mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
515 lines
23 KiB
Text
515 lines
23 KiB
Text
![]() |
% = % = % = % = % = % = % = %
|
||
|
= =
|
||
|
% P h r a c k X V I I %
|
||
|
= =
|
||
|
% = % = % = % = % = % = % = %
|
||
|
|
||
|
Phrack Seventeen
|
||
|
07 April 1988
|
||
|
|
||
|
File 5 of 12 : How to Hack Cyber Systems
|
||
|
|
||
|
|
||
|
|
||
|
How To Hack A CDC Cyber
|
||
|
|
||
|
By: ** Grey Sorcerer
|
||
|
|
||
|
|
||
|
Index:
|
||
|
|
||
|
1. General Hacking Tips
|
||
|
2. Fun with the card punch
|
||
|
3. Getting a new user number the easy way
|
||
|
4. Hacking with Telex and the CDC's batch design
|
||
|
5. Grabbing a copy of the whole System
|
||
|
6. Staying Rolled In with BREAK
|
||
|
7. Macro Library
|
||
|
8. RJE Status Checks
|
||
|
9. The Worm
|
||
|
10. The Checkpoint/Restart Method to a Better Validation
|
||
|
|
||
|
|
||
|
I'm going to go ahead and skip all the stuff that's in your CDC reference
|
||
|
manuals.. what's a local file and all that. If you're at the point of being
|
||
|
ready to hack the system, you know all that; if not, you'll have to get up to
|
||
|
speed on it before a lot of this will make sense. Seems to me too many "how
|
||
|
to hack" files are just short rewrites of the user manuals (which you should
|
||
|
get for any serious penetration attempt anyway, or you'll miss lots of
|
||
|
possibilities), without any tips on ways to hack the system.
|
||
|
|
||
|
|
||
|
General hacking tips:
|
||
|
|
||
|
|
||
|
Don't get caught. Use remote dialups if possible and never never use any user
|
||
|
number you could be associated with. Also never re-use a user number.
|
||
|
Remember your typical Cyber site has a zillion user numbers, and they can't
|
||
|
watch every one. Hide in numbers. And anytime things get "hot", lay off for
|
||
|
awhile.
|
||
|
|
||
|
Magtapes are great. They hold about 60 Meg, a pile of data, and can hold even
|
||
|
more with the new drives. You can hide a lot of stuff here offline, like
|
||
|
dumps of the system, etc., to peruse. Buy a few top quality ones.. I like
|
||
|
Black Watch tapes my site sells to me the most, and put some innocuous crap on
|
||
|
the first few records.. data or a class program or whatever, then get to the
|
||
|
good stuff. That way you'll pass a cursory check. Remember a usual site has
|
||
|
THOUSANDS of tapes and cannot possibly be scanning every one; they haven't
|
||
|
time.
|
||
|
|
||
|
One thing about the Cybers -- they keep this audit trail called a "port log"
|
||
|
on all PPU and CPU accesses. Normally, it's not looked at. But just remember
|
||
|
that *everything* you do is being recorded if someone has the brains and the
|
||
|
determination (which ultimately is from you) to look for it. So don't do
|
||
|
something stupid like doing real work on your user number, log off, log right
|
||
|
onto another, and dump the system. They WILL know.
|
||
|
|
||
|
Leave No Tracks.
|
||
|
|
||
|
Also remember the first rule of bragging: Your Friends Turn You In.
|
||
|
|
||
|
And the second rule: If everyone learns the trick to increasing priority,
|
||
|
you'll all be back on the same level again, won't you? And if you show just
|
||
|
two friends, count on this: they'll both show two friends, who will show
|
||
|
four...
|
||
|
|
||
|
So enjoy the joke yourself and keep it that way.
|
||
|
|
||
|
|
||
|
Fun With The Card Punch
|
||
|
|
||
|
|
||
|
Yes, incredibly, CDC sites still use punch cards. This is well in keeping
|
||
|
with CDC's overall approach to life ("It's the 1960's").
|
||
|
|
||
|
The first thing to do is empty the card punch's punchbin of all the little
|
||
|
punchlets, and throw them in someone's hair some rowdy night. I guarantee the
|
||
|
little suckers will stay in their hair for six months, they are impossible to
|
||
|
get out. Static or something makes them cling like lice. Showers don't even
|
||
|
work.
