home *** CD-ROM | disk | FTP | other *** search
-
- =======================================
- = =
- = HACKING TOPS =
- = =
- = By =
- = =
- = BLITZIOD ?? & GALACTUS ** =
- = =
- = Of =
- = =
- = THE ELITE HACKERS GUILD =
- = =
- =======================================
-
- ABOUT TOPS
- ----------
-
- TOPS is an operating system for DEC-20 and DEC-10 computers. TOPS is some-
- thing of a 'memory hog' and eats up a lot of core. The system is very user
- friendly and is thus good for schools but due to its excessive occupation of
- memmory it is not often used by buisnesses, who seem happier with RSTS
- (another DEC operating system which can soon be read about in my upcoming
- Phile: HACKING RSTS).
-
- RECOGNIZING A TOPS
- ------------------
-
- The TOPS is one of the easiest systems to recognize, partly because of
- its unlikely prompt '@' but mostly because TOPS identifies itself quite
- openly. A typical TOPS might look like this when you first call and get system
- attention (with <RET> or ^C):
-
- DEC-20/60 CAMPUS COMPUTER, TOPS-20 Monitor 5.1(6101)
- @
-
- LOGGING ON
- ----------
-
- To log on to a TOPS:
- 1. Type the word 'LOGIN' or just 'LOG'
- 2. A space
- 3. A log-on ID
- 4. A space
- 5. Your password
-
- The log-on ID consists of three letters that designate a user-group, a period
- and a username. EXAMPLE: ABC.GALACTUS The password does not echo back so you
- will not see it as it is typed, it can consist of as much as eight bytes,
- however ive seen one major schools system that only used three. A valid
- log-on might look like this:
-
-
- @LOG ABC.GALACTUS
- Job 13 on TTY10 22-Apr-87 13:18:19, Last Login 22-Apr-87 13:06:40
- @
-
- WHAT YOU CAN DO
- ---------------
-
- One of the wonderfull things about TOPS is that most TOPS will allow you
- to do lots of things without even logging in. Most systems will allow you
- to view help files without logging in. You can do this by typing HELP for
- over-all HELP, HELP ? for a list of available HELP FILES. Some of the best HELP
- files to view are HELP LOGIN and HELP COMMANDS. Of cource the syntax is
-
- @HELP <help file name>
-
- Another important command that is usually available to you is 'SYSTAT'
- or just 'SYS'. This command will give you a list of all users currently on
- the system, along with their TTY#, JOB#, and LOGIN ID. A typical SYSTAT
- might look like this:
-
-
- @SYSTAT
- Wed 22-Apr-87 11:52:18 Up 2:56:28
- 16+5 Jobs Load av (class 0) 3.86 3.29 3.38
-
- JJob Line Program User
- 6 11 EDIT AB.D809-LEX.LUTHOR
- 8 23 EXEC Not logged in
- 10 5 EDT FG.U790-THE.CRACKER
- 11 42 EDIT CS.H980-ALPHA.HACKER
- 12 113 ZORK DS.F198-BIOC.AGENT
- 13 105 BASIC CS.B788-LISA
- 15 13 EXEC Not logged in
- 16 10 BASIC CR.D509-THE.WOZ
- 18 76 EDIT PO.P567-STEVE.MNA
- 20 30 EXEC PHY.B329-FATAL.ERROR
- 21 14 EDIT CS.B606-BLITZIOD.??
- 22 16 EXEC ME.B482-STRYKER
- 23 1 EXEC CS.B720-LEFTY
- 24 61 EXEC CS.B708-COSMOS
- 26* 22 SYSTAT ABC.GALACTUS
- 27 15 EXEC CS.B619-MIC.RIP.OFF
- 28 101 BASIC CS.B601-WIZARD
- 30 115 SNOBOL CS.B708-SILENT.REBEL
- 32 112 DEVY MA.B278-CAPN.CRUNCH
-
- 1 205 PTYCON OPERATOR
- 2 221 BATCON OPERATOR
- 3 222 IBMSPL OPERATOR
- 4 223 OPR OPERATOR
- 5 54 JOBMON OPERATOR
- @
-
- Another good command that may be available to you is the 'WHO IS' or just
- 'WHO' command. It will give you added details on a given user as referenced
- by JOB# TTY# or LOGIN ID.
-
- What you want to do to access a TOPS is call up and do several SYSTAT's in
- high usage periods. You want to gain about 100 LOGIN ID's in this manner.
