mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
596 lines
31 KiB
Text
596 lines
31 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Four, Issue Forty, File 4 of 14
|
||
|
|
||
|
Network Miscellany
|
||
|
*******************************************************
|
||
|
< How to Acquire Information on Internet Computers >
|
||
|
*******************************************************
|
||
|
Compiled from Internet Sources
|
||
|
|
||
|
by The Racketeer
|
||
|
of The Hellfire Club
|
||
|
|
||
|
Network Miscellany created by Taran King
|
||
|
|
||
|
|
||
|
Generally speaking, information is everything. A lot of hacking any computer
|
||
|
on a network is being able to gather information about the machine and its
|
||
|
vulnerabilities. This file is about using the available resources on the
|
||
|
Internet network in order to gain important information about any perspective
|
||
|
sites.
|
||
|
|
||
|
A large amount of information has been printed in Phrack recently about the
|
||
|
Internet, most of it copied straight from manuals and in my opinion lacking
|
||
|
hacking flair. Therefore, I'm going to take you straight into the heart of the
|
||
|
heart of the matter with this file on acquiring information!
|
||
|
|
||
|
Now, the Internet is notorious for not having an instruction manual. Most
|
||
|
people who find out what the Internet is learn from their friends. It used to
|
||
|
be that there was only one real landmark on the Internet, and that was the
|
||
|
SIMTEL-20 FTP archive. Now, the Internet is probably the largest free network
|
||
|
in existence. In fact, it's a hacker's paradise!
|
||
|
|
||
|
Unfortunately, you have to know about "public" sites on the network before you
|
||
|
can use them. Likewise, how are you going to hack an organization if you don't
|
||
|
know any machines on it? Sort of like trying to complain to Packard-Bell about
|
||
|
your computer equipment not working when the bastards don't supply their name,
|
||
|
address, or phone number. You are going to have to find another way to get that
|
||
|
information if you want to get anything done.
|
||
|
|
||
|
There is not any one particular way to learn about a site. In fact, you'll
|
||
|
have to combine several unusual methods of gathering information in order to
|
||
|
obtain anything resembling a "complete picture." However, using the
|
||
|
combinations of techniques described in this file, you can maneuver through any
|
||
|
network on the Internet and learn about the machines within.
|
||
|
|
||
|
The first stop on this journey is the ARPANet Network Information Center
|
||
|
(frequently called "NIC" by experienced network users). NIC's purpose is
|
||
|
simply to keep track of all the network connections, fields, domains, and hosts
|
||
|
that people wish to be told about.
|
||
|
|
||
|
To connect to NIC, you would issue a command from your Internet connected
|
||
|
machine similar to this:
|
||
|
|
||
|
.----------------------- command
|
||
|
\/
|
||
|
[lycaeum][1]> telnet nic.ddn.mil
|
||
|
|
||
|
This will (within a short period of time) route you to the Network Information
|
||
|
Center and grant you access. There isn't a straight forward login/logout
|
||
|
system on NIC like other Unix computers; it will just connect you to the
|
||
|
Information System upon connection. The message you will get will be similar
|
||
|
to this:
|
||
|
|
||
|
* -- DDN Network Information Center --
|
||
|
*
|
||
|
* For TAC news, type: TACNEWS <return>
|
||
|
* For user and host information, type: WHOIS <return>
|
||
|
* For NIC information, type: NIC <return>
|
||
|
*
|
||
|
* For user assistance call (800) 235-3155 or (415) 859-3695
|
||
|
* Report system problems to ACTION@NIC.DDN.MIL or call (415) 859-5921
|
||
|
|
||
|
SRI-NIC, TOPS-20 Monitor 7(21245)-4
|
||
|
@ <prompt>
|
||
|
|
||
|
Great, now we are in. Essentially, since NIC is just a great big telephone
|
||
|
book, we need to let our fingers to the walking. Let's demonstrate a few
|
||
|
simple commands as I go after one of the government contract giants, the
|
||
|
corporation known as UNISYS. Let's start by entering WHOIS.
|
||
|
|
||
|
@WHOIS
|
||
|
SRI-NIC WHOIS 3.5(1090)-1 on Tue, 22 Aug 91 15:49:35 PDT, load 9.64
|
||
|
Enter a handle, name, mailbox, or other field, optionally preceded
|
||
|
by a keyword, like "host sri-nic". Type "?" for short, 2-page
|
||
|
details, "HELP" for full documentation, or hit RETURN to exit.
|
||
|
---> Do ^E to show search progress, ^G to abort a search or output <---
|
||
|
Whois:
|
||
|
|
||
|
Okay, now we are in the database. Since Unisys is our target, let's go ahead
|
||
|
and ask it about "Unisys."
