| % = % = % = % = % = % = % = % |
| = = |
| % P h r a c k X V I I % |
| = = |
| % = % = % = % = % = % = % = % |
|
|
| Phrack Seventeen |
| 07 April 1988 |
|
|
| File 5 of 12 : How to Hack Cyber Systems |
|
|
|
|
|
|
| How To Hack A CDC Cyber |
|
|
| By: ** Grey Sorcerer |
|
|
|
|
| Index: |
|
|
| 1. General Hacking Tips |
| 2. Fun with the card punch |
| 3. Getting a new user number the easy way |
| 4. Hacking with Telex and the CDC's batch design |
| 5. Grabbing a copy of the whole System |
| 6. Staying Rolled In with BREAK |
| 7. Macro Library |
| 8. RJE Status Checks |
| 9. The Worm |
| 10. The Checkpoint/Restart Method to a Better Validation |
|
|
|
|
| I'm going to go ahead and skip all the stuff that's in your CDC reference |
| manuals.. what's a local file and all that. If you're at the point of being |
| ready to hack the system, you know all that; if not, you'll have to get up to |
| speed on it before a lot of this will make sense. Seems to me too many "how |
| to hack" files are just short rewrites of the user manuals (which you should |
| get for any serious penetration attempt anyway, or you'll miss lots of |
| possibilities), without any tips on ways to hack the system. |
|
|
|
|
| General hacking tips: |
|
|
|
|
| Don't get caught. Use remote dialups if possible and never never use any user |
| number you could be associated with. Also never re-use a user number. |
| Remember your typical Cyber site has a zillion user numbers, and they can't |
| watch every one. Hide in numbers. And anytime things get "hot", lay off for |
| awhile. |
|
|
| Magtapes are great. They hold about 60 Meg, a pile of data, and can hold even |
| more with the new drives. You can hide a lot of stuff here offline, like |
| dumps of the system, etc., to peruse. Buy a few top quality ones.. I like |
| Black Watch tapes my site sells to me the most, and put some innocuous crap on |
| the first few records.. data or a class program or whatever, then get to the |
| good stuff. That way you'll pass a cursory check. Remember a usual site has |
| THOUSANDS of tapes and cannot possibly be scanning every one; they haven't |
| time. |
|
|
| One thing about the Cybers -- they keep this audit trail called a "port log" |
| on all PPU and CPU accesses. Normally, it's not looked at. But just remember |
| that *everything* you do is being recorded if someone has the brains and the |
| determination (which ultimately is from you) to look for it. So don't do |
| something stupid like doing real work on your user number, log off, log right |
| onto another, and dump the system. They WILL know. |
|
|
| Leave No Tracks. |
|
|
| Also remember the first rule of bragging: Your Friends Turn You In. |
|
|
| And the second rule: If everyone learns the trick to increasing priority, |
| you'll all be back on the same level again, won't you? And if you show just |
| two friends, count on this: they'll both show two friends, who will show |
| four... |
|
|
| So enjoy the joke yourself and keep it that way. |
|
|
|
|
| Fun With The Card Punch |
|
|
|
|
| Yes, incredibly, CDC sites still use punch cards. This is well in keeping |
| with CDC's overall approach to life ("It's the 1960's"). |
|
|
| The first thing to do is empty the card punch's punchbin of all the little |
| punchlets, and throw them in someone's hair some rowdy night. I guarantee the |
| little suckers will stay in their hair for six months, they are impossible to |
| get out. Static or something makes them cling like lice. Showers don't even |
| work. |
|
|
| The next thing to do is watch how your local installation handles punch card |
| decks. Generally it works like this. The operators love punchcard jobs |
| because they can give them ultra-low priority, and make the poor saps who use |
| them wait while the ops run their poster-maker or Star Trek job at high |
| priority. So usually you feed in your punchcard deck, go to the printout |
| room, and a year later, out comes your printout. |
|
|
| Also, a lot of people generally get their decks fed in at once at the card |
| reader. |
|
|
| If you can, punch a card that's completely spaghetti -- all holes punched. |
| This has also been known to crash the cardreader PPU and down the system. Ha, |
| ha. It is also almost certain to jam the reader. If you want to watch an |
| operator on his back trying to pick pieces of card out of the reader with |
| tweezers, here's your chance. |
|
|
| Next, the structure of a card deck job gives lots of possibilities for fun. |
| Generally it looks like this: |
|
|
| JOB card: the job name (first 4 characters) |
| User Card: Some user number and password -- varies with site |
| EOR card: 7-8-9 are punched |
| Your Batch job (typically, Compile This Fortran Program). You know, FTN. |
| LGO. (means, run the Compiled Program) |
