home *** CD-ROM | disk | FTP | other *** search
Text File | 2001-07-11 | 169.1 KB | 3,776 lines |
- ------------------------------------------------------------------------------
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % %
- % THE NEOPHYTE'S GUIDE TO HACKING %
- % =============================== %
- % 1993 Edition %
- % Completed on 08/28/93 %
- % Modification 1.1 Done on 10/10/93 %
- % Modification 1.2 Done on 10/23/93 %
- % by %
- %% >>>>> Deicide <<<<< %%
- %%% %%%
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- < The author of this file grants permission to reproduce and >
- < redistribute this file in any way the reader sees fit, >
- < including the inclusion of this file in newsletters of any >
- < media, provided the file is kept whole and complete, >
- < without any modifications, deletions or ommissions. >
- < (c) 1993, Deicide >
-
- TABLE OF CONTENTS
- =================
-
- 1. INTRODUCTION
-
- 2. ETHICS/SAFETY
-
- 3. WHERE TO START
-
- 4. PACKET-SWITCHED NETWORKS
- A. Intro to PSNs
- B. How packet-switching works
- C. The Internet
- 1. Introduction
- 2. Getting access
- 3. FTP
- D. X.25 Networks
- 1. NUAs
- 2. PADs & NUIs
- 3. CUGs
- 4. SprintNet
- 5. BT Tymnet
- 6. Datapac
- 7. DNIC List
-
- 5. SYSTEM PENETRATION
- A. Unix
- B. VMS
- C. MPE (HP3000 mainframes)
- D. VM/CMS
- E. Primos
- F. TOPS 10/20
- G. IRIS
- H. NOS
- I. DECServer
- J. GS/1
- K. XMUX
- L. Starmaster/PACX
- M. Access 2590
- N. PICK
- O. AOS/VS
- P. RSTS
- Q. WindowsNT
- R. Novell Netware
- S. System75/85
- T. AS400
- U. TSO
-
- 6. BRUTE FORCE
- A. Passwords
- B. Usernames
- C. Services
-
- 7. SOCIAL ENGINEERING
-
- 8. TRASHING
-
- 9. ACRONYMS
-
- 10. CONCLUSION
- A. Last words
- B. Recommended Reading
- C. BBSes
- D. References
- E. And finally..
- F. Disclaimer
-
-
- INTRODUCTION:
- ============
- ------------
-
- Over four years ago the final version of the LOD/H's Novice's Guide to
- Hacking was created and distributed, and during the years since it has served
- as a much needed source of knowledge for the many hackers just beginning to
- explore the wonders of system penetration and exploration.
- The guide was much needed by the throng of newbies who hadn't the
- slightest clue what a VAX was, but were eager to learn the arcane art of
- hacking. Many of today's greats and moderates alike relied the guide as a
- valuable reference during their tentative(or not) steps into the nets.
- However, time has taken it's toll on the silicon networks and the guide is
- now a tad out of date. The basic manufacturer defaults are now usually secured
- , and more operating systems have come on the scene to take a large chunk of
- the OS percentile. In over four years not one good attempt at a sequel has
- been made, for reasons unbeknownst to me.
- So, I decided to take it upon myself to create my own guide to hacking..
- the "Neophyte's Guide to Hacking" (hey..no laughing!) in the hopes that it
- might help others in furthering their explorations of the nets.
- This guide is modelled after the original, mainly due to the fact that the
- original *was* good. New sections have been added, and old sections expanded
- upon. However, this is in no means just an update, it is an entirely new guide
- as you'll see by the difference in size. This guide turned out to be over 4
- times the size of The Mentor's guide.
- Also, this guide is NOT an actual "sequel" to the original; it is not
- LOD/H sponsored or authorized or whatever, mainly because the LOD/H is now
- extinct.
- One last thing.. this guide is in no way complete. There are many OS's I
- did not include, the main reasons being their rarity or my non-expertise with
- them. All the major OS's are covered, but in future releases I wish to include
- Wang, MVS, CICS, SimVTAM, Qinter, IMS, VOS, and many more. If you
- feel you could help, contact me by Internet email or on a board or net(if you
- can find me). Same thing applies for further expansion of current topics and
- operating systems, please contact me.
- Ok, a rather long intro, but fuck it.. enjoy as you wish..
- Deicide - deicide@west.darkside.com
-
- ETHICS/SAFETY:
- =============
- -------------
-
- One of the most integral parts of a hacker's mindset is his set of ethics.
- And ethics frequently go hand in hand with safety, which is obviously the most
- critical part of the process of hacking and the system exploration, if you
- plan to spend your life outside of the gaol.
- A hacker's ethics are generally somewhat different from that of an average
- joe. An average joe would be taught that it is bad to break laws, even though
- most do anyways. I am encouraging you to break laws, but in the quest for
- knowledge. In my mind, if hacking is done with the right intentions it is not
- all that criminal. The media likes to make us out to be psychotic sociopaths
- bent on causing armageddon with our PCs. Not likely. I could probably turn the
- tables on the fearmongering media by showing that the average joe who cheats
- on his taxes is harming the system more than a curious interloper, but I
- refrain.. let them wallow..
- The one thing a hacker must never do is maliciously hack(also known
- as crash, trash, etc..) a system. Deleting and modifying files unnecessary is
- BAD. It serves no purpose but to send the sysadmins on a warhunt for your head
- , and to take away your account. Lame. Don't do it.
- Anyways, if you don't understand all of these, just do your best to follow
- them, and take my word for it. You'll understand the reasoning behind these
- guidelines later.
-
- I. Don't ever maliciously hack a system. Do not delete or modify files
- unnecessarily, or intentionally slow down or crash a system.
- The lone exception to this rule is the modification of system logs and
- audit trails to hide your tracks.
-
- II. Don't give your name or real phone number to ANYONE, it doesn't matter
- who they are. Some of the most famous phreaks have turned narcs because
- they've been busted, and they will turn you in if you give them a
- chance. It's been said that one out of every three hackers is a fed, and
- while this is an exaggeration, use this as a rule and you should do
- fine. Meet them on a loop, alliance, bbs, chat system, whatever, just
- don't give out your voice number.
-
- III. Stay away from government computers. You will find out very fast that
- attempting to hack a MilTac installation is next to impossible, and will
- get you arrested before you can say "oh shit". Big Brother has infinite
- resources to draw on, and has all the time it needs to hunt you down.
- They will spend literally years tracking you down. As tempting as it may
- be, don't rush into it, you'll regret it in the end.
-
- IV. Don't use codes from your own home, ever! Period. This is the most
- incredibly lame thing i've seen throughout my life in the 'underground';
- incredible abuse of codes, which has been the downfall of so many people.
- Most PBX/950/800s have ANI, and using them will eventually get you
- busted, without question. And calling cards are an even worse idea.
- Codes are a form of pseudo-phreaking which have nothing to do with the
- exploration of the telephone networks, which is what phreaking is about.
- If you are too lazy to field phreak or be inventive, then forget about
- phreaking.