|
||
|
|
||
|
Whois: unisys
|
||
|
|
||
|
Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil (904) 234-0451
|
||
|
Ebersberger, Eugen (EE35) UNISYS@HICKAM-EMH.AF.MIL (808) 836-2810
|
||
|
Lichtscheidl, Mark J. (MJL28) UNISYS@BUCKNER-EMH1.ARMY.MIL (DSN) 634-4390
|
||
|
Naval Warfare Assessment Center (UNISYS) UNISYS.NWAC.SEA06.NAVY.MIL
|
||
|
137.67.0.11
|
||
|
Navratil, Rich (RN74) UNISYS@COMISO-PIV.AF.MIL (ETS) 628-2250
|
||
|
|
||
|
There are 28 more matches. Show them? y --> of course
|
||
|
|
||
|
Peterson, Randy A. (RP168) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
|
||
|
Przybylski, Joseph F. (JP280) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
|
||
|
UNISYS Corporation (BIGBURD) BIGBURD.PRC.UNISYS.COM 128.126.10.34
|
||
|
UNISYS Corporation (GVLV2) GVL.UNISYS.COM 128.126.220.102
|
||
|
UNISYS Corporation (MONTGOMERY-PIV-1) MONTGOMERY-PIV-1.AF.MIL 26.5.0.204
|
||
|
Unisys Corporation (NET-MRC-NET)MRC-NET 192.31.44.0
|
||
|
Unisys Corporation (NET-SDC-PRC-CR) UNISYS-ISF-11 192.26.24.0
|
||
|
Unisys Corporation (NET-SDC-PRC-LBS) UNISYS-ISF-9 192.26.22.0
|
||
|
UNISYS Corporation (NET-SDC-PRC-NET) UNISYS-ISF-7 192.12.195.0
|
||
|
Unisys Corporation (NET-SDC-PRC-SA) UNISYS-ISF-10 192.26.23.0
|
||
|
Unisys Corporation (NET-SDC-PRC-SW) UNISYS-ISF-8 192.26.21.0
|
||
|
Unisys Corporation (NET-UNISYS-CULV) UNISYS-CULV 192.67.92.0
|
||
|
Unisys Corporation (NET-UNISYS-PRC) UNISYS-PRC 128.126.0.0
|
||
|
Unisys Corporation (NET-UNISYS-RES1) UNISYS-RES1 192.39.11.0
|
||
|
Unisys Corporation (NET-UNISYS-RES2) UNISYS-RES2 192.39.12.0
|
||
|
Unisys Corporation (NET-UNISYS2)UNISYS-B2 129.221.0.0
|
||
|
Unisys Corporation (STARS) STARS.RESTON.UNISYS.COM 128.126.160.3
|
||
|
Unisys Corporation (UNISYS-DOM) UNISYS.COM
|
||
|
Unisys Linc Development Centre (NET-LINC) LINC 143.96.0.0
|
||
|
UNISYS (ATC-SP) ATC.SP.UNISYS.COM 129.218.100.161
|
||
|
Unisys (FORMAL) FORMAL.CULV.UNISYS.COM 192.67.92.30
|
||
|
UNISYS (KAUAI-MCL) KAUAI.MCL.UNISYS.COM 128.126.180.2
|
||
|
UNISYS (MCLEAN-UNISYS) MCLEAN-UNISYS.ARMY.MIL 26.13.0.17
|
||
|
UNISYS (NET-UNISYS-RES3) UNISYS-RES3 192.67.128.0
|
||
|
Unisys (NET-UNISYS-SP) UNISYS-SP 129.218.0.0
|
||
|
UNISYS (SALTLCY-UNISYS) SALTLCY-UNISYS.ARMY.MIL 26.12.0.120
|
||
|
UNISYS (SYS-3) SYS3.SLC.UNISYS.COM 129.221.15.85
|
||
|
Wood, Roy (RW356) UNISYS@LAKENHEATH-SBLC.AF.MIL
|
||
|
0044-0638-522609 (DSN) 226-2609
|
||
|
|
||
|
As you can see, the details on these computers get fairly elaborate. The first
|
||
|
"column" is the matching information, second column is the network name or
|
||
|
title, then it is followed by a phone number or IP port address. If the phone
|
||
|
number has an area code, then it is of a standard phone nature; however, if it
|
||
|
is (DSN) then it's on the "Data Security Network," aka Autovon (the military
|
||
|
phone system).