| EOR card: 7-8-9 are punched |
| The Fortran program source code |
| EOR card: 7-8-9 are punched |
| The Data for your Fortran program |
| EOF card: 6-7-8-9 are punched. This indicates: (end of deck) |
|
|
| This is extremely typical for your beginning Fortran class. |
|
|
| In a usual mainframe site, the punchdecks accumulate in a bin at the operator |
| desk. Then, whenever he gets to it, the card reader operator takes about |
| fifty punchdecks, gathers them all together end to end, and runs them through. |
| Then he puts them back in the bin and goes back to his Penthouse. |
|
|
|
|
| GETTING A NEW USER NUMBER THE EASY WAY |
|
|
|
|
| Try this for laughs: make your Batch job into: |
|
|
| JOB card: the job name (first 4 characters) |
| User Card: Some user number and password -- varies with site |
| EOR card: 7-8-9 are punched |
| COPYEI INPUT,filename: This copies everything following the EOR mark to the |
| filename in this account. |
| EOR Card: 7-8-9 are punched. |
|
|
| Then DO NOT put an EOF card at the end of your job. |
|
|
| Big surprise for the job following yours: his entire punch deck, with, of |
| course, his user number and password, will be copied to your account. This is |
| because the last card in YOUR deck is the end-of-record, which indicates the |
| program's data is coming next, and that's the next person's punch deck, all |
| the way up to -his- EOF card. The COPYEI will make sure to skip those pesky |
| record marks, too. |
|
|
| I think you can imagine the rest, it ain't hard. |
|
|
|
|
| Hacking With Telex |
|
|
| When CDC added timeshare to the punch-card batch-job designed Cyber machines, |
| they made two types of access to the system: Batch and Telex. Batch is a |
| punch-card deck, typically, and is run whenever the operator feels like it. |
| Inside the system, it is given ultra low priority and is squeezed in whenever. |
| It's a "batch" of things to do, with a start and end. |
|
|
| Telex is another matter. It's the timeshare system, and supports up to, oh, |
| 60 terminals. Depends on the system; the more RAM, the more swapping area (if |
| you're lucky enough to have that), the more terminals can be supported before |
| the whole system becomes slug-like. |
|
|
| Telex is handled as a weird "batch" file where the system doesn't know how |
| much it'll have to do, or where it'll end, but executes commands as you type |
| them in. A real kludge. |
|
|
| Because the people running on a CRT expect some sort of response, they're |
| given higher priority. This leads to "Telex thrashing" on heavily loaded CDC |
| systems; only the Telex users get anywhere, and they sit and fight over the |
| machine's resources. |
|
|
| The poor dorks with the punch card decks never get into the machine, because |
| all the Telex users are getting the priority and the CPU. (So DON'T use punch |
| cards.) |
|
|
| Another good tip: if you are REQUIRED to use punch cards, then go type in |
| your program on a CRT, and drop it to the automatic punch. Sure saves trying |
| to correct those typos on cards.. |
|
|
| When you're running under Telex, you're part of one of several "jobs" inside |
| the system. Generally there's "TELEX," something to run the line printer, |
| something to run the card reader, the mag tape drivers (named "MAGNET") and |
| maybe a few others floating around. There's limited space inside a Cyber.. |
| would you believe 128K 60-bit words?.. so there's a limited number of jobs |
| that can fit. CDC put all their effort into "job scheduling" to make the best |
| of what they had. |
|
|
| You can issue a status command to see all jobs running; it's educational. |
|
|
| Anyway, the CDC machines were originally designed to run card jobs with lots |
| of magtape access. You know, like IRS stuff. So they never thought a job |
| could "interrupt," like pressing BREAK on a CRT, because card jobs can't. |
| This gives great possibilities. |
|
|
| Like: |
|
|
| Grabbing a Copy Of The System |
|
|
| For instance. Go into BATCH mode from Telex, and do a Fortran compile. |
| While in that, press BREAK. You'll get a "Continue?" verification prompt. |
| Say no, you'd like to stop. |
|
|
| Now go list your local files. Whups, there's a new BIG one there. In fact, |
| it's a copy of the ENTIRE system you're running on -- PPU code, CPU code, ALL |
| compilers, the whole shebang! Go examine this local file; you'll see the |
| whole bloody works there, mate, ready to play with. |
|
|
| Of course, you're set up to drop this to tape or disk at your leisure, right? |
|
|
| This works because the people at CDC never thought that a Fortran compile |
| could be interrupted, because they always thought it would be running off |
| cards. So they left the System local to the job until the compile was done. |