- then you need to type them up into a file. Next create a file of likely
- password (think like a user... for instance... Collage student passwords
- might be names of popular rock groups) HELP LOGIN will usually tell you how
- many bytes are in the passwords... most systems I have found use eight. In that
- case good passwords might be COMPUTER WARGAMES or MADDONNA. Anyway create
- a file of about 100 of these. Then write a password hacking program that
- loads them into two arrays and tries all possible combonations. This is 100
- * 100 =10,000 attempts. This is bound to gain you access.
-
- AFTER YOUR IN
- -------------
-
- The following is an explanation of TOPS commands that you will be able to
- access once you are in. (various versions of TOPS differ but the following
- are common commands that you will find usefull).
-
- ADVISE HELP
-
- THE ADVISE COMMAND LINKS YOUR TERMINAL WITH ANOTHER USER'S TERMINAL
- SO THAT YOU CAN GIVE COMMANDS TO THAT USER'S JOB. THE ADVISEE CAN
- STILL GIVE COMMANDS TO THE JOB. [NOTE: FOR ADVISE TO WORK, THE
- ADVISEE MUST HAVE ISSUED THE RECEIVE ADVISE COMMAND. THE LINK IS
- PREVENTED BY DEFAULT OR BY TYPING REFUSE ADVISE.]
-
- THE GENERAL FORM OF THE COMMAND IS
-
- ADVISE USER
-
- G WHERE "USER" IS EITHER A USER NAME OR A TERMINAL LINE NUMBER.
-
- WHILE THE ADVISE COMMAND IS IN EFFECT, THE COMMANDS YOU GIVE AFFECT
- THE ADVISEE'S JOB INSTEAD OF YOUR OWN. TO END AN ADVISING LINK
- THAT YOU HAVE MADE BETWEEN TERMINALS, YOU MUST TYPE CTRL-E, WHICH
- IS NOT ECHOED ON EITHER TERMINAL.
-
- USE THE CONTROL-^? (CONTROL UP-ARROW QUESTION MARK) FOR HELP
- DURING ADVISE. FOR MORE INFORMATION, SEE THE TOPS-20 COMMAND
- REFERENCE MANUAL AND THE RELATED TOPIC OF TALK.
- @
-
- TALK HELP
-
- THE TALK COMMAND LINKS YOUR TERMINAL TO ANOTHER USER'S TERMINAL.
- TYPE 'TALK ARGUMENT' WHERE "ARGUMENT" IS EITHER A USER-NAME OR A
- TERMINAL'S LINE NUMBER. AS SOON AS YOU GIVE A SUCCESSFUL TALK
- COMMAND, BOTH TERMINALS BEGIN PRINTING BOTH USERS' TYPING AS WELL
- AS SYSTEM RESPONSES TO THAT INPUT. EACH JOB, HOWEVER, RECEIVES
- INPUT ONLY FROM ITS OWN TERMINAL.
-
- MESSAGES SENT BETWEEN TERMINALS MAY BE PRECEDED BY ONE OF THE
- FOLLOWING:
- ; TREAT ALL TEXT UP TO END OF LINE AS A MESSAGE.
- ! TREAT ALL TEXT UP TO THE NEXT "!" (WHICH MUST BE ON THE SA
- ME
- LINE) AS A MESSAGE. THIS FEATURE ALLOWS YOU TO PUT A MESS
- AGE ON
- THE SAME LINE AS A COMMAND.
- REMARK REGARD ALL INPUT, UP TO A CTRL-Z, AS A MESSAGE, REGARDLESS
- OF
- INPUT BY THE OTHER USER.
-
- YOU CANNOT USE TALK TO CONTACT A USER WHOSE TERMINAL IS SET TO
- REFUSE LINKS. TYPE CTRL-C, AND USE MAIL TO SEND MAIL INSTEAD.
-
- FOR MORE INFORMATION, REFER TO THE TOPS-20 COMMAND REFERENCE MANUAL
- OR THE DOCUMENT HLP:TALK.DOC. RELATED HELP TOPICS REFUSE, REMARK,
- AND RECEIVE.
- @
-
- DEPOSIT HELP
-
- THE DEPOSIT COMMAND CHANGES THE CONTENTS OF A MEMORY LOCATION. THE
- SYNTAX IS:
-
- DEPOSIT LOCATION CONTENTS
-
- WHERE "LOCATION" IS THE OCTAL ADDRESS OF A MEMORY LOCATION AND
- "CONTENTS" IS AN OCTAL NUMBER TO BE DEPOSITED AT THAT ADDRESS.