|
||
|
|
||
|
Now, as you can tell from the above list, there are several UNISYS accounts at
|
||
|
military machines -- including a military machine NAMED after Unisys (mclean-
|
||
|
unisys.army.mil). This stands to reason since Unisys deals mostly in military
|
||
|
computer equipment. Since it is a secretive military group, you'd figure an
|
||
|
outsider shouldn't be able to gain much information about them.
|
||
|
|
||
|
Here is what happens if you center on a specific person:
|
||
|
|
||
|
Whois: cartee
|
||
|
Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil
|
||
|
7500 McElvey Road
|
||
|
Panama City, FL 32408
|
||
|
(904) 234-0451
|
||
|
MILNET TAC user
|
||
|
|
||
|
Record last updated on 18-Apr-91.
|
||
|
|
||
|
Hmm.. Very interesting. This user obviously has access to military computers
|
||
|
since she has a TAC card, and goes under the assumed identity as "Unisys" in
|
||
|
general. Could this person be a vital link to the Unisys/U.S. Defense
|
||
|
connection? Quite possibly. More likely she is a maintenance contact, since
|
||
|
she can use her TAC card to contact multiple (confined) military networks.
|
||
|
|
||
|
I've gone ahead and requested specific information about kauai.mcl.unisys.com,
|
||
|
which as far as I know is a focal point for the Unisys Networks. Of course,
|
||
|
the information on this machine is non-classified (or if it IS classified,
|
||
|
Unisys will probably be chewed out by Uncle Sam). Notice all the great
|
||
|
information it gives:
|
||
|
|
||
|
Whois: kauai.mcl.unisys.com
|
||
|
UNISYS (KAUAI-MCL)
|
||
|
Building 8201, 10th Floor Computer Room
|
||
|
8201 Greensboro Drive
|
||
|
McLean, VA 22102
|
||
|
|
||
|
Hostname: KAUAI.MCL.UNISYS.COM
|
||
|
Nicknames: MCL.UNISYS.COM
|
||
|
Address: 128.126.180.2
|
||
|
System: SUN-3/180 running SUNOS
|
||
|
|
||
|
Coordinator:
|
||
|
Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
|
||
|
(215) 648-2573
|
||
|
|
||
|
domain server
|
||
|
|
||
|
Record last updated on 05-Aug-91.
|
||
|
|
||
|
No registered users.
|
||
|
|
||
|
Aha! The Coordinator on this machine doesn't use it! There are no registered
|
||
|
users! Namely, if you wanted to hack it, you aren't screwing with the higher
|
||
|
ups (this is good). Since when does Unisys buy computers from other companies?
|
||
|
Can't they just grab a few off the assembly line or something? The computer is
|
||
|
stationed in McLean, Virginia! That's where the CIA is! Could Unisys be
|
||
|
developing computers for the international espionage scene? Obviously, there
|
||
|
is a great deal of information to be sucked out of this machine.
|
||
|
|
||
|
How? The answer was listed there. The machine is a DOMAIN SERVER. That means
|
||
|
this computer holds the network information used to identify all the computer
|
||
|
systems on its network and all we need to do right now is figure out a way to
|
||
|
squeeze that information out! But first, let's see if our hunch was correct in
|
||
|
assuming the bigwigs are far away by checking out the head honcho, "Mr.
|
||
|
Meidinger."
|
||
|
|
||
|
Whois: jim@burdvax.prc.unisys.com
|
||
|
Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
|
||
|
Unisys Corporation
|
||
|
Computer Resources
|
||
|
Room g311
|
||
|
P.O. Box 517
|
||
|
Paoli, PA 19301-0517
|
||
|
(215) 648-2573
|
||
|
|
||
|
Record Last Updated on 04-Jul-90.
|
||
|
|
||
|
Yup, Mr. Meidinger is far away -- Pennsylvania, to be exact. Not exactly
|
||
|
keyboard's length away, is he? Besides, being in the "Computer Resources"
|
||
|
department, I'd suspect he is just an accountant. Accountants are to computing
|
||
|
as beavers are to trees (unless, of course, they actually like computers, which
|
||
|
isn't a foregone conclusion in the business world).
|
||
|
|
||
|
I'm going to skip the rest of the information on NIC, since it has been
|
||
|
overkilled in this particular magazine anyway. The only hint I have is to read
|
||
|
CERT's and DDN's news blurbs, since they give out some interesting information
|
||
|
which would be useful and educational. Besides, messing around with the CIA's
|
||
|
hired goons sounds much more fun.