| Interrupt the compile, it stays local. |
|
|
| Warning: When you do ANYTHING a copy of your current batch process shows up |
| on the operator console. Typically the operators are reading Penthouse and |
| don't care, and anyway the display flickers by so fast it's hard to see. But |
| if you copy the whole system, it takes awhile, and they get a blow-by-blow |
| description of what's being copied. ("Hey, why is this %^&$^ on terminal 29 |
| copying the PPU code?") I got nailed once this way; I played dumb and they let |
| me go. ("I thought it was a data file from my program"). |
|
|
|
|
| Staying "Rolled In" |
|
|
| When the people at CDC designed the job scheduler, they made several "queues." |
| "Queues" are lines. |
|
|
| There's: |
|
|
| 1. Input Queue. Your job hasn't even gotten in yet. It is standing outside, |
| on disk, waiting. |
| 2. Executing Queue. Your job is currently memory resident and is being |
| executed, although other jobs currently in memory are |
| competing for the machine as well. At least you're in |
| memory. |
| 3. Timed/Event Rollout Queue: Your job is waiting for something, usually a |
| magtape. Can also be waiting for a given time. Yes, this |
| means you can put a delayed effect job into the system. Ha, |
| ha. You are on disk at this point. |
| 4. Rollout Queue: Your job is waiting its turn to execute. You're out on |
| disk right now doing nothing. |
|
|
| Anyway, let's say you've got a big Pascal compile. First, ALWAYS RUN FROM |
| TELEX (means, off a CRT). Never use cards. If you use cards you're |
| automatically going to be low man on the priority schedule, because the CPU |
| doesn't *have* to get back to you soon. Who of us has time to waste? |
|
|
| Okay, do the compile. Then do a STATUS on your job from another machine. |
| Typically you'll be left inside the CPU (EXECUTE) for 10 seconds, where you'll |
| share the actual CPU with about 10-16 other jobs. Then you'll be rolled-out |
| (ROLLOUT), at which time you're phucked; you have to wait for your priority to |
| climb back up before it'll execute some more of your job. This can take |
| several minutes on a deeply loaded system. |
|
|
| (All jobs have a given priority level, which usually increments every 10 sec |
| or so, until they start executing). |
|
|
| Okay, do this. Press BREAK, then at the "Continue?" prompt, say yes. What |
| happened? Telex had to "roll your job in" to process the BREAK! So you get |
| another free 10 seconds of CPU -- which can get a lot done. |
|
|
| If you sit and hit BREAK - Y <return> every 10 sec or so during a really big |
| job, you will just fly through it. Of course, everyone else will be sitting |
| and staring at their screen, doing nothing, because you've got the computer. |
|
|
| If you're at a school with a Cyber, this is how to get your homework done at |
| high speed. |
|
|
|
|
| Macro Library |
|
|
| If you have a typical CDC site, they won't give you access to the "Macro |
| library." This is a set of CPU calls to do various things -- open files, do |
| directory commands, and whatnot. They will be too terrified of "some hacker." |
| Reality: The dimbulbs in power don't want to give up ANY of their power to |
| ANYONE. You can't really do that much more with the Macro library, which |
| gives assembly language access to the computer, than you can with batch |
| commands.. except what you do leaves lots less tracks. They REALLY have to |
| dig to find out what your program did if you use Macro calls.. they have to |
| go to PPU port logs, which is needle in a haystack sort of stuff, vs. batch |
| file logs, which are real obvious. |
|
|
| Worry not. Find someone at Arizona State or Minnesota U. that's cool, and get |
| them to send you a tape of the libraries. You'll get all the code you can |
| stand to look at. By the way they have a great poster tape... just copy the |
| posters to the line printer. Takes a long time to print them but it's worth |
| it. (They have all the classic ones.. man on the moon, various playmates, |
| Spock, etc. Some are 7 frames wide!). |
|
|
| With the Macro library, you can do many cool things. |
|
|
| The best is a demon scanner. All CDC user numbers have controlled access for |
| other users to individual files -- either private, (no access to anyone else), |
| semiprivate (others can read it but a record is made), or public (anyone can |
| diddle your files, no record). What you want is a program (fairly easy to do |
| in Fortran) that counts through user numbers, doing directory commands. If it |
| finds anything, it checks for non semi-private (so no records are made), then |
| copies it to you. |
|
|
| You'll find the damnedest stuff, I guarantee it. Try to watch some system |
