163 lines
5.8 KiB
Plaintext
163 lines
5.8 KiB
Plaintext
|
|
|
|
From: _ _ _______
|
|
| \/ | / _____/
|
|
|_||_|etal/ /hop
|
|
_________/ /
|
|
/__________/
|
|
(314)432-0756
|
|
24 hours a day, 300 baud, Elite BBS
|
|
|
|
**************************************
|
|
* A beginners guide to: *
|
|
* H A C K I N G *
|
|
* *
|
|
* U N I X *
|
|
* *
|
|
* By Jester Sluggo *
|
|
* Written 10/08/85 *
|
|
**************************************
|
|
|
|
In the following file, all references made to the name Unix, may also be
|
|
substituted to the Xenix operating system.
|
|
|
|
Brief history: Back in the early sixties, during the development of third
|
|
generation computers at MIT, a group of programmers studying the potential of
|
|
computers, discovered their ability of performing two or more tasks
|
|
simultaneously. Bell Labs, taking notice of this discovery, provided funds for
|
|
their developmental scientists to investigate into this new frontier. After
|
|
about 2 years of developmental research, they produced an operating system they
|
|
called "Unix".
|
|
|
|
Sixties to Current: During this time Bell Systems installed the Unix system
|
|
to provide their computer operators with the ability to multitask so that they
|
|
could become more productive, and efficient. One of the systems they put on theUnix system was called "Elmos". Through Elmos many tasks (i.e. billing,and
|
|
installation records) could be done by many people using the same mainframe.
|
|
|
|
Note: Cosmos is accessed through the Elmos system.
|
|
|
|
Current: Today, with the development of micro computers, such multitasking
|
|
can be achieved by a scaled down version of Unix (but just as powerful).
|
|
Microsoft,seeing this development, opted to develop their own Unix like system
|
|
for the IBM line of PC/XT's. Their result they called Xenix (pronounced
|
|
zee-nicks). Both Unix and Xenix can be easily installed on IBM PC's and offer
|
|
the same functions (just 2 different vendors).
|
|
|
|
Note: Due to the many different versions of Unix (Berkley Unix, Bell System
|
|
III, and System V the most popular) many commands following may/may not work. Ihave written them in System V routines. Unix/Xenix operating systems will be
|
|
considered identical systems below.
|
|
|
|
How to tell if/if not you are on a Unix system: Unix systems are quite commonsystems across the country. Their security appears as such:
|
|
|
|
Login; (or login;)
|
|
password:
|
|
|
|
When hacking on a Unix system it is best to use lowercase because the Unix
|
|
system commands are all done in lower- case.
|
|
|
|
Login; is a 1-8 character field. It is usually the name (i.e. joe or fred)
|
|
of the user, or initials (i.e. j.jones or f.wilson). Hints for login names canbe found trashing the location of the dial-up (use your CN/A to find where the
|
|
computer is).
|
|
|
|
Password: is a 1-8 character password assigned by the sysop or chosen by the
|
|
user.
|
|
|
|
Common default logins
|
|
--------------------------
|
|
|
|
login; Password:
|
|
|
|
root root,system,etc..
|
|
sys sys,system
|
|
daemon daemon
|
|
uucp uucp
|
|
tty tty
|
|
test test
|
|
unix unix
|
|
bin bin
|
|
adm adm
|
|
who who
|
|
learn learn
|
|
uuhost uuhost
|
|
nuucp nuucp
|
|
|
|
If you guess a login name and you are not asked for a password, and have
|
|
accessed to the system, then you have what is known as a non-gifted account. Ifyou guess a correct login and pass- word, then you have a user account. And,
|
|
if you guess the root password, then you have a "super-user" account. All Unix
|
|
systems have the following installed to their system: root, sys, bin, daemon,
|
|
uucp, adm
|
|
|
|
Once you are in the system, you will get a prompt. Common prompts are:
|
|
|
|
|
|
$
|
|
|
|
%
|
|
|
|
#
|
|
|
|
|
|
But can be just about anything the sysop or user wants it to be.
|
|
|
|
Things to do when you are in: Some of the commands that you may want to try
|
|
follow below:
|
|
|
|
who is on (shows who is currently logged on the system.)
|
|
write name (name is the person you wish to chat with)
|
|
To exit chat mode try ctrl-D.
|
|
EOT=End of Transfer.
|
|
ls -a (list all files in current directory.)
|
|
du -a (checks amount of memory your files use;disk usage)
|
|
cd\name (name is the name of the sub-directory you choose)
|
|
cd\ (brings your home directory to current use)
|
|
cat name (name is a filename either a program or documentation your username
|
|
has written)
|
|
|
|
Most Unix programs are written in the C language or Pascal since Unix is a
|
|
programmers' environment.
|
|
|
|
One of the first things done on the system is print up or capture (in a
|
|
buffer) the file containing all user names and accounts. This can be done by
|
|
doing the following command:
|
|
|
|
|
|
|
|
cat /etc/passwd
|
|
|
|
|
|
|
|
If you are successful you will a list of all accounts on the system. It
|
|
should look like this:
|
|
|
|
root:hvnsdcf:0:0:root dir:/:
|
|
joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe
|
|
hal::1:2:Hal Smith:/bin:/bin/hal
|
|
|
|
The "root" line tells the following info :
|
|
|
|
login name=root
|
|
hvnsdcf = encrypted password
|
|
0 = user group number
|
|
0 = user number
|
|
root dir = name of user
|
|
/ = root directory
|
|
|
|
In the Joe login, the last part "/bin/joe " tells us which directory is his
|
|
home directory (joe) is.
|
|
|
|
In the "hal" example the login name is followed by 2 colons, that means that
|
|
there is no password needed to get in using his name.
|
|
|
|
Conclusion: I hope that this file will help other novice Unix hackers obtain
|
|
access to the Unix/Xenix systems that they may find. There is still wide growthin the future of Unix, so I hope users will not abuse any systems (Unix or any
|
|
others) that they may happen across on their journey across the electronic
|
|
highways of America. There is much more to be learned about the Unix system
|
|
that I have not covered. They may be found by buying a book on the Unix System
|
|
(how I learned) or in the future I may write a part II to this........
|
|
|
|
/
|
|
\
|
|
/ luggo !!
|
|
"Only the Fool fears none."
|
|
|
|
Hack Philez] |