|
||
|
|
||
|
Now is the time for a little bit of a lesson in critical reasoning: the
|
||
|
Internet isn't exactly a "free to the public" network, meaning you just can't
|
||
|
attach your computer to a machine on the Internet and expect it to work all of
|
||
|
a sudden. You need to configure your machine around the computers in the
|
||
|
network domain you are linking into, and if you have their permission, then
|
||
|
everything is cool. But once you're configured, and your router and/or server
|
||
|
has been notified of your existence, does that mean anyone else has that
|
||
|
information? The answer is yes, although that info won't be forwarded to a
|
||
|
place like NIC -- it will have to be obtained another way.
|
||
|
|
||
|
All packets of data on the Internet need to be routed to and from valid
|
||
|
computer hosts. Therefore, all of this information is stored on the network's
|
||
|
gateway. But the routing information stored is simply in numeric format, such
|
||
|
as 128.126.160.3. At least, that is as understandable as it gets, since
|
||
|
Ethernet addresses are even more elaborate and in binary.
|
||
|
|
||
|
However, as Internet users know, there is more than a single way of describing
|
||
|
a computer. "telnet 128.126.160.3" would be one way of connecting to a
|
||
|
computer, or "telnet aviary.stars.reston.unisys.com" would be another way of
|
||
|
connecting to the same computer. These names are chosen by the owner of the
|
||
|
network, and are described through the use of "domain servers."
|
||
|
|
||
|
As you recall, kauai.mcl.unisys.com was listed by NIC as a domain server. This
|
||
|
means that the names of the computer systems on that network are stored on that
|
||
|
particular host. Of course, that's not the only thing. The domain server
|
||
|
presents the computer name and IP number to the connecting machine allowing you
|
||
|
to connect to the computer by using a "domain style name." Ultimately,
|
||
|
everything is converted to IP numbers.
|
||
|
|
||
|
Most network software allows compatibility with domain servers, meaning if you
|
||
|
want to connect to nic.ddn.mil, and you specify a command "telnet nic.ddn.mil"
|
||
|
then you will connect to nic.ddn.mil. Sadly, this isn't true of all computers
|
||
|
(which require IP numbers only), but at least it is true enough that the
|
||
|
general user is likely to have such computer resources.
|
||
|
|
||
|
Reaching back to the Dark Ages, there is a computer program that allows
|
||
|
machines that don't directly interpret domain style addresses to IP addresses
|
||
|
to still find out what the name of a machine is. This program is called
|
||
|
"nslookup" and is usually found in the Unix operating system (at least, I
|
||
|
haven't used it anywhere else -- it might only work on Unix).
|
||
|
|
||
|
"nslookup" stands for Name Server Lookup (there has been some debate, it seems,
|
||
|
if a domain server is really a name server, or visa versa; in fact, both
|
||
|
describe what they do well enough to have conflict). Regardless, let's go
|
||
|
ahead and work on learning how to use nslookup.
|
||
|
|
||
|
[lycaeum][2]> nslookup
|
||
|
Default Name Server: lycaeum.hfc.com
|
||
|
Address: 66.6.66.6
|
||
|
|
||
|
|
||
|
Now, going back to that NIC information we got earlier, let's continue to hack
|
||
|
on poor old Unisys, which is giving up its info every step we make. We
|
||
|
determined that the kauai.mcl.unisys.com was a domain server, so let's jump
|
||
|
ahead to that by changing our server to their server (after all, the computers
|
||
|
we are after aren't on our machine).
|
||
|
|
||
|
> server kauai.mcl.unisys.com
|
||
|
Default Server: kauai.mcl.unisys.com
|
||
|
Address: 128.126.180.2
|
||
|
|
||
|
Okay, now we have connected to the server. This isn't a constant connection,
|
||
|
by the way. It will only establish a connection for the brief instant that it
|
||
|
takes for it to execute commands. It doesn't require a password or an account
|
||
|
to get this information off of a nameserver.
|
||
|
|
||
|
Let's start off by having it give us a list of everything about Unisys that
|
||
|
this server knows. "Everything" is pretty much a good place to start, since we
|
||
|
can't go wrong. If we come up with nothing, then that's what's available. The
|
||
|
basic command to list machines is "ls" like the Unix directory command.