-
- V. Don't incriminate others, no matter how bad you hate them. Turning in
- people over a dispute is a terrible way to solve things; kick their ass,
- shut off their phones/power/water, whatever, just don't bust them.
- It will come back to you in the end..
-
- VI. Watch what you post. Don't post accounts or codes over open nets as a
- rule. They will die within days, and you will lose your new treasure.
- And the posting of credit card numbers is indeed a criminal offense
- under a law passed in the Reagan years.
-
- VII. Don't card items. This is actually a worse idea than using codes, the
- chances of getting busted are very high.
-
- VIII. If for some reason you have to use codes, use your own, and nothing
- else. Never use a code you see on a board, because chances are it has
- been abused beyond belief and it is already being monitored.
-
- IX. Feel free to ask questions, but keep them within reason. People won't
- always be willing to hand out rare accounts, and if this is the case
- don't be surprised. Keep the questions technical as a rule. Try and
- learn as much as you can from pure hands on experience
-
- X. And finally, be somewhat paranoid. Use PGP to encrypt your files, keep
- your notes/printouts stored secretly, whatever you can do to prolong
- your stay in the h/p world.
-
- XI. If you get busted, don't tell the authorities ANYTHING. Refuse to speak
- to them without a lawyer present.
-
- XII. If police arrive at your residence to serve a search warrant, look it
- over carefully, it is your right. Know what they can and can't do, and
- if they can't do something, make sure they don't.
-
- XIII. If at all possible, try not to hack off your own phoneline. Splice your
- neighbour's line, call from a Fortress Fone, phreak off a junction box,
- whatever.. if you hack long enough, chances are one day you'll be
- traced or ANI'd.
- Don't believe you are entirely safe on packet-switched networks either,
- it takes a while but if you scan/hack off your local access point they
- will put a trace on it.
-
- XIV. Make the tracking of yourself as difficult as possible for others.
- Bounce the call off several outdials, or try to go through at least two
- different telco companies when making a call to a dialup.
- When on a packet-switched network or a local or wide area network,
- try and bounce the call off various pads or through other networks
- before you reach your destination. The more bounces, the more red tape
- for the investigator and the easier it is for you to make a clean
- getaway.
- Try not to stay on any system for *too* long, and alternate your calling
- times and dates.
-
- XV. Do not keep written notes! Keep all information on computer, encrypted
- with PGP or another military-standard encryption program.
- Written notes will only serve to incriminate you in a court of law.
- If you write something down originally, shred the paper.. itty bitty
- pieces is best, or even better, burn it! Feds DO trash, just like us,
- and throwing out your notes complete will land in their hands, and
- they'll use it against you.
-
- XVI. Finally, the day/night calling controversy. Some folks think it is a
- better idea to call during the day(or whenever the user would normally
- use his account) as to not arouse the sysadmin's suspicion of abnormal
- calling times, while others think it is better to call when nobody is
- around.
- This is a tough one, as there is no real answer. If the sysadmin keeps
- logs(and reads over them) he will definetly think it strange that a
- secretary calls in at 3 am.. he will probably then look closer and find
- it even stranger that the secretary then grabbed the password file and
- proceeded to set him/herself up with a root shell.
- On the other hand, if you call during the time the user would normally
- call, the real owner of the account may very well log in to see his
- name already there, or even worse be denied access because his account
- is already in use.
- In the end, it is down to your opinion.
- And remember, when you make a decision stick to it; remember the time
- zone changes.
-
- WHERE TO START
- ==============
- --------------
-
- Probably the hardest period in hacking is that of when you are first
- starting. Finding and penetrating your first system is a major step, and can
- be approached in many ways. The common ways to find a system to hack are;
-
- - UNIVERSITIES : Universities commonly have hundreds of users, many of
- which aren't too computer literate, which makes
- hacking a relatively simple chore. And security is
- often poor, so if you don't abuse the system too much
- your stay could be a long one.
- On the other hand, for a nominal fee you can usually
- pick up a cheap *legitimate* (now there's a concept)
- account. Or you could enroll in the university for
- a few credits, and just go until the accounts are
- handed out. Unfortunely, if you are caught hacking
- off your own account it won't be hard to trace it
- back to you. If you get a legimate account at first,
- you might be best to hack a student's account for your
- other-system hacking.
- The other fun part about universities is often they
- will provide access to a number of nets, usually
- including the Internet.
- Occasionally you'll have access to a PSN as well.
-
- - CARRIER SCANNING: Carrier scanning in your LATA(Local Access Transport
- Area), commonly known as wardialing, was popularized
- in the movie War Games.
- Unfortunely, there are a few problems inherent in
- finding systems this way; you are limited to the
- systems in your area, so if you have a small town you
- may find very little of interest, and secondly,
- ANI is a problem within your own LATA, and tracing is
- simple, making security risks high. If you are going
- to hack a system within your own lata, bounce it at
- least once.
- There are many programs, such as ToneLoc and CodeThief
- (ToneLoc being superior to all in my humble opinion),
- which will automate this process.
-
- - PACKET-SWITCHED : This is my favorite by far, as hacking on PSNs is how
- NETWORKS I learned nearly all I know. I've explored PSNs
- world-wide, and never ran out of systems to hack.
- No matter what PSN you try you will find many
- different, hackable systems. I will go more indepth
- on PSNs in the next section.
-
-
- PACKET-SWITCHED NETWORKS
- ========================
- ------------------------
-
- Intro to PSNs
- =============
-
- First off, PSNs are also known as PSDNs, PSDCNs, PSSs and VANs to name
- a few. Look up the acronyms in the handy acronym reference chart<g>.
- The X.25 PSNs you will hear about the most are; Sprintnet(formerly
- Telenet), BT Tymnet(the largest), and Datapac(Canada's largest).
- All these networks have advantages and disadvantages, but i'll say this;
- if you are in the United States, start with Sprintnet. If you are in Canada,
- Datapac is for you.
- The reason PSNs are so popular for hackers are many. There are literally
- thousands of systems on PSNs all around the world, all of which(if you have
- the right facilities) are free of charge for you to reach. And because of the
- immense size of public PSNs, it is a rare thing to ever get caught for
- scanning. Tracing is also a complicated matter, especially with a small
- amount of effort on your part to avoid a trace.
-
- How packet-switching works
- ==========================
-
- The following explanation applies for the most part to all forms of
- packet-switching, but is specifically about PSNs operating on the X series of
- protocols, such as Datapac & SprintNet, as opposed to the Internet which
- operates on TCP/IP. It is the same principle in essense, however.
- Packet-Switched Networks are kinda complicated, but I'll attempt to
- simplify the technology enough to make it easy to understand.
- You, the user, connect to the local public access port for your PSN,
- reachable via a phone dialup. You match communications parameters with the
- network host and you are ready to go.
- From there, all the data you send across the network is first bundled into
- packets, usually of 128 or 256 bytes. These packets are assembled using
- Packet Assembly/Disassembly, performed by the public access port, also known
- as a public PAD(Packet Assembler/Disassembler), or a DCE(Data Communicating
- Equipment or Data Circuit-Terminating Equipment).
