[ Pobierz całość w formacie PDF ]
************************************** * A BEGINNERS GUIDE TO: * * H A C K I N G * * * * U N I X * * * * BY JESTER SLUGGO * * (NOTE: THIS IS WRITTEN IN 40 COL.) * * WRITTEN 10/08/85 * ************************************** IN THE FOLLOWING FILE, ALL REFERENCES MADE TO THE NAME UNIX, MAY ALSO BE SUBSTITUTED TO THE XENIX OPERATING SYSTEM. BRIEF HISTORY: BACK IN THE EARLY SIXTIES, DURING THE DEVELOPMENT OF THIRD GENERATION COMPUTERS AT MIT, A GROUP OF PROGRAMMERS STUDYING THE POTENTIAL OF COMPUTERS, DISCOVERED THEIR ABILITY OF PERFORMING TWO OR MORE TASKS SIMULTANEOUSLY. BELL LABS, TAKING NOTICE OF THIS DISCOVERY, PROVIDED FUNDS FOR THEIR DEVELOPMENTAL SCIENTISTS TO INVESTIGATE INTO THIS NEW FRONTIER. AFTER ABOUT 2 YEARS OF DEVELOPMENTAL RESEARCH, THEY PRODUCED AN OPERATING SYSTEM THEY CANLMD "UNIX". SIXTIES TO CURRENT: DURING THIS TIME BELL SYSTEMS INSTALLED THE UNIX SYSTEM TO PROVIDE THEIR COMPUTER OPERATORS WITH THE ABILITY TO MULTITASK SO THAT THEY COULD BECOME MORE PRODUCTIVE, AND EFFICIENT. ONE OF THE SYSTEMS THEY PUT ON THE UNIX SYSTEM WAS CALLED "ELMOS". THROUGH ELMOS MANY TASKS (I.E. BILLING,AND INSTALLATION RECORDS) COULD BE DONE BY MANY PEOPLE USING THE SAME MAINFRAME. NOTE: COSMOS IS ACCESSED THROUGH THE ELMOS SYSTEM. CURRENT: TODAY, WITH THE DEVELOPMENT OF MICRO COMPUTERS, SUCH MULTITASKING CAN BE ACHIEVED BY A SCALED DOWN VERSION OF UNIX (BUT JUST AS POWERFUL). MICROSOFT,SEEING THIS DEVELOPMENT, OPTED TO DEVELOP THEIR OWN UNIX LIKE SYSTEM FOR THE IBM LINE OF PC/XT'S. THEIR RESULT THEY CALLED XENIX (PRONOUNCED ZEE-NICKS). BOTH UNIX AND XENIX CAN BE EASILY INSTALLEDON IBM PC'S AND OFFER THE SAME FUNCTION(JUST 2 DIFFERENT VENDORS).NOTE: DUE TO THE MANY DIFFERENTVERSIONS OF UNIX (BERKLEY UNIX,BELL SYSTEM III, AND SYSTEM VTHE MOST POPULAR) MANY COMMANDSFOLLOWING MAY/MAY NOT WORK. I HAVEWRITTEN THEM IN SYSTEM V ROUTINES.UNIX/XENIX OPERATING SYSTEMS WILLBE CONSIDERED IDENTICAL SYSTEMS BELOW.HOW TO TELL IF/IF NOT YOU ARE ON AUNIX SYSTEM: UNIX SYSTEMS ARE QUITECOMMON SYSTEMS ACROSS THE COUNTRY.THEIR SECURITY APPEARS AS SUCH:LOGIN; (OR LOGIN;)PASSWORD:WHEN HACKING ON A UNIX SYSTEM IT ISBEST TO USE LOWERCASE BECAUSE THE UNIXSYSTEM COMMANDS ARE ALL DONE IN LOWER-CASE.LOGIN; IS A 1-8 CHARACTER FIELD. IT ISUSUALLY THE NAME (I.E. JOE OR FRED)OF THE USER, OR INITIALS (I.E. J.JONESOR F.WILSON). HINTS FOR LOGIN NAMESCAN BE FOUND TRASHING THE LOCATION OFTHE DIAL-UP (USE YOUR CN/A TO FINDWHERE THE COMPUTER IS).PASSWORD: IS A 1-8 CHARACTER PASSWORDASSIGNED BY THE SYSOP OR CHOSEN BY THEUSER.COMMON DEFAULT LOGINS--------------------------LOGIN; PASSWORD:ROOT ROOT,SYSTEM,ETC..SYS