|
||
|
|
||
|
The next thing to do is watch how your local installation handles punch card
|
||
|
decks. Generally it works like this. The operators love punchcard jobs
|
||
|
because they can give them ultra-low priority, and make the poor saps who use
|
||
|
them wait while the ops run their poster-maker or Star Trek job at high
|
||
|
priority. So usually you feed in your punchcard deck, go to the printout
|
||
|
room, and a year later, out comes your printout.
|
||
|
|
||
|
Also, a lot of people generally get their decks fed in at once at the card
|
||
|
reader.
|
||
|
|
||
|
If you can, punch a card that's completely spaghetti -- all holes punched.
|
||
|
This has also been known to crash the cardreader PPU and down the system. Ha,
|
||
|
ha. It is also almost certain to jam the reader. If you want to watch an
|
||
|
operator on his back trying to pick pieces of card out of the reader with
|
||
|
tweezers, here's your chance.
|
||
|
|
||
|
Next, the structure of a card deck job gives lots of possibilities for fun.
|
||
|
Generally it looks like this:
|
||
|
|
||
|
JOB card: the job name (first 4 characters)
|
||
|
User Card: Some user number and password -- varies with site
|
||
|
EOR card: 7-8-9 are punched
|
||
|
Your Batch job (typically, Compile This Fortran Program). You know, FTN.
|
||
|
LGO. (means, run the Compiled Program)
|
||
|
EOR card: 7-8-9 are punched
|
||
|
The Fortran program source code
|
||
|
EOR card: 7-8-9 are punched
|
||
|
The Data for your Fortran program
|
||
|
EOF card: 6-7-8-9 are punched. This indicates: (end of deck)
|
||
|
|
||
|
This is extremely typical for your beginning Fortran class.
|
||
|
|
||
|
In a usual mainframe site, the punchdecks accumulate in a bin at the operator
|
||
|
desk. Then, whenever he gets to it, the card reader operator takes about
|
||
|
fifty punchdecks, gathers them all together end to end, and runs them through.
|
||
|
Then he puts them back in the bin and goes back to his Penthouse.
|
||
|
|
||
|
|
||
|
GETTING A NEW USER NUMBER THE EASY WAY
|
||
|
|
||
|
|
||
|
Try this for laughs: make your Batch job into:
|
||
|
|
||
|
JOB card: the job name (first 4 characters)
|
||
|
User Card: Some user number and password -- varies with site
|
||
|
EOR card: 7-8-9 are punched
|
||
|
COPYEI INPUT,filename: This copies everything following the EOR mark to the
|
||
|
filename in this account.
|
||
|
EOR Card: 7-8-9 are punched.
|
||
|
|
||
|
Then DO NOT put an EOF card at the end of your job.
|
||
|
|
||
|
Big surprise for the job following yours: his entire punch deck, with, of
|
||
|
course, his user number and password, will be copied to your account. This is
|
||
|
because the last card in YOUR deck is the end-of-record, which indicates the
|
||
|
program's data is coming next, and that's the next person's punch deck, all
|
||
|
the way up to -his- EOF card. The COPYEI will make sure to skip those pesky
|
||
|
record marks, too.
|
||
|
|
||
|
I think you can imagine the rest, it ain't hard.
|
||
|
|
||
|
|
||
|
Hacking With Telex
|
||
|
|
||
|
When CDC added timeshare to the punch-card batch-job designed Cyber machines,
|
||
|
they made two types of access to the system: Batch and Telex. Batch is a
|
||
|
punch-card deck, typically, and is run whenever the operator feels like it.
|
||
|
Inside the system, it is given ultra low priority and is squeezed in whenever.
|
||
|
It's a "batch" of things to do, with a start and end.
|
||
|
|
||
|
Telex is another matter. It's the timeshare system, and supports up to, oh,
|
||
|
60 terminals. Depends on the system; the more RAM, the more swapping area (if
|
||
|
you're lucky enough to have that), the more terminals can be supported before
|
||
|
the whole system becomes slug-like.
|
||
|
|
||
|
Telex is handled as a weird "batch" file where the system doesn't know how
|
||
|
much it'll have to do, or where it'll end, but executes commands as you type
|
||
|
them in. A real kludge.
|
||
|
|
||
|
Because the people running on a CRT expect some sort of response, they're
|
||
|
given higher priority. This leads to "Telex thrashing" on heavily loaded CDC
|
||
|
systems; only the Telex users get anywhere, and they sit and fight over the
|
||
|
machine's resources.
|
||
|
|
||
|
The poor dorks with the punch card decks never get into the machine, because
|
||
|
all the Telex users are getting the priority and the CPU. (So DON'T use punch
|
||
|
cards.)