- The packets are sent along the network to their destination by means of
- the various X protocols, standardly X.25 with help from X.28, X.29 & X.3
- within your home network, and internationally using X.75/X.121. The X protocol
- series are the accepted CCITT standards.
- The host system(DTE: Data Terminal Equipment, also a PAD) which you are
- calling then receives the packet and disassembles the packet using Packet
- Assembly/Disassembly once again into data the system understands.
- The DTE then assembles it's data in response to your packet, and sends it
- back over the network to your PAD in packet form, which disassembles the
- packet into readable data for you, the user.
- And that is the simplified version!
-
- The Internet
- ============
-
- Introduction
- ------------
-
- Contrary to popular belief, the Internet is a packet-switched network;
- just not an X.25 packet-switched network. The Internet operates on the TCP/IP
- protocols(as a rule), which is why it is sometimes disregarded as a
- packet-switched network. In fact, the Internet's predecessor, the ARPAnet,
- was the first large-scale experiment in packet-switching technology. What was
- then Telenet came later.
- The confusion comes from peoples ignorance of the principles of
- packet-switching, which is simply a type of network, explained in technical
- detail earlier. It doesn't matter what protocols the network may use, if
- packet-switching is in use it is obviously a packet-switched network.
- Ok, now you may have noticed that the Internet has a rather small section,
- which is true. The reasons are many. This is a hacking guide, not an Internet
- tutorial, so I didn't include the IRC or Archie or whatever. And the main
- reason is I spent about 100% more time on X.25 nets than I did the Internet.
- Nonetheless, I decided to include the essential aspects of the Internet.
- You should be able to take it from there.
- The following section is derived mostly from personal experience, but
- the Gatsby's Internet file helped out somewhat, specifically in the classes
- of IP addresses.
-
- Getting Access
- --------------
-
- Getting access is somewhere between easy and very difficult, depending
- where you live and how good(or lucky!) a hacker you are.
- First of all, if you are going to hack on the Internet then you must be
- on a system that has full Internet access, not just mail. That cuts Compuserve
- and Prodigy out of the picture.
- Most universities and some high schools have Internet access, see what
- you can do to get yourself an account, legitimatly or not.
- Some BBSes offer full Internet access for a fairly reasonable price, and
- that would be a good choice.
- If you are in an area with a FreeNet, then you get full Internet access..
- for free! Check around with local hackers or PD boards to inquire where the
- nearest FreeNet is.
- Some businesses provide Internet access, for a price. Check with local
- netters to see what local options there are.
- And lastly, you can try and hack your way on. When you hack a system,
- check and see if they are on the net. Usually this is accomplished by doing
- a test call using telnet.. explained later.
-
- FTP
- ---
-
- FTP is the acronym for File Transfer Protocol, and it is the primary means
- of transporting remote files onto your own system(actually, usually the
- system which you are calling the Internet through).
- I will only provide a brief overview, as FTP is fairly easy to use, has
- help files online and comprehensive documentation offline at your local h/p
- BBS.
- First off, FTP can be initialized by typing 'ftp' at any system which
- has it. Most do, even if they don't have the Internet online. That a
- frustrating lesson more than a few novices has learned.. if you hack into a
- system that has FTP or telnet on line, it does not necessarily(and usually
- doesn't) have Internet access. Some SunOS's will have two sets of ftp and
- telnet utilities. The standard ftp and telnet commands can be used for local
- network connects, but not Internet. Another set of commands, itelnet, iftp
- and ifinger (and occasionally iwhois) is used for the Internet.
- When you enter the FTP utility, you'll usually find yourself at a 'ftp>'
- prompt, and typing 'help' should bring up a small set of help files. The
- commands available, along with the help files, vary from system to system.
- Procedure is then defined by what type of system you are on, as again,
- it varies. But what you usually do next is open a connection to the system you
- want to get a file off of. Type 'open' followed by the host name or IP
- address of the system you wish to connect to.. explained later.
- Next, you will usually find yourself at a sort of login prompt. If you
- have a username on that system, then type it in. If not, try 'anonymous'.
- Anonymous is a great little guest account that is now being built in to some
- OS's. Conscientious sysadmins may disable it, for obvious reasons. If however,
- it is not, you will be asked for a password. Type anything, it doesn't matter
- really. Type a few d's if you want, it really doesn't matter(as a rule don't
- sit on your keyboard though.. it may not like it.. type something boring).
- Next you simply use the 'get' command to get the file you want. Usually
- it is a good idea to not put the files in a directory that they will be
- noticed.. the sysadmin will suspect something is up if he runs into a few
- files that he supposedly copied into his own directory. Which brings us to
- the next segment.. give your files benign names, especially if they are
- something like /etc/passwd files or issues of Phrack.
- A note about FTPing /etc/passwds. It rarely works. Oh yes, you will get
- an /etc/passwd file, but rarely on the Internet will it be the real
- /etc/passwd. Check the size of the file first.. if it is 300 bytes or less,
- then it will likely be a substitute. Telnet will, however, get the real
- /etc/passwd on most occasions.
- Now quit the FTP utility and peruse your new files.. be sure to remove
- them when done.
-
- Telnet
- ------
-
- While FTP has no real parallel in X.25 networks, you could equate telnet
- to a private PAD. Telnet lets you connect to and operate on Internet systems
- over the Internet as if you were connected locally.
- Telnet is initialized by typing 'telnet' at your shell. The operative
- command is, again, 'open'. Again, type 'open' followed by the domain name
- or the IP address. When connected, you will be at a login prompt of some
- kind(usually..). Enter a username if you have one, and if not you can either
- attempt to hack one or see if the system accepts the 'anonymous' guest user,
- explained in the FTP section.
- If all goes well, you should have a remote connection of some kind, and
- what follows depends on the system you are connected to, just like in any
- other network.
-
- Domain Names and IP Addresses - Intro
- -------------------------------------
-
- For those of you unfamiliar with those terms I will give a small,
- condensed explanation of what the two are.
- One or the other is needed for connecting to a remote system, either by
- FTP or Telnet. The IP address could be equated to the X.25 net's Network User
- Address. The Domain name is a mnemonic name, used for convience more than
- anything, as it is generally easier to remember.
- If you wish to scan for systems on the Internet it is usually much easier
- to scan by IP address, as you won't know the mnemonic for most systems.
- IP addresses are 4 digit-combinations separated by dots. Address examples
- are 192.88.144.3(EFF) and 18.72.2.1(MIT).
- Addresses fall into three classes;
- Class A - 0 to 127
- Class B - 128 to 191
- Class C - 192 to 223
- The earliest Internet systems are all in Class A, but it is more common
- to find class B or C systems. Moreover, a lot of systems are placed
- specifically in the 128 or 192 address prefix, as opposed to 184 or 201 or
- whatever. Scanning an IP address set can be accomplished in many fashions.
- One of which would be to pick a prefix, add two random one to two digit
- numbers, and scan the last portion. ie: take 192.15.43 and scan the last
- digit from 0 to 255.
