| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Five, File 15 of 28 |
|
|
| **************************************************************************** |
|
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
| Some Helpful VAX/VMS utilities |
|
|
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
|
|
| Introduction : |
| ^^^^^^^^^^^^ |
| This article contains a brief introduction to some not so often used |
| utilities, found on the Virtual Address eXtentions/ Virtual Memory System or |
| better known to us as the VAX/VMS. |
|
|
| Please note that this file is meant for the so called VMS "newbies". It gives |
| an insight to the processes that are running in the different "Hibernation" |
| states on VMS, quite similar to the background processes running on UNIX and |
| its clones. If you have "extensive" experience on VMS as a systems programmer |
| or a SysOp, you might want to skip it !! |
|
|
| Portions of this file are taken from the ever blabbering VMS HELP, which is |
| where many of us, myself included, learn about the VAX/VMS. VMS has lots of |
| secrets. Locations of "hidden" files are a very well kept secret, known |
| not even to the SysOp but only to the system programmer. |
|
|
| Ok.... Lets get started... |
|
|
|
|
| SHOW SYSTEM : |
| ^^^^^^^^^^^ |
| This command ($Show system) will display information about the |
| status of the processes running on the system. |
| There are various options to this command, some of which are listed below. |
|
|
|
|
| /BATCH /CLUSTER /FULL /NETWORK /NODE /OUTPUT |
| /PROCESS /SUBPROCESS |
|
|
|
|
|
|
|
|
| 1. $ SHOW SYSTEM |
|
|
| VAX/VMS 5.4 on node DARTH 19-APR-1990 17:45:47.78 Uptime 2 21:53:59 |
| Pid Process Name State Pri I/O CPU Page flts Ph.Mem |
| 27400201 SWAPPER HIB 16 0 0 00:29:52.05 0 0 |
| 27401E03 DOCBUILD LEF 4 37530 0 00:05:47.62 96421 601 |
| 27402604 BATCH_789 LEF 4 3106 0 00:00:48.67 4909 2636 B |
| 27401C05 BATCH_60 LEF 6 248 0 00:00:06.83 1439 1556 B |
| 27400207 ERRFMT HIB 8 6332 0 00:00:41.83 89 229 |
| 27400208 CACHE_SERVER HIB 16 2235 0 00:00:05.85 67 202 |
| 27400209 CLUSTER_SERVER HIB 8 4625 0 00:22:13.28 157 448 |
| 2740020C JOB_CONTROL HIB 10 270920 0 01:07:47.88 5163 1384 |
| 2740020D CONFIGURE HIB 9 125 0 00:00:00.53 104 264 |
| . |
| . |
| . |
| 27400E8D Sir Lancelot LEF 5 226 0 00:00:07.87 4560 697 |
| 2740049A Guenevere LEF 4 160 0 00:00:02.69 534 477 |
| 27401EA0 BATCH_523 CUR 4 4 17470 0 03:25:49.67 8128 5616 B |
| 274026AF GAWAIN CUR 6 4 14045 0 00:02:03.24 20032 397 |
| 274016D5 GAHERIS LEF 6 427 0 00:00:09.28 5275 1384 |
| 27401ED6 knight_1 HIB 5 935 0 00:00:10.17 3029 2204 S |
| 274012D7 BATCH_689 LEF 4 49216 0 00:14:18.36 7021 3470 B |
| 274032D9 DECW$MAIL LEF 4 2626 0 00:00:51.19 4328 3087 B |
| 274018E3 SERVER_0021 LEF 6 519 0 00:00:07.07 1500 389 N |
| 274016E8 NMAIL_0008 HIB 4 10955 0 00:00:55.73 5652 151 |
| 274034EA MORDRED LEF 4 2132 0 00:00:23.85 5318 452 |
| 274022EB S. Whiplash CUR 6 4 492 0 00:00:12.15 5181 459 |
| 274018EF DwMail LEF 5 121386 0 00:28:00.97 7233 4094 |
| 27401AF0 EMACS$RTA43 LEF 4 14727 0 00:03:56.54 8411 4224 S |
| 27400CF4 TRISTRAM HIB 5 25104 0 00:06:07.76 37407 1923 |
| 274020F5 Morgan LEF 7 14726 0 00:02:10.74 34262 1669 |
| 27400CF6 mr. mike LEF 9 40637 0 00:05:15.63 18454 463 |
|
|
| The information in this example includes the following: |
|
|
| o Process identification (PID) code-A 32-bit binary value that |
| uniquely identifies a process. |
|
|
| o Process name-A 1- to 15-character string used to identify a |
| process. |
|
|
| o Process state-The activity level of the process, such as COM |
| (computing), HIB (hibernation), LEF (local event flag) wait, |
| or CUR (if the process is current). If a multiprocessing |
| environment exists, the display shows the CPU ID of the |
| processor on which any current process is executing. |
|
|
| Note that the SHOW SYSTEM command examines the processes on |
| the system without stopping activity on the system. In this |
| example process information changed during the time that the |