|
||
|
|
||
|
Another good tip: if you are REQUIRED to use punch cards, then go type in
|
||
|
your program on a CRT, and drop it to the automatic punch. Sure saves trying
|
||
|
to correct those typos on cards..
|
||
|
|
||
|
When you're running under Telex, you're part of one of several "jobs" inside
|
||
|
the system. Generally there's "TELEX," something to run the line printer,
|
||
|
something to run the card reader, the mag tape drivers (named "MAGNET") and
|
||
|
maybe a few others floating around. There's limited space inside a Cyber..
|
||
|
would you believe 128K 60-bit words?.. so there's a limited number of jobs
|
||
|
that can fit. CDC put all their effort into "job scheduling" to make the best
|
||
|
of what they had.
|
||
|
|
||
|
You can issue a status command to see all jobs running; it's educational.
|
||
|
|
||
|
Anyway, the CDC machines were originally designed to run card jobs with lots
|
||
|
of magtape access. You know, like IRS stuff. So they never thought a job
|
||
|
could "interrupt," like pressing BREAK on a CRT, because card jobs can't.
|
||
|
This gives great possibilities.
|
||
|
|
||
|
Like:
|
||
|
|
||
|
Grabbing a Copy Of The System
|
||
|
|
||
|
For instance. Go into BATCH mode from Telex, and do a Fortran compile.
|
||
|
While in that, press BREAK. You'll get a "Continue?" verification prompt.
|
||
|
Say no, you'd like to stop.
|
||
|
|
||
|
Now go list your local files. Whups, there's a new BIG one there. In fact,
|
||
|
it's a copy of the ENTIRE system you're running on -- PPU code, CPU code, ALL
|
||
|
compilers, the whole shebang! Go examine this local file; you'll see the
|
||
|
whole bloody works there, mate, ready to play with.
|
||
|
|
||
|
Of course, you're set up to drop this to tape or disk at your leisure, right?
|
||
|
|
||
|
This works because the people at CDC never thought that a Fortran compile
|
||
|
could be interrupted, because they always thought it would be running off
|
||
|
cards. So they left the System local to the job until the compile was done.
|
||
|
Interrupt the compile, it stays local.
|
||
|
|
||
|
Warning: When you do ANYTHING a copy of your current batch process shows up
|
||
|
on the operator console. Typically the operators are reading Penthouse and
|
||
|
don't care, and anyway the display flickers by so fast it's hard to see. But
|
||
|
if you copy the whole system, it takes awhile, and they get a blow-by-blow
|
||
|
description of what's being copied. ("Hey, why is this %^&$^ on terminal 29
|
||
|
copying the PPU code?") I got nailed once this way; I played dumb and they let
|
||
|
me go. ("I thought it was a data file from my program").
|
||
|
|
||
|
|
||
|
Staying "Rolled In"
|
||
|
|
||
|
When the people at CDC designed the job scheduler, they made several "queues."
|
||
|
"Queues" are lines.
|
||
|
|
||
|
There's:
|
||
|
|
||
|
1. Input Queue. Your job hasn't even gotten in yet. It is standing outside,
|
||
|
on disk, waiting.
|
||
|
2. Executing Queue. Your job is currently memory resident and is being
|
||
|
executed, although other jobs currently in memory are
|
||
|
competing for the machine as well. At least you're in
|
||
|
memory.
|
||
|
3. Timed/Event Rollout Queue: Your job is waiting for something, usually a
|
||
|
magtape. Can also be waiting for a given time. Yes, this
|
||
|
means you can put a delayed effect job into the system. Ha,
|
||
|
ha. You are on disk at this point.
|
||
|
4. Rollout Queue: Your job is waiting its turn to execute. You're out on
|
||
|
disk right now doing nothing.
|
||
|
|
||
|
Anyway, let's say you've got a big Pascal compile. First, ALWAYS RUN FROM
|
||
|
TELEX (means, off a CRT). Never use cards. If you use cards you're
|
||
|
automatically going to be low man on the priority schedule, because the CPU
|
||
|
doesn't *have* to get back to you soon. Who of us has time to waste?
|
||
|
|
||
|
Okay, do the compile. Then do a STATUS on your job from another machine.