- Unfortunely, the last portion (or last two portions in the case of Class
- C) are ports, meaning you may come up completely blank or you might hit the
- jack pot.
- Experiment to your own liking, after a while you will fall into a
- comfortable groove.
- You can also connect to specific systems using the domain name, if you
- know or can guess the domain name. To guess a domain name you will need to
- know the company or organization's name, and the type of organization it is.
- This is possible because host names must follow the Domain Name System, which
- makes guessing a lot easier. Once you have both, you can usually take a few
- educated guesses at the domain name. Some are easier than others.
- First of all, you will need to understand the principle of top-level
- domains. The top level is at the end of a domain name; in the case of eff.org,
- the top-level is 'org'. In the case of mit.edu, the top-level is 'edu'.
- Top levels fall into a few categories;
- com - commercial institutions
- org - non-profit organizations
- edu - educational facilities
- net - networks
- gov - government systems (non military)
- mil - non-classified military
- Along with various country codes. The country codes are two letters used
- for international calls; the US's is 'US', Brazil's is 'BR'.
- Determine which top-level the system falls under, and then make a few
- guesses. Examples are;
- compuserve.com
- xerox.com
- mit.edu
- eff.org
- For further reading, I suggest picking up a few of the printed Internet
- guides currently on the market, as well as the Gatsby's file on the Internet,
- printed in Phrack 33.
-
- X.25 Networks
- =============
-
- From here on in the PSN section of this file is dedicated to X.25
- networks. I use the acronym PSN interchangably with X.25 networks, so don't
- get PSN confused with all the other types of PSN networks. From here on in,
- it is all X.25.
-
- Network User Addresses
- ----------------------
-
- NUAs(Network User Addresses) are the PSNs equivalent of a phone number.
- They are what you need to connect to systems on PSNs around the world, and
- thanks to the DNIC(Data Network Identifier Code), there are no two the same.
- The format for entering NUAs is different from PSN to PSN. For example,
- on Datapac you must include 0's, but on Sprintnet 0's are not necessary.
- Tymnet uses 6 digits NUAs rather than the standard 8.
- But the standard NUA format is this;
-
- PDDDDXXXXXXXXSS,MMMMMMMMMM
-
- Where; P is the pre-DNIC digit
- D is the DNIC
- X is the NUA
- S is the LCN(Logical Channel Number, subaddressing)
- M is the Mnemonic
-
- Various segments may be omitted depending on your PSN and where you are
- calling.
- The P is commonly a 0, but is a 1 on Datapac. It is not usually even counted
- as part of the NUA, but must be included(usage varying) when making calls
- to another PSN other than your own. Within your own PSN it is not necessary
- to include the pre DNIC digit.
- The D is the DNIC also known as the DCC(Data Country Code). The DNIC is the
- 4 digit country code, which insures that each NUA worldwide is unique. The
- DNIC is only used in calling international NUAs. If you are in Datapac(DNIC
- 3020) you do not have to include the DNIC for Datapac when making calls to
- NUAs within Datapac, but if you are in another PSN you must include the DNIC
- for calls to Datapac.
- The X symbolizes the actual NUA, which along with the optional S
- (subaddressing) must always be included. You can simplify the NUA even greater
- using this format;
-
- PPPXXXXX
-
- Where P is the prefix of the NUA, and the X's are the suffix. The prefix
- corresponds to an Area Code in most cases in that the NUAs within that prefix
- are in a certain part of the country the PSN serves. In the case of Sprintnet,
- the prefix corresponds directly with the Area Code(ie: all NUAs in the 914
- prefix on Sprintnet are in New York, and all phone numbers in the 914 Area
- Code are in New York).
- Subaddressing, S on the diagram, is a somewhat complicated thing to explain.
- Subaddressing is used when desired by the owner of the DTE, and is used to
- connect to specified system on the same NUA. You may find more than one system
- on the same NUA, and these can be reached using subaddresses.
- ie:
- NUA SYSTEM
- PPPXXXXXSS
- ========== ===================
- Ex.1 12300456 Unix
- Ex.2 123004561 VMS
- Ex.3 1230045699 HP3000
-
- In this example, the normal NUA is 12300456(assuming DNIC and pre-DNIC digit
- are not used). This NUA takes you to a Unix system. But when the LCN(Logical
- Channel Number, subaddress) of 1 is used, you are taken to a VMS. And the
- subaddress of 99 takes you to a HP3000. The systems on 12300456 are all owned
- by the same person/company, who wished to have one NUA only, but by using
- subaddresses he can give access to multiple systems on a lone NUA.
- Subaddresses are also used occasionally as extra security. If you hit a system
- that gives you an error message such as 'REMOTE PROCEDURE ERROR' or 'REMOTE
- DIRECTIVE', you will either need a subaddress or a mnemonic. You may choose to
- go through the entire possible subaddresses, 1 to 99, or if you are just
- scanning i would suggest these: 1,2,50,51,91,98,99
- Mnemonics, M, are another tricky one to explain. They are not documented by
- the PSNs, I discovered them on my own. Mnemonics are also used to select
- systems on a single NUA as a kind of port selector, but they are more commonly
- used as a kind of external password, which prevents you from even seeing the
- system in question.
- The same error messages as in LCNs occur for mnemonics, but again, even if you
- can reach a system with a standard NUA, there is a possibly a system only
- reachable by mnemonic exists. Here is a list of commonly used mnemonics;
- SYSTEM CONSOLE PAD DIAL MODEM X25 X28 X29 SYS HOST
-
- Bypassing Reverse Charging Systems: Private PADs and NUIs
- ---------------------------------------------------------
-
- Occasionally on PSNs you will run into systems which give you the
- error message 'COLLECT CALL REFUSED'. This denotes a reverse-charging system.
- When you make a call to a system on a PSN, the call is automatically collect.
- But a lot of sysadmins do not want to pay for your connect charges, and if all
- of their users have NUIs or private PADs, it is a good idea for them to make
- their system reverse-charging, which saves them money, but also acts as yet
- another security barrier from casual snoopers.
- But again, this can be avoided by using a private PAD or a NUI.
- Before we go into the details of these, remember that a private PAD is a
- different thing than your public access port PAD. A private PAD is a PAD which
- automatically assumes all connect charges. So, the reverse charging systems
- will let you past the reverse charging, as you agree to accept the charges.
- NUI's(Network User Identifiers) work the same way. You can think of a NUI
- as .. say a Calling Card. The Calling Card is billed for all the charges made
- on it, regardless of who made them; the owner gets the bill. The NUI works the
- same way. NUIs are used legitimatly by users willing to accept the connect
- charges. But, as hackers are known to do, these NUIs get stolen and used to
- call all NUAs all around the world, and the legitimate owner gets the bill.
- But unlike CCs, you will usually get away with using a NUI.
- However, as you can guess, private PADs and NUIs are fairly hard to come
- by. If somebody manages to get ahold of one, they usually won't be willing to
- share it. So, it comes down to you; you probably will have to find your own.