|
||
|
|
||
|
> ls unisys.com
|
||
|
[kauai.mcl.unisys.com]
|
||
|
Host of domain name Internet address
|
||
|
unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
unisys.com server = kronos.nisd.cam.unisys.com 3600
|
||
|
kronos.nisd.cam.unisys.com 128.170.2.8 3600
|
||
|
unisys.com server = kauai.mcl.unisys.com 3600
|
||
|
kauai.mcl.unisys.com 128.126.180.2 43200
|
||
|
unisys.com server = io.isf.unisys.com 3600
|
||
|
io.isf.unisys.com 128.126.195.20 3600
|
||
|
reston.unisys.com server = aviary.stars.reston.unisys.com 3600
|
||
|
aviary.star.reston.unisys.com 128.126.160.3 3600
|
||
|
aviary.star.reston.unisys.com 128.126.162.1 3600
|
||
|
reston.unisys.com server = kauai.mcl.unisys.com 3600
|
||
|
kauai.mcl.unisys.com 128.126.180.2 43200
|
||
|
rosslyn.unisys.com server = aviary.stars.reston.unisys.com 3600
|
||
|
aviary.stars.reston.unisys.com 128.126.160.3 3600
|
||
|
aviary.stars.reston.unisys.com 128.126.162.1 3600
|
||
|
rosslyn.unisys.com server = kauai.mcl.unisys.com 3600
|
||
|
kauai.mcl.unisys.com 128.126.180.2 43200
|
||
|
rmtc.unisys.com server = rmtcf1.rmtc.unisys.com 3600
|
||
|
rmtcf1.rmtc.unisys.com 192.60.8.3 3600
|
||
|
rmtc.unisys.com server = gvlv2.gvl.unisys.com 3600
|
||
|
gvlv2.gvl.unisys.com 128.126.220.102 3600
|
||
|
sp.unisys.com server = dsslan.sp.unisys.com 3600
|
||
|
dsslan.sp.unisys.com 129.218.32.11 3600
|
||
|
sp.unisys.com server = sys3.slc.unisys.com 3600
|
||
|
sys3.slc.unisys.com 129.221.15.85 3600
|
||
|
cam.unisys.com server = kronos.nisd.cam.unisys.com 3600
|
||
|
kronos.nisd.cam.unisys.com 128.170.2.8 3600
|
||
|
cam.unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
prc.unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
prc.unisys.com server = kronos.prc.unisys.com 3600
|
||
|
kronos.prc.unisys.com 128.170.2.8 3600
|
||
|
prc.unisys.com server = walt.prc.unisys.com 3600
|
||
|
walt.prc.unisys.com 128.126.2.10 3600
|
||
|
walt.prc.unisys.com 128.126.10.44 3600
|
||
|
culv.unisys.com server = formal.culv.unisys.com 3600
|
||
|
formal.culv.unisys.com 192.67.92.30 3600
|
||
|
culv.unisys.com server = kronos.nisd.cam.unisys.com 3600
|
||
|
kronos.nisd.cam.unisys.com 128.170.2.8 3600
|
||
|
slc.unisys.com server = sys3.slc.unisys.com 3600
|
||
|
sys3.slc.unisys.com 129.221.15.85 3600
|
||
|
slc.unisys.com server = dsslan.sp.unisys.com 3600
|
||
|
dsslan.sp.unisys.com 129.218.32.11 3600
|
||
|
slc.unisys.com server = nemesis.slc.unisys.com 3600
|
||
|
nemesis.slc.unisys.com 128.221.8.2 3600
|
||
|
bb.unisys.com server = sunnc.wwt.bb.unisys.com 3600
|
||
|
sunnc.wwt.bbs.unisys.com 192.39.41.2 3600
|
||
|
bb.unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
isf.unisys.com server = orion.ISF.unisys.com 3600
|
||
|
orion.ISF.unisys.com 128.126.195.7 3600
|
||
|
isf.unisys.com 128.126.195.1 3600
|
||
|
isf.unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
isf.unisys.com server = io.isf.unisys.com 3600
|
||
|
io.isf.unisys.com 128.126.195.20 3600
|
||
|
gvl.unisys.com 128.126.220.102 172800
|
||
|
gvl.unisys.com server = gvlv2.gvl.unisys.com 3600
|
||
|
gvlv2.gvl.unisys.com 128.126.220.102 3600
|
||
|
gvl.unisys.com server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
mcl.unisys.com 128.126.180.2 43200
|
||
|
mcl.unisys.com server = kauai.mcl.unisys.com 43200
|
||
|
kauai.mcl.unisys.com 128.126.180.2 43200
|
||
|
mcl.unisys.com server = burdvax.prc.unisys.com 43200
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
mcl.unisys.com server = kronos.nisd.cam.unisys.com 43200
|
||
|
kronos.nisd.cam.unisys.com (dlen = 1152?) 4096
|
||
|
ListHosts: error receiving zone transfer:
|
||
|
result: NOERROR, answers = 256, authority = 0, additional = 3.