| type signing in and get the digits of his user number, then scan variations |
| beginning with that user #. For instance, if he's a SYS1234, then scan all |
| user #'s beginning with SYS (sysaaaa to sys9999). |
|
|
| Since it's all inside the Fortran program, the only record, other than |
| hard-to-examine PPU logs, is a "Run Fortran Program" ("LGO.") on the batch |
| dayfile. If you're not giving the overworked system people reason to suspect |
| that commonplace, every-day student Fortran compile is anything out of the |
| ordinary, they will never bother to check -- the amount of data in PPU logs is |
| OVERWHELMING. |
|
|
| But you can get great stuff. |
|
|
| There's a whole cool library of Fortran-callable routines to do damned near |
| anything a batch command could do in the Minnesota library. Time to get some |
| Minnesota friends -- like on UseNet. They're real cooperative about sending |
| out tapes, etc. |
|
|
| Generally you'll find old files that some System Type made public one day (so |
| a buddy could copy them) then forgot about. I picked off all sorts of stuff |
| like this. What's great is I just claimed my Fortran programs were hanging |
| into infinite loops -- this explained the multi-second CPU execution times. |
| Since there wasn't any readily available record of what I was up to, they |
| believed it. Besides, how many idiot users really DO hang into loops? Lots. |
| Hide in numbers. I got Chess 4.2 this way -- a championship Chess program -- |
| and lots of other stuff. The whole games library, for instance, which was |
| blocked from access to mere users but not to sysfolk. |
|
|
| Again, they *can* track this down if you make yourself obnoxious (it's going |
| to be pretty obvious what you're doing if there's a CAT: SYSAAAA |
| CAT: SYSAAAB CAT: SYSAAAC .. etc. on your PPU port log) so do this on someone |
| else's user number. |
|
|
|
|
| RJE Status Checks |
|
|
| Lots of stupid CDC installations.. well, that doesn't narrow the field much.. |
| have Remote Job Entry stations. Generally at universities they let some poor |
| student run these at low pay. |
|
|
| What's funny is these RJE's can do a status on the jobs in the system, and the |
| system screeches to a halt while the status is performed. It gets top |
| priority. |
|
|
| So, if you want to incite a little rebellion, just sit at your RJE and do |
| status requests over and over. The system will be even slower than usual. |
|
|
|
|
| The Worm |
|
|
| Warning: This is pretty drastic. It goes past mere self-defense in getting |
| enough priority to get your homework done, or a little harmless exploration |
| inside your system, to trying to drop the whole shebang. |
|
|
| It works, too. |
|
|
|
|
| You can submit batch jobs to the system, just as if you'd run them through the |
| punchcard reader, using the SUBMIT command. You set up a data file, then do |
| SUBMIT datafile. It runs separate from you. |
|
|
| Now, let's say we set up a datafile named WORM. It's a batch file. It looks |
| like this: |
|
|
| JOB |
| USER,blah (whatever -- a user number you want crucified) |
| GET,WORM; get a copy of WORM |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| SUBMIT,WORM.; send it to system |
| (16 times) |
| (end of file) |
|
|
| Now, you SUBMIT WORM. What happens? Worm makes 16 copies of itself and |
| submits those. Those in turn make 16 copies of themselves (now we're up to |
| 256) and submit those. Next pass is 4096. Then 65536. Then... |
|
|
| Now, if you're really good, you'll put on your "job card" a request for high |
| priority. How? Tell the system you need very little memory and very little |
| CPU time (which is true, Submit takes almost nothing at all). The scheduler |
| "squeezes" in little jobs between all the big ones everyone loves to run, and |
| gives ultra-priority to really tiny jobs. |
|
|
| What happens is the system submits itself to death. Sooner or later the input |
| queue overflows .. there's only so much space .. and the system falls apart. |
|
|
| This is a particularly gruesome thing to do to a system, because if the guy |
| at the console (count on it) tries the usual startup, there will still be |
| copies of WORM in the input queue. First one of those gets loose, the system |
| drops again. With any luck the system will go up and down for several hours |
| before someone with several connected brain cells arrives at the operator |
| console and coldstarts the system. |
|
|
| If you've got a whole room full of computer twits, all with their hair tied |
| behind them with a rubber band into a ponytail, busily running their Pascal |
| and "C" compiles, you're in for a good time. One second they will all be |
| printing -- the printers will be going weep-weep across the paper. Next |
| second, after you run, they will stop. And they will stay stopped. If you've |