- PADs are only found by scanning on PSNs, and by hacking onto systems on
- PSNs. There are programs on Unix and Primos systems,for example, that serve as
- a private PAD. And there are some private PADs that are set up solely for the
- purpose of being a private PAD. But, these are almost always passworded, so it
- is up to you to get in.
- NUIs are somewhat the same thing. NUIs are different from PSN to PSN, some
- will tell you if a NUI is wrong, letting you guess one, but others will not.
- And of course, you still have to guess the password. I've heard stories of
- people carding NUIs, but i'm not sure i quite believe it, and the safety of
- such a practice is questionable.
-
- Closed User Groups
- ------------------
-
- One of the most effective security measures i've ever seen is the CUG
- (Closed User Group). The CUG is what generates the 'CALL BLOCKED' message when
- scanning on PSNs. A CUG will only accept calls into the DTE from specified
- DCE NUAs. Meaning, if your NUA has not been entered into the list of
- acceptable NUAs, you won't be allowed to even see the system. However, CUGs
- aren't for everybody. If you have a system with many users that all call in
- from different points, CUGs are unusable. And a good thing for us. I've never
- heard of anyone finding a way past a CUG. I've got a few theories but..
-
- Sprintnet
- ---------
-
- Now i'll go a bit more into the major US and Canadian PSNs, starting with
- the most popular in the States, Sprintnet
- To find a public indial port for Sprintnet you may possibly be able to
- find it in your telefone book(look under Sprintnet) or by Directory Assistance.
- If not, try Sprintnet Customer Service at 1-800-336-0437. This also will
- probably only function between 8:30 and 5:00 EST, maybe a bit different.
- Also, for a data number for in-dial look ups try 1-800-424-9494 at
- communication parameters 7/E/1(or 8/N/1 also i believe). Type <CR> twice
- or @D for 2400bps and press enter so Sprintnet can match your communications
- parameters. It will display a short herald then a TERMINAL= prompt.
- At the TERMINAL= prompt type VT100 for VT100 terminal emulation, if you are
- using a personal computer i think D1 works, or just <CR> for dumb terminal.
- Then type "c mail", at the username prompt type "phones", and for password
- type "phones" again. It is menu driven from there on.
- Now that you have your Sprintnet public dial port number, call it up like
- you would a BBS, then when it connnects type the two <CR>s for 300/1200bps
- or the @D for 2400bps, then it will display its herald, something like:
-
- SPRINTNET(or in some cases TELENET)
- 123 11A (where 123 is your area code & Sprintnet's address prefix
- and 11A is the port you are using)
- TERMINAL=(type what you did previously eg:VT100,D1,<ENTER>)
-
- then when Sprintnet displays the @ prompt you know you are connected to
- a Sprintnet public PAD and you are ready to enter NUAs.
- As i mentioned before, Sprintnet NUA prefixes correspond directly with
- Area Codes, so to scan Sprintnet simply take an AC and suffix it with the
- remaining digits, usually in sequence. Since Sprintnet ignores 0's, NUAs
- can be as small as 4 digits. When scanning, go from lowest to highest,
- stopping as soon as it seems NUAs have run dry(take it a hundred NUAs further
- to be sure..best to take it right to 2000, maybe higher if you have time).
-
- BT Tymnet
- ---------
-
- BT Tymnet is owned by British Telecom, and is the biggest PSN by far, but
- it does have some extra security.
- For finding Tymnet dial-ins the procedure is much the same, look in the
- phone book under Tymnet or BT Tymnet, or phone directory assistance and ask
- for BT Tymnet Public Dial Port numbers, or you can call Tymnet customer
- Service at 1-800-336-0149. Generally try between 8:30 and 5:00 EST. I don't
- have the Tymnet data number for finding in-dials, but once you are on Tymnet
- type INFORMATION for a complete list of in-dials as well as other things.
- Once you have your in-dial number set your communication parameters at
- either 8/N/1 or 7/E/1 then dial the number just like you would a BBS. At
- connect you will see a string of garbage characters or nothing at all.
- Press <CR> so Tymnet can match your communication parameters. You will then
- see the Tymnet herald which will look something like this:
- -2373-001-
- please type your terminal identifier
- If it wants a terminal identifier press A(if you want, you can press A
- instead of <CR> at connect so it can match your communication parameters and
- get your terminal identifer all at once).
- After this initial part you will see the prompt:
- please log in:
- This shows Tymnet is ready for you to enter NUAs. A great deal of the NUAs on
- Tymnet are in plain mnemonic format however. To reach these, just enter the
- mnemonic you wish, nothing else(ie: CPU or SYSTEM). To enter digital NUAs you
- need a NUI though. Tymnet will let you know when a NUI is wrong. Just keep
- guessing NUIs and passwords until you find one. BUT, keep in mind, one of the
- biggest security features Tymnet has is this: it will kick you off after three
- incorrect attempts at anything. Thus, you'll have to call again and again, and
- if you are in a digital switching system such as ESS it is not a good idea to
- call anywhere an excessive amount of time. So keep it in moderation if you
- choose to try Tymnet.
-
- Datapac
- -------
-
- I am the most fond of Datapac, because I grew up on it. Nearly all the
- hacking i've done to this day was on Datapac or the international PSNs i've
- been able to reach through private PADs i've found on Datapac.
- To connect to the Datapac network from Canada you will need to dial into
- your local Datapac node, which is accessible in most cities via your local
- Datapac dial-in number.
- There are quite a few ways to find your local Datapac dial-in. It will
- usually be in your telephone book under "DATAPAC PUBLIC DIAL PORT". If
- not, you could try directory assistance for the same name. Alternatively,
- there are a couple phone #'s for finding your dial port(these are also
- customer assistance):
-
- 1-800-267-6574 (Within Canada)
- 1-613-781-6798
-
- Also, these numbers function only from 8:30 to 5:00 EST(Eastern Standard
- Time).Also, the Datapac Information Service(DIS) at NUA 92100086 has a
- complete list of all public dial-ins.
- I think you can use both communication parameter settings work, but 8/N/1
- (8 data bits, No parity, 1 stop bit) is used most frequently, so set it
- initially at that. Some NUA's on Datapac use 7/E/1, change to it if needed
- after you are connected to a Datapac dial-in.
- Ok,if you have your Datapac 3000 Public Indial number, you've set your
- communication parameters at 8/N/1, then you are now set to go. Dial your
- indial just like a BBS(duh..) and once connnected:
- You will have a blank screen;
- Type 3 periods and press RETURN (this is to tell Dpac to initialize itself)
- The Datapac herald will flash up stating:
- DATAPAC : XXXX XXXX (your in-dial's NUA)
- You are now ready to enter commands to Datapac.
-
- Example:
- (YOU ENTER) atdt 16046627732
- (YOU ENTER) ...
- (DATAPAC RESPONDS) DATAPAC : 6710 1071
-
- Now you are all set to enter the NUA for your destination.
- NUAs on Datapac must be 8 to 10 digits(not including mnemonics).
- 8 is standard, but 9 or 10 is possible depending on usage of subaddressing.