|
||
|
|
||
|
Bummer, an error. Funny, it claims there isn't an error, yet it screwed up the
|
||
|
kronos address and knocked me out. Apparently, this domain server is screwed.
|
||
|
Oh well, I guess that's really their problem because in the information it gave
|
||
|
us, it was able to provide all the answers we needed to figure out the next
|
||
|
step!
|
||
|
|
||
|
Quick analysis of the above information shows that most of the servers were
|
||
|
connected to at LEAST two other servers. Quite impressive: A fault-tolerant
|
||
|
TCP/IP network. Since it is fault tolerant, we can go ahead and use a
|
||
|
different machine to poke into the "mcl.unisys.com" domain. Since "mcl" stands
|
||
|
for McLean, that's where we want to go.
|
||
|
|
||
|
Remember that NIC told us that kauai.mcl.unisys.com had an alias? It was also
|
||
|
called "mcl.unisys.com". Looking at the above list, we see toward the bottom
|
||
|
that mcl.unisys.com is also domain served by the computers
|
||
|
burdvax.prc.unisys.com and kronos.nisd.cam.unisys.com. Let's connect to one of
|
||
|
them and see what we can gather!
|
||
|
|
||
|
Whenever a server starts acting screwy like kauai was doing, I make it a habit
|
||
|
of using IP numbers when they are available. I'm going to connect to
|
||
|
burdvax.prc.unisys.com through its IP address of 128.126.10.33.
|
||
|
|
||
|
> server 128.126.10.33
|
||
|
Default server: [128.126.10.33]
|
||
|
Address: 128.126.10.33
|
||
|
|
||
|
Now that we are connected, let's see the network information again, but this
|
||
|
time let's try something different and possibly more useful. This time we will
|
||
|
use the -h command, which happens to describe the computer type (CPU) and the
|
||
|
operating system it runs on (OS) which will give us a better idea of what we
|
||
|
are dealing with.
|
||
|
|
||
|
> ls -h mcl.unisys.com
|
||
|
Host or domain name CPU OS
|
||
|
maui.mcl.Unisys.COM SUN-2/120 UNIX 43200
|
||
|
cisco.mcl.Unisys.COM CISCO GATEWAY CISCO 43200
|
||
|
kauai.mcl.Unisys.COM SUN-3/180 UNIX 43200
|
||
|
voyager.mcl.Unisys.COM SUN-4/330 UNIX 43200
|
||
|
dial.mcl.Unisys.COM SUN-3/260 UNIX 43200
|
||
|
astro.mcl.Unisys.COM SUN-3/60 UNIX 43200
|
||
|
hotrod.mcl.Unisys.COM Unisys 386 SCO/UNIX 43200
|
||
|
oahu.mcl.Unisys.COM VAX-11/785 UNIX 43200
|
||
|
lanai.mcl.Unisys.COM SUN-3/160 UNIX 43200
|
||
|
mclean_is.mcl.Unisys.COM 386 NOVELL 43200
|
||
|
|
||
|
WOW! Look at all those Suns! I guess Unisys has no faith in their own
|
||
|
computers or something! If only President Bush could see this display of a
|
||
|
company backing their product! In fact, the only Unisys computer in this whole
|
||
|
lot is a cheesy 386 clone which probably is some guy's desktop machine.
|
||
|
|
||
|
Once again, there is some fascinating information here. Let's run through it
|
||
|
really quick:
|
||
|
|
||
|
Maui is a Sun 2, which is a really old RISC computer. You don't see many of
|
||
|
these around but they still can be useful for storing stuff on. But then
|
||
|
again, it probably is faster than a PC!
|
||
|
|
||
|
Oahu is a Vax-11 which is apparently running Ultrix. This may be where Unisys
|
||
|
hoards all their programmers since it isn't being used for serious networking
|
||
|
(at least, as far as we can tell).
|
||
|
|
||
|
Mclean_is happens to be the file server for a PC network. We can't really tell
|
||
|
from this point how many computers are on this network, but it could be
|
||
|
possible it is used for public information trade, where secretaries or
|
||
|
receptionists use it to confirm trade and scheduling.
|
||
|
|
||
|
Hotrod is also a 386, made by Unisys even! Oddly, it is running a copy of SCO
|
||
|
Unix, which means it is, no doubt, a personal computer someone uses for Unix
|
||
|
programming. If Unisys were itself a part of the government, I'd think this
|
||
|
computer would have been a kludged bidding contract which they got stuck with
|
||
|
because they were aiming for lowest bid and were unfortunately not very picky.