| SHOW SYSTEM command collected the data to be displayed. As |
| a result, this display includes two processes, named GAWAIN |
| and S. Whiplash, with the state CUR on the same CPU, CPU ID |
| 6 in the example. |
|
|
| o Current priority-The priority level assigned to the process |
| (the higher the number, the higher the priority). |
|
|
| o Total process I/O count-The number of I/O operations |
| involved in executing the process. This consists of both |
| the direct I/O count and the buffered I/O count. |
|
|
| o Charged CPU time-The amount of CPU time that a process has |
| used thus far. |
|
|
| o Number of page faults-The number of exceptions generated by |
| references to pages that are not in the process's working |
| set. |
|
|
| o Physical memory occupied-The amount of space in physical |
| memory that the process is currently occupying. |
|
|
| o Process indicator-Letter B indicates a batch job; letter |
| S indicates a subprocess; letter N indicates a network |
| process. |
|
|
| o User identification code (UIC)-An 8-digit octal number |
| assigned to a process. This number is displayed only if the |
| /FULL qualifier is specified. |
|
|
|
|
|
|
| 2. $ SHOW SYSTEM /CLUSTER |
|
|
|
|
| VAX/VMS V5.4 on node APPLE 19-APR-1990 09:09:58.61 Uptime 0 2:27:11 |
| Pid Process Name State Pri I/O CPU Page flts Ph. Mem |
| 31E00041 SWAPPER HIB 16 0 0 00:00:02.42 0 0 |
| 31E00047 CACHE_SERVER HIB 16 58 0 00:00:00.26 80 36 |
| 31E00048 CLUSTER_SERVER CUR 9 156 0 00:00:58.15 1168 90 |
| 31E00049 OPCOM HIB 7 8007 0 00:00:33.46 5506 305 |
| 31E0004A AUDIT_SERVER HIB 9 651 0 00:00:21.17 2267 22 |
| 31E0004B JOB_CONTROL HIB 10 1030 0 00:00:11.02 795 202 |
|
|
| . |
| . |
|
|
| The SHOW SYSTEM command in this example shows all processes on |
| all nodes of the cluster. |
|
|
|
|
| 3. $ SHOW SYSTEM /NODE=NEON |
| VAX/VMS V5.4 on node NEON 19-APR-1990 09:19:15.33 Uptime 0 02:29:07 |
| Pid Process Name State Pri I/O CPU Page flts Ph. Mem |
| 36200041 SWAPPER HIB 16 0 0 00:00:12.03 0 0 |
| 36200046 ERRFMT HIB 8 263 0 00:00:05.89 152 87 |
| 36200047 CACHE_SERVER CUR 16 9 0 00:00:00.26 80 51 |
| 36200048 CLUSTER_SERVER CUR 8 94 0 00:00:30.07 340 68 |
| 36200049 OPCOM HIB 6 2188 0 00:02:01.04 1999 177 |
| 3620004A AUDIT_SERVER HIB 10 346 0 00:00:10.42 1707 72 |
| . |
| . |
| . |
|
|
|
|
| The SHOW SYSTEM command in this example shows all processes on |
| the node NEON. |
|
|
|
|
| ----- X ----- |
|
|
| So now that we beat the SHOW SYSTEM command to death, lets take on another |
| command. Hmmm..let's see..Ahhhaaaa the MONITOR SYSTEM !!!!! |
|
|
| This is a pretty neat command and one of my favorite "play" commands. Don't |
| get me wrong, there's a lot to be learned from "play" commands like these. |
| It really gives us some useful information. The reason why I like this |
| utility is because it gives a GRAPHICAL representation of the |
| data given by the SHOW SYSTEM. I would have included a short example |
| of the graphics, but not everyone receiving this article would be running |
| VMS on a terminal with ANSI emulation. So, if you want to see the ANSI |
| graphics, follow my instructions... |
|
|
|
|
| MONITOR |
|
|
| Invokes the VMS Monitor Utility (MONITOR) to monitor classes of |
| system-wide performance data at a specified interval. It produces |
| three types of optional output: |
|
|
| o Recording file |
| o Statistical terminal display |
| o Statistical summary file |
|
|
| You can collect data from a running system or from a previously created |
| recording file. |
|
|
| You can execute a single MONITOR request, or enter MONITOR interactive |
| mode to execute a series of requests. Interactive mode is entered when |
| the MONITOR command is issued with no parameters or qualifiers. |
|
|
| A MONITOR request can be terminated by pressing CTRL/C or CTRL/Z. CTRL/C |
| causes MONITOR to enter interactive mode; CTRL/Z returns to DCL. |
|
|
|
|
| The MONITOR Utility is described in detail in the VMS Monitor Utility |
| Manual. |
|
|
| Format: |
| MONITOR class-name[,...] |
|
|