- NUA prefixes on Datapac are handed out in blocks, meaning they do not
- correspond to Area Codes, but by looking at the surrounding prefixes, you can
- tell where a prefix is located. When scanning on Datapac, keep in mind most of
- the valid NUAs are found in the low numbers, so to sample a prefix go from
- (example) 12300001 to 12300200. It is a good idea, however, to scan the prefix
- right up until 2000, the choice is yours.
-
- DNIC List
- ---------
-
- Here is a list of the previous PSN's DNICs, and most of the other DNICs
- for PSNs world wide. This was taken from the DIS, with a number of my own
- additions that were omitted(the DIS did not include other Canadian or
- American PSNs). The extras DNICs came from my own experience and various
- BBS lists.
-
- COUNTRY NETWORK DNIC DIRECTION
- ------- ------- ---- ---------
-
- ANDORRA ANDORPAC 2945 BI-DIR
- ANTIGUA AGANET 3443 INCOMING
- ARGENTINA ARPAC 7220 BI-DIR
- ARPAC 7222 BI-DIR
- AUSTRIA DATEX-P 2322 BI-DIR
- DATEX-P TTX 2323 BI-DIR
- RA 2329 BI-DIR
- AUSTRALIA AUSTPAC 5052 BI-DIR
- OTC DATA ACCESS 5053 BI-DIR
- AZORES TELEPAC 2680 BI-DIR
- BAHAMAS BATELCO 3640 BI-DIR
- BAHRAIN BAHNET 4263 BI-DIR
- BARBADOS IDAS 3423 BI-DIR
- BELGIUM DCS 2062 BI-DIR
- DCS 2068 BI-DIR
- DCS 2069 BI-DIR
- BELIZE BTLDATAPAC 7020 BI-DIR
- BERMUDA BERMUDANET 3503 BI-DIR
- BRAZIL INTERDATA 7240 BI-DIR
- RENPAC 7241 BI-DIR
- RENPAC 7248 INCOMING
- RENPAC 7249 INCOMING
- BULGARIA BULPAC 2841 BI-DIR
- BURKINA FASO BURKIPAC 6132 BI-DIR
- CAMEROON CAMPAC 6242 BI-DIR
- CANADA DATAPAC 3020 BI-DIR
- GLOBEDAT 3025 BI-DIR
- CNCP PACKET NET 3028 BI-DIR
- CNCP INFO SWITCH 3029 BI-DIR
- CAYMAN ISLANDS IDAS 3463 BI-DIR
- CHAD CHADPAC 6222 BI-DIR
- CHILE ENTEL 7302 BI-DIR
- CHILE-PAC 7303 INCOMING
- VTRNET 7305 BI-DIR
- ENTEL 7300 INCOMING
- CHINA PTELCOM 4600 BI-DIR
- COLOMBIA COLDAPAQ 7322 BI-DIR
- COSTA RICA RACSAPAC 7120 BI-DIR
- RACSAPAC 7122 BI-DIR
- RACSAPAC 7128 BI-DIR
- RACSAPAC 7129 BI-DIR
- CUBA CUBA 2329 BI-DIR
- CURACAO DATANET-1 3621 BI-DIR
- CYPRUS CYTAPAC 2802 BI-DIR
- CYTAPAC 2807 BI-DIR
- CYTAPAC 2808 BI-DIR
- CYTAPAC 2809 BI-DIR
- DENMARK DATAPAK 2382 BI-DIR
- DATAPAK 2383 BI-DIR
- DJIBOUTI STIPAC 6382 BI-DIR
- DOMINICAN REP. UDTS-I 3701 INCOMING
- EGYPT ARENTO 6020 BI-DIR
- ESTONIA ESTPAC 2506 BI-DIR
- FIJI FIJIPAC 5420 BI-DIR
- FINLAND DATAPAK 2441 BI-DIR
- DATAPAK 2442 BI-DIR
- DIGIPAK 2443 BI-DIR
- FRANCE TRANSPAC 2080 BI-DIR
- NTI 2081 BI-DIR
- TRANSPAC 2089 BI-DIR
- TRANSPAC 9330 INCOMING
- TRANSPAC 9331 INCOMING
- TRANSPAC 9332 INCOMING
- TRANSPAC 9333 INCOMING
- TRANSPAC 9334 INCOMING
- TRANSPAC 9335 INCOMING
- TRANSPAC 9336 INCOMING
- TRANSPAC 9337 INCOMING
- TRANSPAC 9338 INCOMING
- TRANSPAC 9339 INCOMING
- FR ANTILLIES TRANSPAC 2080 BI-DIR
- FR GUIANA TRANSPAC 2080 BI-DIR
- FR POLYNESIA TOMPAC 5470 BI-DIR
- GABON GABONPAC 6282 BI-DIR
- GERMANY F.R. DATEX-P 2624 BI-DIR
- DATEX-C 2627 BI-DIR
- GREECE HELPAK 2022 BI-DIR
- HELLASPAC 2023 BI-DIR
- GREENLAND KANUPAX 2901 BI-DIR
- GUAM LSDS-RCA 5350 BI-DIR
- PACNET 5351 BI-DIR
- GUATEMALA GUATEL 7040 INCOMING
- GUATEL 7043 INCOMING
- HONDURAS HONDUTEL 7080 INCOMING
- HONDUTEL 7082 BI-DIR
- HONDUTEL 7089 BI-DIR
- HONG KONG INTELPAK 4542 BI-DIR
- DATAPAK 4545 BI-DIR
- INET HK 4546 BI-DIR
- HUNGARY DATEX-P 2160 BI-DIR
- DATEX-P 2161 BI-DIR
- ICELAND ICEPAK 2740 BI-DIR
- INDIA GPSS 4042 BI-DIR
- RABMN 4041 BI-DIR
- I-NET 4043 BI-DIR
- INDONESIA SKDP 5101 BI-DIR
- IRELAND EIRPAC 2721 BI-DIR
- EIRPAC 2724 BI-DIR
- ISRAEL ISRANET 4251 BI-DIR
- ITALY DARDO 2222 BI-DIR
- ITAPAC 2227 BI-DIR
- IVORY COAST SYTRANPAC 6122 BI-DIR
- JAMAICA JAMINTEL 3380 INCOMING
- JAPAN GLOBALNET 4400 BI-DIR
- DDX 4401 BI-DIR
- NIS-NET 4406 BI-DIR
- VENUS-P 4408 BI-DIR
- VENUS-P 9955 INCOMIMG
- VENUS-C 4409 BI-DIR
- NI+CI 4410 BI-DIR
- KENYA KENPAC 6390 BI-DIR
- KOREA REP HINET-P 4500 BI-DIR
- DACOM-NET 4501 BI-DIR
- DNS 4503 BI-DIR
- KUWAIT BAHNET 4263 BI-DIR
- LEBANON SODETEL 4155 BI-DIR
- LIECHTENSTEIN TELEPAC 2284 BI-DIR
- TELEPAC 2289 BI-DIR
- LUXEMBOURG LUXPAC 2704 BI-DIR
- LUXPAC 2709 BI-DIR
- MACAU MACAUPAC 4550 BI-DIR
- MADAGASCAR INFOPAC 6460 BI-DIR