|
||
|
|
||
|
Voyager is an interesting machine, which is apparently the most modern on this
|
||
|
network. Since it is a Sun-4 computer (probably IPX) it would be a high-speed
|
||
|
graphics workstation. This could be the machine where many CAD applications
|
||
|
are stored and worked on. Another possibility is that Sun 4 computers were
|
||
|
extremely expensive when they purchased this network of Suns, and they
|
||
|
purchased this one machine to be the file server to the other Sun 3s and the
|
||
|
Sun 2. If you were to gain access to one of the other machines, it's possible
|
||
|
you would have access to all of them.
|
||
|
|
||
|
Cisco is just a standard Cisco Router/Gateway box, linking that particular
|
||
|
network to the Internet.
|
||
|
|
||
|
Kauai is a messed up domain server, big deal. It might work on the same
|
||
|
network as Astro and Lanai.
|
||
|
|
||
|
Dial is a Sun-3. Is there something in a name? This could be the
|
||
|
telecommunications dial-in for the network. Maybe the same computer system has
|
||
|
a dialout attached to it. It might even be possible that "dial" has a guest
|
||
|
account for people logging in so that they can easily connect to other
|
||
|
computers on the same network (probably not).
|
||
|
|
||
|
Astro and Lanai are also Sun 3 computers. It isn't quite obvious what their
|
||
|
purpose is. Essentially, we have the impression that they were all purchased
|
||
|
about the same time (explaining the large number of Sun-3 computers in this
|
||
|
network) and it is quite possible they are just linked up to the Sun 4 in a
|
||
|
file sharing network. It is also possible they are older and fundamental to
|
||
|
the operation of Unisys's communication platform at this particular site.
|
||
|
|
||
|
There is one flaw that makes using the -h switch somewhat unreliable:
|
||
|
Sometimes people realize you can do this and take the time to remove or never
|
||
|
include the information about the individual machines on the network.
|
||
|
Therefore, it is always best for you to do a "ls <domain>" and check everything
|
||
|
out in case a computer has been removed. Using "telnet" to connect to the
|
||
|
computer is usually a foolproof method of finding out what computer it is they
|
||
|
are talking about.
|
||
|
|
||
|
> ls mcl.unisys.com
|
||
|
[[128.126.10.33]]
|
||
|
Host or domain name Internet address
|
||
|
mcl.Unisys.COM server = kauai.mcl.unisys.com 3600
|
||
|
kauai.mcl.unisys.com 128.126.180.2 3600
|
||
|
mcl.Unisys.COM server = burdvax.prc.unisys.com 3600
|
||
|
burdvax.prc.unisys.com 128.126.10.33 3600
|
||
|
mcl.Unisys.COM server = kronos.nisd.cam.unisys.com 3600
|
||
|
kronos.nisd.cam.unisys.com 128.170.2.8 3600
|
||
|
mcl.Unisys.COM 128.126.180.2 43200
|
||
|
maui.mcl.Unisys.COM 128.126.180.3 43200
|
||
|
cisco.mcl.Unisys.COM 128.126.180.10 43200
|
||
|
kauai.mcl.Unisys.COM 128.126.180.2 3600
|
||
|
voyager.mcl.Unisys.COM 128.126.180.37 43200
|
||
|
dial.mcl.Unisys.COM 128.126.180.36 43200
|
||
|
LOCALHOST.mcl.Unisys.COM 127.0.0.1 43200
|
||
|
astro.mcl.Unisys.COM 128.126.180.7 43200
|
||
|
hotrod.mcl.Unisys.COM 128.126.180.125 43200
|
||
|
oahu.mcl.Unisys.COM 128.126.180.1 43200
|
||
|
lanai.mcl.Unisys.COM 128.126.180.6 43200
|
||
|
mclean_is.mcl.Unisys.COM 128.126.180.9 43200
|
||
|
|
||
|
Well, running down the list, it appears that there aren't any more computers
|
||
|
important to this domain that we don't know already. LOCALHOST is just another
|
||
|
way of saying connect to where you are, so that isn't a big deal. Hotrod being
|
||
|
separate from the rest of the machines seems apparent since its IP address is
|
||
|
x.x.x.125, which is quite separate from the others. Even though this doesn't
|
||
|
have to be, it seems it is a wiring kludge -- probably for an office like I
|
||
|
surmised.
|
||
|
|
||
|
The next step? Go ahead and hack away! This is where all those system hacks
|
||
|
people trade on the net and all those CERT Advisories become useful. If you
|
||
|
become good hacking a single machine (Suns, for example), using nslookup will
|
||
|
help you identify those machines and make it easier for you to hack.