|
||
|
Typically you'll be left inside the CPU (EXECUTE) for 10 seconds, where you'll
|
||
|
share the actual CPU with about 10-16 other jobs. Then you'll be rolled-out
|
||
|
(ROLLOUT), at which time you're phucked; you have to wait for your priority to
|
||
|
climb back up before it'll execute some more of your job. This can take
|
||
|
several minutes on a deeply loaded system.
|
||
|
|
||
|
(All jobs have a given priority level, which usually increments every 10 sec
|
||
|
or so, until they start executing).
|
||
|
|
||
|
Okay, do this. Press BREAK, then at the "Continue?" prompt, say yes. What
|
||
|
happened? Telex had to "roll your job in" to process the BREAK! So you get
|
||
|
another free 10 seconds of CPU -- which can get a lot done.
|
||
|
|
||
|
If you sit and hit BREAK - Y <return> every 10 sec or so during a really big
|
||
|
job, you will just fly through it. Of course, everyone else will be sitting
|
||
|
and staring at their screen, doing nothing, because you've got the computer.
|
||
|
|
||
|
If you're at a school with a Cyber, this is how to get your homework done at
|
||
|
high speed.
|
||
|
|
||
|
|
||
|
Macro Library
|
||
|
|
||
|
If you have a typical CDC site, they won't give you access to the "Macro
|
||
|
library." This is a set of CPU calls to do various things -- open files, do
|
||
|
directory commands, and whatnot. They will be too terrified of "some hacker."
|
||
|
Reality: The dimbulbs in power don't want to give up ANY of their power to
|
||
|
ANYONE. You can't really do that much more with the Macro library, which
|
||
|
gives assembly language access to the computer, than you can with batch
|
||
|
commands.. except what you do leaves lots less tracks. They REALLY have to
|
||
|
dig to find out what your program did if you use Macro calls.. they have to
|
||
|
go to PPU port logs, which is needle in a haystack sort of stuff, vs. batch
|
||
|
file logs, which are real obvious.
|
||
|
|
||
|
Worry not. Find someone at Arizona State or Minnesota U. that's cool, and get
|
||
|
them to send you a tape of the libraries. You'll get all the code you can
|
||
|
stand to look at. By the way they have a great poster tape... just copy the
|
||
|
posters to the line printer. Takes a long time to print them but it's worth
|
||
|
it. (They have all the classic ones.. man on the moon, various playmates,
|
||
|
Spock, etc. Some are 7 frames wide!).
|
||
|
|
||
|
With the Macro library, you can do many cool things.
|
||
|
|
||
|
The best is a demon scanner. All CDC user numbers have controlled access for
|
||
|
other users to individual files -- either private, (no access to anyone else),
|
||
|
semiprivate (others can read it but a record is made), or public (anyone can
|
||
|
diddle your files, no record). What you want is a program (fairly easy to do
|
||
|
in Fortran) that counts through user numbers, doing directory commands. If it
|
||
|
finds anything, it checks for non semi-private (so no records are made), then
|
||
|
copies it to you.
|
||
|
|
||
|
You'll find the damnedest stuff, I guarantee it. Try to watch some system
|
||
|
type signing in and get the digits of his user number, then scan variations
|
||
|
beginning with that user #. For instance, if he's a SYS1234, then scan all
|
||
|
user #'s beginning with SYS (sysaaaa to sys9999).
|
||
|
|
||
|
Since it's all inside the Fortran program, the only record, other than
|
||
|
hard-to-examine PPU logs, is a "Run Fortran Program" ("LGO.") on the batch
|
||
|
dayfile. If you're not giving the overworked system people reason to suspect
|
||
|
that commonplace, every-day student Fortran compile is anything out of the
|
||
|
ordinary, they will never bother to check -- the amount of data in PPU logs is
|
||
|
OVERWHELMING.
|
||
|
|
||
|
But you can get great stuff.
|
||
|
|
||
|
There's a whole cool library of Fortran-callable routines to do damned near
|
||
|
anything a batch command could do in the Minnesota library. Time to get some
|
||
|
Minnesota friends -- like on UseNet. They're real cooperative about sending
|
||
|
out tapes, etc.
|
||
|
|
||
|
Generally you'll find old files that some System Type made public one day (so
|
||
|
a buddy could copy them) then forgot about. I picked off all sorts of stuff
|
||
|
like this. What's great is I just claimed my Fortran programs were hanging
|
||
|
into infinite loops -- this explained the multi-second CPU execution times.
|
||
|
Since there wasn't any readily available record of what I was up to, they
|
||
|
believed it. Besides, how many idiot users really DO hang into loops? Lots.