| There are quite a few different options available for the MONITOR utility. |
| We are not going to get into too much detail about each option, but I will |
| take the time to discuss a few. The different options for MONITOR are.... |
|
|
| ALL_CLASSES CLUSTER DECNET DISK DLOCK FCP |
| FILE_SYSTEM_CACHE IO LOCK MODES MSCP_SERVER |
| PAGE POOL PROCESSES RMS SCS STATES SYSTEM |
| TRANSACTION VECTOR |
| /BEGINNING /BY_NODE /COMMENT /DISPLAY /ENDING /FLUSH_INTERVAL |
| /INPUT /INTERVAL /NODE /RECORD /SUMMARY /VIEWING_TIME |
| /ALL /AVERAGE /CPU /CURRENT /FILE /ITEM /MAXIMUM |
|
|
|
|
| MONITOR Parameter class-name[,...] |
|
|
| Specifies one or more classes of performance data to be monitored. |
| The available class-names are: |
|
|
| ALL_CLASSES All MONITOR classes. |
| CLUSTER Cluster wide information. |
| DECNET DECnet-VAX statistics. |
| DISK Disk I/O statistics. |
| DLOCK Distributed lock management statistics |
| FCP File system primitive statistics. |
| FILE_SYSTEM_CACHE File system caching statistics. |
| IO System I/O statistics. |
| LOCK Lock management statistics. |
| MODES Time spent in each of the processor modes. |
| MSCP_SERVER MSCP Server statistics |
| PAGE Page management statistics. |
| POOL Space allocation in the nonpaged dynamic pool. |
| PROCESSES Statistics on all processes. |
| RMS VMS Record Management Services statistics |
| SCS System communication services statistics. |
| STATES Number of processes in each scheduler state. |
| SYSTEM System statistics. |
| TRANSACTION DECdtm services statistics. |
| VECTOR Vector Processor scheduled usage. |
|
|
|
|
| MONITOR |
|
|
| /ALL |
|
|
| Specifies that a table of current, average, minimum, and maximum |
| statistics is to be included in display and summary output. |
|
|
| /ALL is the default for all class-names except MODES, STATES and |
| SYSTEM. It may not be used with the PROCESSES class-name. |
|
|
|
|
| ---- X ---- |
|
|
| Well, I hope this little file helps a few people out, by providing them |
| with a better understanding of the background processes running on the system |
| and by providing a better perception of the amount of CPU and I/O time taken |
| by each process. |
|
|
|
|
|
|
|
|
| DARTH VADER |
|
|
|
|
| P.S : Look for a file on ACL (Access Control Listing) in the near future. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| ---------------------------- |
| VAX/VMS AUTHORIZATION SYSTEM |
| ---------------------------- |
|
|
| Introduction: |
| ------------ |
|
|
| Well, since Phrack issues containing VMS articles are pretty rare I will |
| examine in deep the authorization sub-system on VAXes. |
|
|
| Keep in mind that I will take under consideration that you are probably |
| under some new VMS version (5.5-X). If you are on some older VMS, don't |
| worry, commands are the same, just some flags and display was added on |
| later versions. The knowledge of the authorization sub-system is of great |
| importance for a VAX hacker since he must keep himself an access to the |
| system, and this is the right way to do it. |
|
|
| Also keep in mind that this is just a practical guide oriented to a hacker's |
| needs and was done to be understandable by and useable by everybody, |
| even those who are not so familiar with VMS. That's why I included some |
| references to VMS filesystem, privileges, etc. |
|
|
| AUTHORIZE: |
| --------- |
|
|
| The authorization subsystem is the one that will let you create accounts |
| under the VMS operating system. The command you need to execute is the: |
|
|
| SYS$SYSTEM:AUTHORIZE.EXE |
|
|
| What do you need to execute that program ? |
|
|
| READ/WRITE PRIVS over SYSUAF.DAT |
| EXECUTE PRIVS over SYS$SYSTEM:AUTHORIZE.EXE |
|
|
| How can you check if you got all needed to start creating accounts ? |
|
|
| DIR SYS$SYSTEM:AUTHORIZE.EXE/FULL |
|
|
| Directory SYS$SYSROOT:[SYSEXE] <----- Directory you are listing |
|
|
| AUTHORIZE.EXE;1 File ID: (2491,5,0) |
| Size: 164/165 Owner: [SYSTEM] <---- Owner is Sys Manager |
| Created: 20-JUL-1990 08:30:34.18 <------- Creation Date of program |