|
||
|
|
||
|
Looking for annex computers, libraries, guest machines, and other such
|
||
|
computers also becomes easy when you use nslookup, because the names and
|
||
|
computer types are there for your convenience. Checking on sites by selecting
|
||
|
interesting "special purpose" machines with nslookup first can yield good
|
||
|
results. People have called this "netrunning," and it sounds like as good a
|
||
|
name as any.
|
||
|
|
||
|
Of course, the other big problem when dealing with domain servers is trying to
|
||
|
identify them. The largest list of domain servers can be found off of the
|
||
|
Department of Defense Network Listing (usually called hosts.txt) which is
|
||
|
available almost everywhere on the Internet through anonymous FTP. Here is a
|
||
|
rundown on how to get the file:
|
||
|
|
||
|
[lycaeum][3]> ftp wuarchive.wustl.edu
|
||
|
|
||
|
220 wuarchive.wustl.edu FTP server (Version 6.24 Fri May 8 07:26:32 CDT 1992)
|
||
|
ready.
|
||
|
Remote host connected.
|
||
|
Username (wuarchive.wustl.edu:rack): anonymous
|
||
|
331 Guest login ok, send your complete e-mail address as password.
|
||
|
Password (wuarchive.wustl.edu:anonymous):
|
||
|
230- This is an experimental FTP server. If your FTP client crashes or
|
||
|
230- hangs shortly after login please try using a dash (-) as the first
|
||
|
230- character of your password. This will turn off the informational
|
||
|
230- messages that may be confusing your FTP client.
|
||
|
230-
|
||
|
230- This system may be used 24 hours a day, 7 days a week. The local
|
||
|
230- time is Wed Jun 3 20:43:23 1992.
|
||
|
230-
|
||
|
230-Please read the file README
|
||
|
230- it was last modified on Mon Mar 2 08:29:25 1992 - 93 days ago
|
||
|
230-Please read the file README.NFS
|
||
|
230- it was last modified on Thu Feb 20 13:15:32 1992 - 104 days ago
|
||
|
230 Guest login ok, access restrictions apply.
|
||
|
|
||
|
ftp> get /network_info/hosts.txt
|
||
|
200 PORT command successful.
|
||
|
150 Opening ASCII mode data connection for /network_info/hosts.txt (1088429 bytes).
|
||
|
226 Transfer complete.
|
||
|
Transferred 1109255 bytes in 182.95 seconds (6063.29 bytes/sec, 5.92 KB/s).
|
||
|
|
||
|
ftp> quit
|
||
|
221 Goodbye.
|
||
|
|
||
|
Now let's convert it to a file we can use effectively: let's take out of that
|
||
|
huge list of only the machines that are domain servers:
|
||
|
|
||
|
[lycaeum][4]> grep -i domain hosts.txt > domains
|
||
|
|
||
|
Okay, now that we have done that, let's prove that this is a way of finding a
|
||
|
domain server without connecting to anyplace. Let's just use the grep command
|
||
|
to search the file for a server in the mcl.unisys.com domain:
|
||
|
|
||
|
[lycaeum][5]> grep -i mcl.unisys.com domains
|
||
|
HOST : 128.126.180.2 : KAUAI.MCL.UNISYS.COM,MCL.UNISYS.COM : SUN-3/180 :
|
||
|
SUNOS : TCP/TELNET,TCP/FTP,TCP/SMTP,UDP/DOMAIN :
|
||
|
[lycaeum][6]>
|
||
|
|
||
|
And there you have another way. Everything we looked at is here: IP number,
|
||
|
the name, the "alias," the computer type, the operating system, and a brief
|
||
|
list of network protocols it supports, including the domain server attribute.
|
||
|
However, none of the other machines on the mcl.unisys.com network were
|
||
|
displayed. The DoD isn't a complete list of network machines, only the network
|
||
|
machines that are vital to the functioning of the Internet (in the last year,
|
||
|
this list has grown from about 350K to 1.1 megabytes -- and this only reflects
|
||
|
the "new" networks, not including the addition of new machines onto old
|
||
|
networks; the Internet is definitely "in;" I believe it was estimated 25%
|
||
|
growth per month!).
|
||
|
|
||
|
Obviously, this is very effective when going after university sites. It seems
|
||
|
they have too many machines to take good care of security on. Essentially, the
|
||
|
DoD list contains much the same information as NIC does, and is about a million
|
||
|
times more discreet. I'm not sure if NIC is fully logged, but it does have a
|
||
|
staff Head of Security (*snicker*).
|
||
|
|
||
|
Well, that will pretty much wrap it up for this file. Hope some of it was
|
||
|
useful for you.
|