|
||
|
Hide in numbers. I got Chess 4.2 this way -- a championship Chess program --
|
||
|
and lots of other stuff. The whole games library, for instance, which was
|
||
|
blocked from access to mere users but not to sysfolk.
|
||
|
|
||
|
Again, they *can* track this down if you make yourself obnoxious (it's going
|
||
|
to be pretty obvious what you're doing if there's a CAT: SYSAAAA
|
||
|
CAT: SYSAAAB CAT: SYSAAAC .. etc. on your PPU port log) so do this on someone
|
||
|
else's user number.
|
||
|
|
||
|
|
||
|
RJE Status Checks
|
||
|
|
||
|
Lots of stupid CDC installations.. well, that doesn't narrow the field much..
|
||
|
have Remote Job Entry stations. Generally at universities they let some poor
|
||
|
student run these at low pay.
|
||
|
|
||
|
What's funny is these RJE's can do a status on the jobs in the system, and the
|
||
|
system screeches to a halt while the status is performed. It gets top
|
||
|
priority.
|
||
|
|
||
|
So, if you want to incite a little rebellion, just sit at your RJE and do
|
||
|
status requests over and over. The system will be even slower than usual.
|
||
|
|
||
|
|
||
|
The Worm
|
||
|
|
||
|
Warning: This is pretty drastic. It goes past mere self-defense in getting
|
||
|
enough priority to get your homework done, or a little harmless exploration
|
||
|
inside your system, to trying to drop the whole shebang.
|
||
|
|
||
|
It works, too.
|
||
|
|
||
|
|
||
|
You can submit batch jobs to the system, just as if you'd run them through the
|
||
|
punchcard reader, using the SUBMIT command. You set up a data file, then do
|
||
|
SUBMIT datafile. It runs separate from you.
|
||
|
|
||
|
Now, let's say we set up a datafile named WORM. It's a batch file. It looks
|
||
|
like this:
|
||
|
|
||
|
JOB
|
||
|
USER,blah (whatever -- a user number you want crucified)
|
||
|
GET,WORM; get a copy of WORM
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
SUBMIT,WORM.; send it to system
|
||
|
(16 times)
|
||
|
(end of file)
|
||
|
|
||
|
Now, you SUBMIT WORM. What happens? Worm makes 16 copies of itself and
|
||
|
submits those. Those in turn make 16 copies of themselves (now we're up to
|
||
|
256) and submit those. Next pass is 4096. Then 65536. Then...
|
||
|
|
||
|
Now, if you're really good, you'll put on your "job card" a request for high
|
||
|
priority. How? Tell the system you need very little memory and very little
|
||
|
CPU time (which is true, Submit takes almost nothing at all). The scheduler
|
||
|
"squeezes" in little jobs between all the big ones everyone loves to run, and
|
||
|
gives ultra-priority to really tiny jobs.
|
||
|
|
||
|
What happens is the system submits itself to death. Sooner or later the input
|
||
|
queue overflows .. there's only so much space .. and the system falls apart.
|
||
|
|
||
|
This is a particularly gruesome thing to do to a system, because if the guy
|
||
|
at the console (count on it) tries the usual startup, there will still be
|
||
|
copies of WORM in the input queue. First one of those gets loose, the system
|
||
|
drops again. With any luck the system will go up and down for several hours
|
||
|
before someone with several connected brain cells arrives at the operator
|
||
|
console and coldstarts the system.
|
||
|
|
||
|
If you've got a whole room full of computer twits, all with their hair tied
|
||
|
behind them with a rubber band into a ponytail, busily running their Pascal
|
||
|
and "C" compiles, you're in for a good time. One second they will all be
|
||
|
printing -- the printers will be going weep-weep across the paper. Next
|
||
|
second, after you run, they will stop. And they will stay stopped. If you've
|
||
|
done it right they can't get even get a status. Ha, ha.
|
||
|
|
||
|
The faster the CPU, the faster it will run itself into the ground.
|
||
|
|
||
|
CDC claims there is a limit on the number of jobs a user number can have in
|
||
|
the system. As usual they blew it and this limit doesn't exist. Anyway, it's
|
||
|
the input queue overflow that kills things, and you can get to the input queue
|
||
|
without the # of jobs validation check.
|
||
|
|
||
|
Bear in mind that *anything* in that batch file is going to get repeated ten
|
||
|
zillion times at the operator console as the little jobs fly by by the
|
||
|
thousands. So be sure to include some charming messages, like:
|
||
|
|
||
|
job,blah
|
||
|
user,blah
|
||
|
* eat me!