| Revised: 17-AUG-1992 09:45:36.31 (4) <------ Last modification over program |
| Expires: <None specified> <---- No expiration, will last for ever |
| Backup: <No backup recorded> |
| File organization: Sequential |
| File attributes: Allocation: 165, Extend: 0, Global buffer count: 0 |
| No version limit, Contiguous best try |
| Record format: Fixed length 512 byte records <--- record organization |
| Record attributes: None |
| RMS attributes: None |
| Journaling enabled: None |
| File protection: System:RWED, Owner:RWED, Group:R, World: <---- (*) |
| Access Cntrl List: None |
| Total of 1 file, 164/165 blocks. |
|
|
| (*) This is the field that will tell if you are authorized to execute the |
| program. In this case if you own a privileged account you |
| can run it. That doesn't mean that you will be able to view/modify |
| any account found on the SYSUAF.DAT. But 95 % of the time any user |
| can execute the AUTHORIZE program even if you don't have READ privilege |
| on the SYS$SYSTEM directory. That means that if you do a : |
|
|
| DIR SYS$SYSTEM |
|
|
| and you find that you don't have the privilege to view the files contained |
| in that directory you may still be able to execute the AUTHORIZATION |
| subsystem, of course, you have a real low chance of getting the SYSUAF.DAT |
| read or modified. |
|
|
| If you find that the authorize program cannot be executed a good method is |
| to send it UUENCODED from another VAX where you *DO* have at least read access |
| to SYS$SYSTEM:AUTHORIZE.EXE . If you are working on the X-25's you can send |
| it via PSI mailing. If you are on the Internet, just send it using the |
| normal mail routing method to the user on the VAX you want the AUTHORIZE.EXE |
| to get executed by. Once you get it just UUDECODE it and place it in your |
| SYS$LOGIN directory and execute it!. |
|
|
| The authorize will work as a module, and won't try to overlay any other module |
| to make it work correctly. If you can run the authorize you should receive : |
|
|
| "UAF>" prompt. |
|
|
| THE SYSUAF.DAT: |
| -------------- |
|
|
| The SYSUAF.DAT is the most important file of the authorization subsystem. |
| All the accounts are stored here with their : |
|
|
| - PASSWORDS (encrypted) |
| - ENVIRONMENT |
| - DIR |
| - privileges |
| - RIGHTS OVER THE FILES |
| ... and more |
|
|
| The SYSUAF.DAT is somehow like the /etc/passwd file on Unix OS. |
| Under UNIX you can take the password file and with an editor add yourself |
| an account or modify an existing one without problem. Well this is not |
| possible under VMS. You need a program that knows SYSUAF.DAT record structure |
| (like AUTHORIZE) to take action over accounting system. |
|
|
| The main difference is that the SYSUAF.DAT is not a PLAIN TEXT FILE, its |
| a binary file structured to be read only by the AUTHORIZE program. |
| Another main difference is that is not world readable, can usually be only |
| read from high privileged accounts or from accounts which can override |
| system protection flags (will talk about this later). |
|
|
| The SYSUAF.DAT can be found in the same directory as the AUTHORIZE.EXE |
| program, the SYS$SYSTEM. You will usually find a few versions of this file |
| but normally with the same protections as the working one. |
| What can be interesting is that you can usually find files produced by the |
| output of the LIST command (under AUTHORIZE) which can be WORLD readable where |
| you will have all the accounts listed with the OWNER/DIR/PRIVS..etc. That will |
| help you a lot to try to hack some accounts if you still can't run authorize. |
| Those files are called normally: SYSUAF.LIS, and you might find more than |
| just one of them. Of course try to get the latest one since the older |
| ones will contain some expired/deleted accounts. |
|
|
| To check what privilege you have over the SYSUAF.DAT issue : |
|
|
| DIR SYS$SYSTEM:SYSUAF.DAT/FULL |
|
|
| Directory SYS$COMMON:[SYSEXE] |
| SYSUAF.DAT;1 File ID: (228,1,0) |
| Size: 183/183 Owner: [SYSTEM] |