- MADEIRA TELEPAC 2680 BI-DIR
- MALAYSIA MAYPAC 5021 BI-DIR
- MAURITIUS MAURIDATA 6170 BI-DIR
- MEXICO TELEPAC 3340 BI-DIR
- MOROCCO MOROCCO 6040 BI-DIR
- MOZAMBIQUE COMPAC 6435 BI-DIR
- NETHERLANDS DATANET-1 2040 BI-DIR
- DATANET-1 2041 BI-DIR
- DABAS 2044 BI-DIR
- DATANET-1 2049 BI-DIR
- N. MARIANAS PACNET 5351 BI-DIR
- NEW CALEDONIA TOMPAC 5460 BI-DIR
- NEW ZEALAND PACNET 5301 BI-DIR
- NIGER NIGERPAC 6142 BI-DIR
- NORWAY DATAPAC TTX 2421 BI-DIR
- DATAPAK 2422 BI-DIR
- DATAPAC 2423 BI-DIR
- PAKISTAN PSDS 4100 BI-DIR
- PANAMA INTELPAQ 7141 BI-DIR
- INTELPAQ 7142 BI-DIR
- PAPUA-NEW GUINEA PANGPAC 5053 BI-DIR
- PARAGUAY ANTELPAC 7447 BI-DIR
- PERU DICOTEL 7160 BI-DIR
- PHILIPPINES CAPWIRE 5150 INCOMING
- CAPWIRE 5151 BI-DIR
- PGC 5152 BI-DIR
- GLOBENET 5154 BI-DIR
- ETPI 5156 BI-DIR
- POLAND POLAK 2601 BI-DIR
- PORTUGAL TELEPAC 2680 BI-DIR
- SABD 2682 BI-DIR
- PUERTO RICO UDTS 3300 BI-DIR
- UDTS 3301 BI-DIR
- QATAR DOHPAC 4271 BI-DIR
- REUNION (FR) TRANSPAC 2080 BI-DIR
- RWANDA RWANDA 6352 BI-DIR
- SAN MARINO X-NET 2922 BI-DIR
- SAUDI ARABIA ALWASEED 4201 BI-DIR
- SENEGAL SENPAC 6081 BI-DIR
- SEYCHELLES INFOLINK 6331 BI-DIR
- SINGAPORE TELEPAC 5252 BI-DIR
- TELEPAC 5258 BI-DIR
- SOLOMON ISLANDS DATANET 5400 BI-DIR
- SOUTH AFRICA SAPONET 6550 BI-DIR
- SAPONET 6551 BI-DIR
- SAPONET 6559 BI-DIR
- SPAIN TIDA 2141 BI-DIR
- IBERPAC 2145 BI-DIR
- SRI-LANKA DATANET 4132 BI-DIR
- SWEDEN DATAPAK TTX 2401 BI-DIR
- DATAPAK-2 2403 BI-DIR
- DATAPAK-2 2407 BI-DIR
- SWITZERLAND TELEPAC 2284 BI-DIR
- TELEPAC 2285 BI-DIR
- TELEPAC 2289 BI-DIR
- TAIWAN PACNET 4872 BI-DIR
- PACNET 4873 BI-DIR
- UDAS 4877 BI-DIR
- TCHECOSLOVAKA DATEX-P 2301 BI-DIR
- THAILAND THAIPAC 5200 BI-DIR
- IDAR 5201 BI-DIR
- TONGA DATAPAK 5390 BI-DIR
- TOGOLESE REP. TOGOPAC 6152 BI-DIR
- TORTOLA IDAS 3483 INCOMING
- TRINIDAD DATANETT 3745 BI-DIR
- TEXTET 3740 BI-DIR
- TUNISIA RED25 6050 BI-DIR
- TURKEY TURPAC 2862 BI-DIR
- TURPAC 2863 BI-DIR
- TURKS&CAICOS IDAS 3763 INCOMING
- U ARAB EMIRATES EMDAN 4241 BI-DIR
- EMDAN 4243 BI-DIR
- TEDAS 4310 INCOMING
- URUGUAY URUPAC 7482 BI-DIR
- URUPAC 7489 BI-DIR
- USSR IASNET 2502 BI-DIR
- U.S.A. WESTERN UNION 3101 BI-DIR
- MCI 3102 BI-DIR
- ITT/UDTS 3103 BI-DIR
- WUI 3104 BI-DIR
- BT-TYMNET 3106 BI-DIR
- SPRINTNET 3110 BI-DIR
- RCA 3113 BI-DIR
- WESTERN UNION 3114 BI-DIR
- DATAPAK 3119 BI-DIR
- PSTS 3124 BI-DIR
- UNINET 3125 BI-DIR
- ADP AUTONET 3126 BI-DIR
- COMPUSERVE 3132 BI-DIR
- AT&T ACCUNET 3134 BI-DIR
- FEDEX 3138 BI-DIR
- NET EXPRESS 3139 BI-DIR
- SNET 3140 BI-DIR
- BELL SOUTH 3142 BI-DIR
- BELL SOUTH 3143 BI-DIR
- NYNEX 3144 BI-DIR
- PACIFIC BELL 3145 BI-DIR
- SWEST BELL 3146 BI-DIR
- U.S. WEST 3147 BI-DIR
- CENTEL 3148 BI-DIR
- FEDEX 3150 BI-DIR
- U.S. VIRGIN I UDTS 3320 BI-DIR
- U. KINGDOM IPSS-BTI 2341 BI-DIR
- PSS-BT 2342 BI-DIR
- GNS-BT 2343 BI-DIR
- MERCURY 2350 BI-DIR
- MERCURY 2351 BI-DIR
- HULL 2352 BI-DIR
- VANUATU VIAPAC 5410 BI-DIR
- VENEZUELA VENEXPAQ 7342 BI-DIR
- YUGOSLAVIA YUGOPAC 2201 BI-DIR
- ZIMBABWE ZIMNET 6484 BI-DIR
-
-
- SYSTEM PENETRATION
- ==================
- ------------------
-
- Ok, now that you've hopefully found some systems, you are going to need to
- know how to identify and, with any luck, get in these newfound delights.
- What follows is a list of as many common systems as i could find. The
- accounts listed along with it are not, per say, 'defaults'. There are very
- few actual defaults. These are 'common accounts', in that it is likely that
- many of these will be present. So, try them all, you might get lucky.
- The list of common accounts will never be complete, but mine is fairly
- close. I've hacked into an incredible amount of systems, and because of this
- I've been able to gather a fairly extensive list of common accounts.
- Where I left the password space blank, just try the username(and anything
- else you want), as there are no common passwords other than the username
- itself.
- And also, in the password space I never included the username as a
- password, as it is a given in every case that you will try it.
- And remember, passwords given are just guidelines, try what you want.
