradicated
|
||
during security checks, so don't expect to gain access to those machines!
|
||
|
||
|
||
|
||
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
% This document was written by The Dark Knight.+
|
||
% Contact me on ANGEL BBS - 0772 795476 24hrs. +
|
||
% or on EQUALISER BBS - 0923 662127 24hrs. +
|
||
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
|
||
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
+Sysops: Feel free to place this on your download section, but please ensure+
|
||
+that this document and credits remain intact and unchanged. Thank you. +
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|