| Created: 20-JUL-1990 08:30:21.50 |
| Revised: 14-JAN-1994 03:33:27.75 (34812) <--- Last Creation/Modification |
| Expires: <None specified> |
| Backup: <No backup recorded> |
| File organization: Indexed, Prolog: 3, Using 4 keys |
| In 3 areas |
| File attributes: Allocation: 183, Extend: 3, Maximum bucket size: 3 |
| Global buffer count: 0, No version limit |
| Contiguous best try |
| Record format: Variable length, maximum 1412 bytes |
| Record attributes: None |
| RMS attributes: None |
| Journaling enabled: None |
| File protection: System:RWED, Owner:RWED, Group:R, World: (*) |
| Access Cntrl List: None |
|
|
| Total of 1 file, 183/183 blocks. |
|
|
| In this case, if you are under a standard user account you won't be |
| able to READ or/and WRITE the SYSUAF.DAT. So when you will execute the |
| AUTHORIZE program, it will quit and kick you back to shell. |
| IF you have World : R, you will be able to LIST/SHOW accounts. |
| IF you have World : RW, you will be able to CREATE/MODIFY accounts. |
|
|
| But if you happen to have SYSPRIV you will be able CREATE/MODIFY the |
| SYSUAF.DAT at your pleasure! Since you can override the system protection |
| that has been imposed over that file. Of course, if you have SETPRV |
| privilege you have ALL privilege, and you can do whatever you want |
| with the VAX. |
|
|
| Privileges needed to CREATE/MODIFY accounts : |
|
|
| Process privileges: |
| *SETPRV may set any privilege bit |
| Explanation: With this only you can assign yourself all the privileges you |
| need with a SET PROC/PRIVS=ALL. |
|
|
| *SYSPRV may access objects via system protection |
| Explanation: If you have this one you will be able to read the SYSUAF.DAT. |
|
|
| *BYPASS may bypass all object access controls |
| Explanation: If you have this one you can read the SYSUAF.DAT since |
| all the objects (ie:files) will be made accessible to you. I suggest that |
| if you happen to have some problems, change the files access flags to |
| let it be WORLD (you) readable/writable. So use : |
|
|
| SET FILE/PROT=(w:rwed) SYS$SYSTEM:SYSUAF.DAT |
|
|
| *READALL may read anything as the owner |
| Explanation: Well this is obvious, SYSUAF.DAT will be read without problems |
| but of course you won't be able to CREATE/MODIFY accounts to your pleasure. |
| At least you can LIST/SHOW all the accounts as deep as you want. |
|
|
| Entering AUTHORIZE: |
| ------------------ |
| Once you've executed AUTHORIZE you will receive its main prompt: |
|
|
| RUN SYS$SYSTEM:AUTHORIZE |
|
|
| UAF> |
|
|
| UAF stands for User Authorization File. |
|
|
| First of all you will first need to get a list of all the accounts on the |
| system with some of their settings also. To do this issue the command: |
|
|
| UAF>SHOW USERS/BRIEF |
|
|
| Owner Username UIC Account Privs Pri Directory |
|
|
| ALLIN1V24CREATED A1$XFER_IN [660,1] Normal 4 Disuser |
| ALLIN1V24CREATED A1$XFER_OUT [660,2] Normal 4 Disuser |
| JOHN_FAVORITE JFAVORITE [300,2] LEDGER Devour 4 DEV$DUA2 |
| :[ABDURAHMAN] |
|
|
| IBRAHIM ALBHIR ALBHIR [60,111] GOTVOT Normal 4 DUA2:[ALB |
| HIR] |
|
|
| ALGHAMDI ALGHAMDI [300,1] LEDGER Normal 4 DUA2:[ALG |
| HAMDI] |
|
|
| ALHAJAJ ALHAJAJ [325,3] BUDGET Devour 4 GOTDEV$DU |
| A2 |
|
|
| Explanation: |
|
|
| 1) Owner: Owner of the account |
|
|
| 2) Username: This is the guy's login name |
|
|
| 3) UIC: User Identification Code. This serves to the OS to recognize you and |
| rights you have over files, directory, etc. |
|
|
| 4) Account: This is to let the operator know what the group is |
| that owns/manages the account. |
|
|
| 5) Pri: don't worry about it. |
|
|
| 6) Directory: This is the account HOME directory. Where the owner of the |
| account will work on. |
|
|
| After you have captured the output of the SHOW command you can start |
| trying to create yourself some accounts by modifying some already existing |
| ones (which I suggest strongly). |
|
|
| To create an account issue the following command : |
|
|
| CREATE JOHN/DIR=JOHNS_DIR/DEVICE=SYS$USER/PASSWORD=JOHNS_PASSWORD |