|
||
|
get,worm
|
||
|
submit,worm .. etc.
|
||
|
|
||
|
There will now be thousands of little "eat me!"'s scrolling across the console
|
||
|
as fast as the console PPU can print them.
|
||
|
|
||
|
Generally at this point the operator will have his blood pressure really
|
||
|
spraying out his ears.
|
||
|
|
||
|
Rest assured they will move heaven and earth to find you. This includes past
|
||
|
dayfiles, user logs, etc. So be clean. Remember, "Revenge is a dish best
|
||
|
served cold." If you're mad at them, and they know it, wait a year or so,
|
||
|
until they are scratching their heads, wondering who hates them this much.
|
||
|
|
||
|
Also: make sure you don't take down a really important job someone else is
|
||
|
doing, okay? Like, no medical databases, and so forth.
|
||
|
|
||
|
Now, for a really deft touch, submit a timed/event job. This "blocks" the job
|
||
|
for awhile, until a given time is reached. Then, when you're far, far away,
|
||
|
with a great alibi, the job restarts, the system falls apart, and you're
|
||
|
clear. If you do the timed/event rollout with a Fortran program macro call,
|
||
|
it won't even show up on the log.
|
||
|
|
||
|
(Remember that the System Folk will eventually realize, in their little minds,
|
||
|
what you've done. It may take them a year or two though).
|
||
|
|
||
|
|
||
|
CHECKPOINT / RESTART
|
||
|
|
||
|
I've saved the best for last.
|
||
|
|
||
|
CDC's programmers supplied two utilities, called CheckPoint and Restart,
|
||
|
primarily because their computers kept crashing before they would finish
|
||
|
anything. What Checkpoint does is make a COMPLETE copy of what you're doing -
|
||
|
all local files, all of memory, etc. -- into a file, usually on a magtape.
|
||
|
Then Restart "restarts" from that point.
|
||
|
|
||
|
So, when you're running a 12 hour computer job, you sprinkle checkpoints
|
||
|
throughout, and if the CDC drops, you can restart from your last CKP. It's
|
||
|
like a tape backup of a hard disk. This way, you only lose the work done on
|
||
|
your data between the last checkpoint and now, rather than the whole 12 hours.
|
||
|
Look, this is real important on jobs that take days -- check out your local
|
||
|
IRS for details..
|
||
|
|
||
|
Now what's damned funny is if you look closely at the file Checkpoint
|
||
|
generates, you will find a copy of your user validations, which tell
|
||
|
everything about you to the system, along with the user files, memory, etc.
|
||
|
You'll have to do a little digging in hex to find the numbers, but they'll
|
||
|
match up nicely with the display you of your user validations from that batch
|
||
|
command.
|
||
|
|
||
|
Now, let's say you CKP,that makes the CKP file. Then run a little FORTRAN
|
||
|
program to edit the validations that are inside that CKP-generated file. Then
|
||
|
you RESTART from it. Congratulations. You're a self made man. You can do
|
||
|
whatever you want to do - set your priority level to top, grab the line
|
||
|
printer as your personal printer, kick other jobs off the system (it's more
|
||
|
subtle to set their priority to zilch so they never execute), etc. etc.
|
||
|
You're the operator.
|
||
|
|
||
|
This is really the time to be a CDC whiz and know all sorts of dark, devious
|
||
|
things to do. I'd have a list of user numbers handy that have files you'd
|
||
|
like made public access, so you can go in and superzap them (then peruse them
|
||
|
later from other signons), and so forth.
|
||
|
|
||
|
There's some gotchas in here.. for instance, CKP must be run as part of a
|
||
|
batch file out of Telex. But you can work around them now that you know the
|
||
|
people at CDC made RESTART alter your user validations.
|
||
|
|
||
|
It makes sense in a way. If you're trying to restart a job you need the same
|
||
|
priority, memory, and access you had when trying to run it before.
|
||
|
|
||
|
Conclusion
|
||
|
|
||
|
|
||
|
There you have it, the secrets of hacking the Cyber.
|
||
|
|
||
|
They've come out of several years at a college with one CDC machine, which I
|
||
|
will identify as being somewhere East. They worked when I left; while CDC may
|
||
|
have patched some of them, I doubt it. They're not real fast on updates to
|
||
|
their operating system.
|
||
|
|
||
|
|
||
|
** Grey Sorcerer
|