-
- DEPOSIT CHANGES ONE MEMORY LOCATION AND LEAVES YOUR TERMINAL AT
- TOPS-20 COMMAND LEVEL.
-
- RELATED COMMANDS: DDT, EXAMINE, FORK, SET PAGE-ACCESS. SEE ALSO:
- "TOPS-20 COMMAND REFERENCE MANUAL".
- @
-
- DIRECTORY HELP
-
- THE DIRECTORY COMMAND LISTS THE NAMES OF FILES IN A SPECIFIED
- DIRECTORY. ITS SYNTAX IS:
-
- DIRECTORY <DIRECTORY>NAME.TYPE,
- SUBCOMMAND
-
- IF YOU OMIT <DIRECTORY>, YOUR DIRECTORY IS SEARCHED. TO GIVE MORE
- THAN ONE FILENAME, SEPARATE THEM WITH COMMAS. IF YOU GIVE NO
- FILENAMES, DIRECTORY WILL LIST ALL THE FILES IN THAT DIRECTORY.
- YOU MAY USE WILDCARD CHARACTERS (* AND %) WHEN TYPING FILE NAMES.
- IF YOU TYPE A COMMA AT THE END OF THE LINE, JUST BEFORE YOU PRESS
- RETURN, YOU WILL BE PROMPTED (WITH @@) FOR SUBCOMMANDS.
-
- FOR MORE INFORMATION, SEE THE TOPS-20 COMMAND REFERENCE MANUAL AND
- THE RELATED TOPICS OF FDIRECTORY, TDIRECTORY, VDIRECTORY,
- SUBCOMMANDS, WILDCARDS, AND DOCUMENTS DIRECTORY-PROTECTION.DOI AND
- DIRECTORY-SUBCOMMANDS.DOC IN THE HELP DIRECTORY (LOGICAL HLP:).
- @
-
- EXAMINE HELP
-
- EXAMINE DISPLAYS, IN OCTAL, THE CONTENTS OF A MEMORY LOCATION WHOSE
- OCTAL ADDRESS YOU SPECIFY. THE SYNTAX IS:
-
- EXAMINE ADDRESS
-
- THE CONTENTS WILL BE DISPLAYED AS TWO 6-DIGIT OCTAL NUMBERS
- SEPARATED BY A PAIR OF COMMAS (,,). THE TWO NUMBERS ARE THE LEFT
- AND RIGHT HALVES OF THE 36-BIT WORD. IF THE LEFT HALF IS ZERO,
- ONLY THE RIGHT HALF IS DISPLAYED, WITHOUT THE COMMAS.
-
- RELATED COMMANDS: DDT, DEPOSIT. SEE ALSO: HELP DDT, HELP DEPOSIT,
- "TOPS-20 COMMANDS REFERENCE MANUAL".
- @
-
-
- EXECUTE HELP
-
- THE EXECUTE COMMAND COMPILES SPECIFIED FILES (IF NEEDED), LOADS
- THEM INTO MEMORY, THEN BEGINS EXECUTION OF THE PROGRAM. THE
- COMMAND HAS THE FORM:
-
- EXECUTE /SWITCH SOURCE/SWITCH OBJECT,...
-
- WHERE SOURCE IS THE NAME OF THE SOURCE PROGRAM AND OBJECT IS THE
- NAME OF THE RELOCATABLE BINARY FILE. IF "OBJECT" IS NOT SPECIFIED,
- THE OBJECT FILE WILL KEEP THE NAME OF THE SOURCE FILE WITH FILE
- TYPE REL. THE FILENAMES OF THESE FILES ARE RESTRICTED TO
- 6-CHARACTER NAMES AND 3-CHARACTER TYPES.
-
- IF SWITCHES ARE PLACED BEFORE ALL FILES IN THE COMMAND (GLOBAL
- SWITCHES), THEY ACT AS DEFAULTS FOR ALL; OTHERWISE THEY AFFECT ONLY
- THE FILE WHOSE NAME IMMEDIATELY PRECEDES THE SWITCH. FOR A LIST OF
- AVAILABLE SWITCHES, SEE HLP:LOAD-CLASS-SWITCHES.DOC.
-
- FOR MORE INFORMATION, SEE THE TOPS-20 COMMAND REFERENCE MANUAL AND
- THE RELATED TOPICS OF COMPILE, DEBUG, LOAD, AND RUN.
- @
-
- In addition most ststems have an E-MAIL system of some sort and various
- languages which can be accessed simply by typing the language name, such as
- BASIC, FORTRAN, COBOL and PASCAL
-
- [Mother Earth BBS]
-
-