| /ACCESS=(DIALUP,NETWORK)/PRIVS=(NETMBX,TMPMBX)/DEFPRIVS=(NETMBX,TMPMBX) |
| /ACCOUNT=USERS/OWNER=JOHN |
|
|
| Effects of this command: |
|
|
| Will create a user called JOHN which will log under the JOHNS_DIR directory, |
| who will have just normal user privileges (TMPMBX/NETMBX) who, when listed, |
| will appear to be as part of the group name USERS and the account's owner |
| will be JOHN. |
|
|
| After you issue this command a NEW UIC will be added to the RIGHTSLIST.DAT |
| file being assigned to your user. |
|
|
| Explanation: |
|
|
| DIR: can be any directory name you saw on the system. Of course if you are |
| not using all the privileges, check that its READ/WRITE-able |
| so you won't have problems at login. |
|
|
| DEVICE: is where the DIR can be found. That means that you have to tell in |
| which physical/logical device that directory will be found. Since VAXes will |
| have at least 1 or 2 magnetic supports you must say on which one the directory |
| can be found. Normally they already have some logical names assigned like |
| SYS$USER,SYS$SYSTEM,SYS$SPECIFIC,SYS$MANAGER, etc. |
|
|
| PASSWORD: is the password you want for the account which will never be shown |
| to anyone, so use whatever one you like. |
|
|
| ACCESS: tells the system from where you will authorize logins for this |
| account. For example I'm sure you've seen this message: |
|
|
| Username: BACKUP |
| Password: |
| Cannot login from this source. |
|
|
| Well this is the result of an account being setup with the DIALUP flags in |
| the access field as NODIALUP. |
|
|
| So if u want to give the account all kind of access just use : |
| ACCESS=ALL |
|
|
| and this will authorize all login sources for the account. |
|
|
| PRIVS: will setup the privileges on the named account. If you just want it |
| to be a normal user account use TMPMBX,NETMBX. If you want it to be |
| a super-user account you can use ALL. But this is not the right way |
| if you don't want your account to get discovered fast. |
|
|
| Valid Process privileges: |
|
|
| CMKRNL may change mode to kernel |
| CMEXEC may change mode to exec |
| SYSNAM may insert in system logical name table |
| GRPNAM may insert in group logical name table |
| ALLSPOOL may allocate spooled device |
| DETACH may create detached processes |
| DIAGNOSE may diagnose devices |
| LOG_IO may do logical i/o |
| GROUP may affect other processes in same group |
| ACNT may suppress accounting messages |
| PRMCEB may create permanent common event clusters |
| PRMMBX may create permanent mailbox |
| PSWAPM may change process swap mode |
| ALTPRI may set any priority value |
| SETPRV may set any privilege bit |
| TMPMBX may create temporary mailbox |
| WORLD may affect other processes in the world |
| MOUNT may execute mount acp function |
| OPER may perform operator functions |
| EXQUOTA may exceed disk quota |
| NETMBX may create network device |
| VOLPRO may override volume protection |
| PHY_IO may do physical i/o |
| BUGCHK may make bug check log entries |
| PRMGBL may create permanent global sections |
| SYSGBL may create system wide global sections |
| PFNMAP may map to specific physical pages |
| SHMEM may create/delete objects in shared memory |
| SYSPRV may access objects via system protection |
| BYPASS may bypass all object access controls |
| SYSLCK may lock system wide resources |
| SHARE may assign channels to non-shared devices |
| GRPPRV may access group objects via system protection |
| READALL may read anything as the owner |
| SECURITY may perform security functions |
|
|
| Check the last section on tips on creating accounts. |
|
|
| ACCOUNT: this is pretty useless and is just for displaying purposes at the |
| SHOW USER under authorize. |
|
|
| OWNER: This field is also used just at SHOW time but keep in mind to use |
| an owner that won't catch the eye of the system manager. |
|
|
| You can use the MODIFY command the ame as you used the CREATE. The only |
| difference is that no account will be created but ALL types of modifications |
| will affect the specified account. |