SYS,SYSTEMDAEMON DAEMONUUCP UUCPTTY TTYTEST TESTUNIX UNIXBIN BINADM ADMWHO WHOLEARN LEARNUUHOST UUHOSTNUUCP NUUCPIF YOU GUESS A LGIN NAME AND YOU ARENOT ASKED FOR A PASSWORD, AND HAVEACCESSED TO THE SYSTEM, THEN YOU HAVEWHAT IS KNOWN AS A NON-GIFTED ACCOUNT.IF YOU GUESS A CORRECT LOGIN AND PASS-WORD, THEN YOU HAVE A USER ACCOUNT.AND, IF YOU GUESS THE ROOT PASSWORD,THEN YOU HAVE A "SUPER-USER" ACCOUNT.ALL UNIX SYSTEMS HAVE THE FOLLOWINGINSTALLED TO THEIR SYSTEM:ROOT, SYS, BIN, DAEMON, UUCP, ADMONCE YOU ARE IN THE SYSTEM, YOU WILLGET A PROMPT. COMMON PROMPTS ARE:$%#BUT CAN BE JUST ABOUT ANYTHING THESYSOP OR USER WANTS IT TO BE.THINGS TO DO WHEN YOU ARE IN: SOMEOF THE COMMANDS THAT YOU MAY WANT TOTRY FOLLOW BELOW:WHO IS ON (SHOWS WHO IS CURRENTLYLOGGED ON THE SYSTEM.)WRITE NAME (NAME IS THE PERSON YOUWISH TO CHAT WITH)TO EXIT CHAT MODE TRY CTRL-D.EOT=END OF TRANSFER.LS -A (LIST ALL FILES IN CURRENTDIRECTORY.)DU -A (CHECKS AMOUNT OF MEMORYYOUR FILES USE;DISK USAGE)CD\NAME (NAME IS THE NAME OF THESUB-DIRECTORY YOU CHOOSE)CD\ (BRINGS YOUR HOME DIRECTORYTO CURRENT USE)CAT NAME (NAME IS A FILENAME EITHERA PROGRAM OR DOCUMENTATIONYOUR USERNAME HAS WRITTEN)MOST UNIX PROGRAMS ARE WRITTENIN THE C LANGUAGE OR PASCALSINCE UNIX IS A PROGRAMMERS'ENVIRONMENT.ONE OF THE FIRST THINGS DONE ON THESYSTEM IS PRINT UP OR CAPTURE (IN ABUFFER) THE FILE CONTAINING ALL USERNAMES AND ACCOUNTS. THIS CAN BE DONEBY DOING THE FOLLOWING COMMAND:CAT /ETC/PASSWDIF YOU ARE SUCCESSFUL YOU WILL A LISTOF ALL ACCOUNTS ON THE SYSTEM. ITSHOULD LOOK LIKE THIS:ROOT:HVNSDCF:0:0:ROOT DIR:/:JOE:MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOEHAL::1:2:HAL SMITH:/BIN:/BIN/HALTHE "ROOT" LINE TELLS THE FOLLOWINGINFO :LOGIN NAME=ROOTHVNSDCF = ENCRYPTED PASSWORD0 = USER GROUP NUMBER0 = USER NUMBERROOT DIR = NAME OF USER/ = ROOT DIRECTORYIN THE JOE LOGIN, THE LAST PART"/BIN/JOE " TELLS US WHICH DIRECTORYIS HIS HOME DIRECTORY (JOE) IS.IN THE "HAL" EXAMPLE THE LOGIN NAME ISFOLLOWED BY 2 COLONS, THAT MEANS THATTHERE IS NO PASSWORD NEEDED TO GET INUSING HIS NAME.CONCLUSION: I HOPE THAT THIS FILEWILL HELP OTHER NOVICE UNIX HACKERSOBTAIN ACCESS TO THE UNIX/XENIXSYSTEMS THAT THEY MAY FIND. THERE ISSTILL WIDE GROWTH IN THE FUTURE OFUNIX, SO I HOPE USERS WILL NOT ABUSEANY SYSTEMS (UNIX OR ANY OTHERS) THATTHEY MAY HAPPEN ACROSS ON THEIRJOURNEY ACROSS THE ELECTRONIC HIGHWAYS OF AMERICA. THERE IS MUCH MORE TO BE LEARNED ABOUT THE UNIX SYSTEM THAT I HAVE NOT COVERED. THEY MAY BE FOUND BY BUYING A BOOK ON THE UNIX SYSTEM (HOW I LEARNED) OR IN THE FUTURE I MAY WRITE A PART II TO THIS........ Downloaded from P-80 Systems......
[ Pobierz całość w formacie PDF ]