| done it right they can't get even get a status. Ha, ha. |
|
|
| The faster the CPU, the faster it will run itself into the ground. |
|
|
| CDC claims there is a limit on the number of jobs a user number can have in |
| the system. As usual they blew it and this limit doesn't exist. Anyway, it's |
| the input queue overflow that kills things, and you can get to the input queue |
| without the # of jobs validation check. |
|
|
| Bear in mind that *anything* in that batch file is going to get repeated ten |
| zillion times at the operator console as the little jobs fly by by the |
| thousands. So be sure to include some charming messages, like: |
|
|
| job,blah |
| user,blah |
| * eat me! |
| get,worm |
| submit,worm .. etc. |
|
|
| There will now be thousands of little "eat me!"'s scrolling across the console |
| as fast as the console PPU can print them. |
|
|
| Generally at this point the operator will have his blood pressure really |
| spraying out his ears. |
|
|
| Rest assured they will move heaven and earth to find you. This includes past |
| dayfiles, user logs, etc. So be clean. Remember, "Revenge is a dish best |
| served cold." If you're mad at them, and they know it, wait a year or so, |
| until they are scratching their heads, wondering who hates them this much. |
|
|
| Also: make sure you don't take down a really important job someone else is |
| doing, okay? Like, no medical databases, and so forth. |
|
|
| Now, for a really deft touch, submit a timed/event job. This "blocks" the job |
| for awhile, until a given time is reached. Then, when you're far, far away, |
| with a great alibi, the job restarts, the system falls apart, and you're |
| clear. If you do the timed/event rollout with a Fortran program macro call, |
| it won't even show up on the log. |
|
|
| (Remember that the System Folk will eventually realize, in their little minds, |
| what you've done. It may take them a year or two though). |
|
|
|
|
| CHECKPOINT / RESTART |
|
|
| I've saved the best for last. |
|
|
| CDC's programmers supplied two utilities, called CheckPoint and Restart, |
| primarily because their computers kept crashing before they would finish |
| anything. What Checkpoint does is make a COMPLETE copy of what you're doing - |
| all local files, all of memory, etc. -- into a file, usually on a magtape. |
| Then Restart "restarts" from that point. |
|
|
| So, when you're running a 12 hour computer job, you sprinkle checkpoints |
| throughout, and if the CDC drops, you can restart from your last CKP. It's |
| like a tape backup of a hard disk. This way, you only lose the work done on |
| your data between the last checkpoint and now, rather than the whole 12 hours. |
| Look, this is real important on jobs that take days -- check out your local |
| IRS for details.. |
|
|
| Now what's damned funny is if you look closely at the file Checkpoint |
| generates, you will find a copy of your user validations, which tell |
| everything about you to the system, along with the user files, memory, etc. |
| You'll have to do a little digging in hex to find the numbers, but they'll |
| match up nicely with the display you of your user validations from that batch |
| command. |
|
|
| Now, let's say you CKP,that makes the CKP file. Then run a little FORTRAN |
| program to edit the validations that are inside that CKP-generated file. Then |
| you RESTART from it. Congratulations. You're a self made man. You can do |
| whatever you want to do - set your priority level to top, grab the line |
| printer as your personal printer, kick other jobs off the system (it's more |
| subtle to set their priority to zilch so they never execute), etc. etc. |
| You're the operator. |
|
|
| This is really the time to be a CDC whiz and know all sorts of dark, devious |
| things to do. I'd have a list of user numbers handy that have files you'd |
| like made public access, so you can go in and superzap them (then peruse them |
| later from other signons), and so forth. |
|
|
| There's some gotchas in here.. for instance, CKP must be run as part of a |
| batch file out of Telex. But you can work around them now that you know the |
| people at CDC made RESTART alter your user validations. |
|
|
| It makes sense in a way. If you're trying to restart a job you need the same |
| priority, memory, and access you had when trying to run it before. |
|
|
| Conclusion |
|
|
|
|
| There you have it, the secrets of hacking the Cyber. |
|
|
| They've come out of several years at a college with one CDC machine, which I |
| will identify as being somewhere East. They worked when I left; while CDC may |
| have patched some of them, I doubt it. They're not real fast on updates to |
| their operating system. |
|
|
|
|
| ** Grey Sorcerer |
|
|