|
|
| You can use the LIST command to produce an output of the accounts to a file. |
| Use this command as you use the SHOW one. |
|
|
| Of course, the authorize sub-system is so huge you can actually set hours of |
| login for users, expirations, disk quotas, etc., but this is not the purpose |
| of this article. |
|
|
| Tips to create accounts: |
| ----------------------- |
| First of all, what I suggest strongly is to MODIFY accounts not to CREATE |
| new ones. Why this? Well, new account names can jump out at the operator |
| and he will kick you off the system very soon. |
|
|
| The best way I think is to get a non-used account, change its privileges |
| and change the password and use it!. |
|
|
| First of all try to find a never-logged account or at least one account |
| whose last log comes from few months ago. From the UAF prompt just |
| do a SH USER/FULL and check out the dates that appear in the *Last Login* |
| record. If this happens to be a very old one then it can be marked as |
| valid to take control of. Of course you have to find a non used account |
| since you will have to change the account's password. |
|
|
| Check the flags field also. This flags can really bother you: |
|
|
| Captive (worst one!) |
| Ctly (ctrl-y deactivated) |
| Restricted (OS does more checks than normal) |
| DisUser (ACCOUNT IS NOT ENABLED!!!) |
|
|
| I suggest you take out all the flag's fields. |
| just issue: MODIFY JOHN/FLAGS=(NOCAPTIVE,NOCTLY,NORESTRICED,NODISUSER) |
| If you find an account that is DisUser I suggest not to own it since the |
| DisUser flags will take on when listing the accounts. If system manager |
| sees an account that was OFF now ON..well it's a bit suspicious don't |
| you think ? |
|
|
| Check if the FIELD account is being used. If not own this one since it |
| already has ALL privileges and will not look suspicious at all. Just change |
| its password. (FIELD is the account normally used by Digital Engineers |
| to check the VAX). |
|
|
| Remember to check also that DIALUP access is permitted or you won't be able |
| to login your account. |
|
|
| Once you've chosen the perfect account you can now change its password. |
| Issue: MODIFY JOHN/PASSWORD=MY_PASSWORD. (John is the account name you found) |
|
|
| After you finished just type CTRL-Z and to exit. If you happen to logoff |
| without exiting AUTHORIZE, don't worry. Changes to SYSUAF.DAT are done |
| instantly when the command finishes its execution. |
|
|
| One other advice, under SHELL if you happen to have SECURITY privilege |
| Issue: SET AUDIT/ALARM/DISABLE=(AUTHORIZE) |
|
|
| If you don't do this, each time you run AUTHORIZE, modified accounts will be |
| logged into OPERATOR.LOG so remember to do so. |
|
|
| After playing a bit with AUTHORIZE you won't have much problems understanding |
| it. Hope you have PHUN! ;-) |
|
|
| ------------------------------------------------------------------------------ |
|
|
| $ ! FACILITY: Mailback (MAILBACK.COM) |
| $ ! |
| $ ! ABSTRACT: VAXVMS to VAXVMS file transfer, using the VAX/PSI_MAIL |
| $ ! utility of VAXPSI, over an X.25 link. |
| $ ! |
| $ ! ENVIRONMENT: VAX/VMS operating system. |
| $ ! |
| $! ------------------------------------------------------------------- |
| $ saved_verify := 'f$verify(0)' |
| $ set noon |
| $ ws = "write sys$output" |
| $ ws "" |
| $ ws " MAILBACK transfer utility V1.0 (via Backup and PSI_Mail) 21-May-1990" |
| $ ws "" |
| $! |
| $ if f$logical("debug").nes."" then set verify |
| $ ask_p1: |
| $ if P1.eqs."" then read/prompt="MailBack> Send or Receive (S/R) : " - |
| sys$command P1 |
| $ P1 = f$edit(P1, "UPCASE,COMPRESS,TRIM") |
| $! |
| $! |
| $ if P1.EQS."" then exit 1+0*f$verify(saved_verify) |
| $ if P1.EQS."R" then goto receive_file |
| $ if P1.nes."S" then goto ask_P1 |
| $! ------------------------------------------------------------------- |
| $! |
| $! Sending File(s) |
| $! =============== |
| $ if P2.eqs. "" then - |
| read/prompt="MailBack> Recipient mail address (PSI%nnn::user) : " - |
| sys$command P2 |
| $ if P2.eqs."" then exit 1+0*f$verify(saved_verify) |
| $! |
| $! |
| $ if P3.eqs."" then read/prompt="MailBack> File(s) : " sys$command P3 |
| $! |
| $ ws "MailBack> ... Backuping the file(s) ..." |
| $ Backup/nolog 'P3' sys$scratch:mailbck.tmp/sav/block=2048 |
| $! |
| $ ws "MailBack> ... Converting format ..." |
| $ convert/fdl=sys$input sys$scratch:mailbck.tmp sys$scratch:mailbck.tmp |
| record |
| carriage_control carriage_return |
| $! |
| $ ws "MailBack> ... Sending a (PSI_)mail ..." |
| $ on warning then goto error_sending |
| $ mail/subject="MAILBACK Backup-File" - |
| /noself sys$scratch:mailbck.tmp 'P2' |
| $ ws "MailBack> ... SEND command SUCCESSfully completed." |
| $! |
| $ fin_send: |
| $ delete = "delete" |
| $ delete/nolog/noconfirm sys$scratch:mailbck.tmp;,; |
| $ exit 1+0*f$verify(saved_verify) |
| $! |
| $ Error_sending: |
| $ ws "MailBack> Error detected while sending the mail ; ..." |
| $ ws "MailBack> ... Fix the problem, then retry the whole procedure." |
| $ goto fin_send |
| $! ------------------------------------------------------------------- |
| $! |
| $! Inbound File(s) Processing |
| $! ========================== |
| $receive_file: |
| $! |
| $ if P2.eqs."" then - |
| read/prompt="MailBack> Destination directory (<CR>= []) : " sys$command P2 |
| $ if P2.eqs."" then p2 ="[]" |
| $! |
| $! |
| $! |
| $ if P3.eqs."" then - |
| read/prompt="MailBack> Mail file (<CR>= default mail file) : " - |
| sys$command P3 |
| $ gosub build_file |
| $ ws "MailBack> ... Extracting a (PSI_)mail from the NEWMAIL folder ..." |
| $ define/exec sys$output nl: ! ped 18-May-90 (wipe out mail displays) |
|
|
| $ if P3.eqs."" then goto normal_get |
| $ define/nolog new_mail_file 'p3' |
| $ define/user sys$command sys$input |
| $ set message/nofacility/noseverity/notext/noident |
| $ mail |
| set file new_mail_file |
| select NEWMAIL |
| sear MAILBACK Backup-File |
| extract/NOHEADER out_file |
| $ deassign new_mail_file |
| $ goto clean |
| $ if P3.nes."" then p2 ="[]" |
| $! |
| $! |
| $ normal_get: |
| $ define/user sys$command sys$input |
| $ set message/nofacility/noseverity/notext/noident |
| $ mail |
| select NEWMAIL |
| sear MAILBACK Backup-File |
| extract/NOHEADER out_file |
| $! |
| $ clean: |
| $ deassign sys$output ! |
| $ set message/facility/severity/text/ident |
| $ if f$search("out_file") .eqs. "" then goto nomessage |
| $ on warning then goto error_conv |
| $ ws "MailBack> ... Converting format ..." |
| $ convert/fdl=sys$input out_file out_file /pad=%x00 |
| record |
| format fixed |
| carriage_control none |
| size 2048 |
| $! |
| $ ws "MailBack> ... Restoring file(s) from the backup saveset ..." |
| $ on warning then goto error_back |
| $ backup/nolog out_file/save 'P2'*.* |
| $! |
| $ delete = "delete" |
| $ delete/nolog/noconfirm 'file';,; |
| $ ws "MailBack> ... RECEIVE command SUCCESSfully completed." |
| $! |
| $ finish_r: |
| $ deassign out_file |
| $ exit 1+0*f$verify(saved_verify) |
| $! ------------------------------------------------------------------- |
| $ error_conv: |
| $ ws "MailBack> " + - |
| "An error occurred during the fdl convert of the extracted mail ;" |
| $ ws "MailBack> ... the file ''file' corresponds to " + - |
| $ ws "MailBack> ... the message extracted from Mail." |
| $ goto finish_r |
| $! |
| $ error_back: |
| $ ws "MailBack> An error occurred during the file restore phase with BACKUP ;" |
| $ ws "MailBack> ... the file ''file' corresponds to " |
| $ ws "MailBack> " + - |
| "... the message extracted from Mail, converted as a backup Saveset." |
| $ delete/nolog/noconfirm 'file';-1 |
| $ goto finish_r |
| $! |
| $ nomessage: |
| $ ws "MailBack> No mail message has been found in the NEWMAIL folder." |
| $ goto finish_r |
| $! |
| $Build_file: ! Build a unique (temporary) file_name |
| $file = "sys$scratch:mail_" + f$cvtime(f$time(),,"month")+ - |
| f$cvtime(f$time(),,"day") + f$cvtime(f$time(),,"hour")+ - |
| f$cvtime(f$time(),,"minute")+ f$cvtime(f$time(),,"second") + ".tmp" |
| $define/nolog out_file 'file' |
| $return |
|
|