-
- UNIX- Unix is one of the most widespread Operating Systems in the
- world; if you scan a PSN, chances are you'll find a number of
- Unixes, doesn't matter where in the world the PSN resides.
- The default login prompt for a unix system is 'login', and
- while that cannot be changed, additional characters might
- be added to preface 'login', such as 'rsflogin:'. Hit <CR> a
- few times and it should disappear.
- Because UNIX is a non-proprietary software, there are many
- variants of it, such as Xenix, SCO, SunOS, BSD, etc.., but
- the OS stays pretty much the same.
- As a rule, usernames are in lowercase only, as are passwords,
- but Unix is case sensitive so you might want to experiment if
- you aren't getting any luck.
- You are generally allowed 4 attempts at a login/password, but
- this can be increased or decreased at the sysadmins whim.
- Unfortunely, UNIX does not let you know when the username
- you have entered is incorrect.
- UNIX informs the user of when the last bad login attempt was
- made, but nothing more. However, the sysadmin can keep logs
- and audit trails if he so wishes, so watch out.
- When inside a UNIX, type 'cat /etc/passwd'. This will give
- you the list of usernames, and the encrypted passwords.
- The command 'who' gives a list of users online.
- 'Learn' and 'man' bring up help facilities.
- Once inside, you will standardly receive the prompt $ or %
- for regular users, or # for superusers.
- The root account is the superuser, and thus the password
- could be anything, and is probably well protected. I left
- this blank, it is up to you. There won't be any common
- passwords for root.
-
- COMMON ACCOUNTS:
-
- Username Password
- -------- --------
- root
- daemon
- adm admin, sysadm, sysadmin, operator, manager
- uucp
- bin
- sys
- 123 lotus, lotus123
- adduser
- admin adm,sysadm,sysadmin,operator,manager
- anon anonymous
- anonuucp anon, uucp, nuucp
- anonymous anon
- asg device devadmin
- audit
- auth
- backappl
- backup save, tar
- batch
- bbx
- blast
- bupsched
- cbm
- cbmtest
- checkfsys
- control
- cron
- csr support, custsup
- dbcat database, catalog
- default user, guest
- demo tour, guest
- dev
- devel
- devshp
- diag sysdiag, sysdiags, diags, test
- diags diag, sysdiag, sysdiags
- dialup
- dos
- fax
- field fld, service, support, test
- filepro
- finger
- fms
- friend guest, visitor
- games
- general
- gp
- gsa
- guest visitor, demo, friend, tour
- help
- host
- hpdb
- info
- informix database
- ingres database
- inquiry
- install
- journal
- journals
- kcml
- learn
- lib library, syslib
- link
- listen
- lp print spooler lpadmin
- lpadmin lp, adm, admin
- lpd
- ls
- mail
- maint sysmaint, service
- makefsys
- man
- manager mgr, man, sysmgr, sysman, operator
- mdf
- menu
- mountfsys
- ncrm ncr
- net network
- netinst inst, install, net, network
- netman net, man, manager, mgr, netmgr, network
- netmgr net, man, manager, mgr, netmgr, network
- network net
- newconv
- news
- nobody anon
- nuucp anon
- oasys oa
- odt opendesktop
- online
- openmail mail
- oper operator,manager,adm,admin,sysadmin,mgr
- operator sysop, oper, manager
- opp
- oracle database
- oraclev5 oracle, database
- oradev oracle
- pcs
- pcsloc
- pctest
- postmaster mail
- powerdown shutdown
- priv private
- prod
- pub public
- public pub
- reboot
- remote
- report
- rha
- rje
- rsm
- rsmadm rsm, adm, admin
- rusr
- sales
- sas
- save backup
- savep
- service field, support
- setup
- shutdown
- smtp mail
- softwork
- space
- startup
- su
- sundiag sysdiag, diag, diags, sysdiags
- suoper su, oper, operator
- super supervisor, manager, operator
- support field, service
- sync
- sysadm adm, admin, operator, manager
- sysdiag diag, diags, sysdiags
- sysinfo info
- sysmaint maint, service
- sysman manager,mgr,man,admin,operator,sysadmin
- sysmgr manager,mgr,man,admin,operator,sysadmin
- system sys, unix, shell, syslib, lib, operator
- systest test, tester, testuser, user
- test tester, testuser, systest, user
- tester test, user, testuser
- testuser test, tester, user, systest
- tftp
- tour demo, guest, user, visitor
- transfer
- tty
- tutor
- tutorial
- umountfsys
- unix
- unixmail mail, unix
- user guest, demo
- userp user
- usr user
- usrlimit
- utest
- uucpadm adm, admin, uucp
- uuadm uucp, adm
- uuadmin uucp, admin
- uuhost uucp, host
- uulog uucp, log
- uunx uucp
- uupick uucp, pick
- uustat uucp, stat
- uuto uucp, to
- uux uucp
- va
- vashell
- vax
- visitor guest, friend, demo, tour
- vlsi
- vmsys vm, face
- vsifax
- who
- wp
- wp51
- x25 pad
- x25test test
- x400
-
- VMS- DEC's Virtual Memory System commonly runs on VAX computers.
- It is another very widespread system, with many users world
- wide.
- VMS will have a 'Username:' prompt, and to be sure just type
- in a ',' for a username. A VMS will throw back an error
- message on special delimeters.
- You will standardly get 3 and only three login attempts, and
- VMS is not kind enough to let you know when you have entered
- an incorrect username.
- Once inside you will find yourself at a $ prompt.
-
- COMMON ACCOUNTS:
-
- Username Password
- -------- --------
- backup
- batch
- dcl
- dec
- decmail mail
- decnet
- default default, user
- dialup
- demo guest
- dsmmanager dsm, manager
- dsmuser dsm, user
- field field, service, support, test, digital
- games
- guest visitor, demo
- help
- helpdesk
- help_desk helpdesk
- host
- info
- ingres database
- interactive
- link
- local
- mail
- mailer mail
- mbmanager mb, manager, mgr, man
- mbwatch watch, mb
- mpdbadmin mpdb, admin
- netcon net, network
- netmgr net, manager, mgr, operator
- netpriv network, private, priv, net
- netserver
- network net
- newingres ingres
- news
- operations operations
- operator oper, manager, mgr, admin,
- opervax operator, vax
- ops
- oracle
- pcsdba
- pfmuser pfm, user
- postmaster mail
- priv private
- remote
- report
- rje remote, job, entry
- student
- suggest suggest
- sys
- sysmaint sysmaint, maint, service, digital
- system manager,operator,sys,syslib
- systest uetp,test
- systest_clig systest, test
- tapelib
- teledemo demo
- test testuser, tester
- uetp
- user test, guest, demo
- userp user
- vax
- vms
- visitor guest, demo
- wpusers
-
- HP3000- HP3000 mainframes run the MPE series of operating systems,
- such as MPE, V, ix, X, and XL.
- The default login prompt is ':', but this can be prefaced
- with characters(ie: 'mentor:') and in some cases the ':' may
- be taken completely away (ie: 'mentor'). To check for a
- HP3000, hit a <CR>, you will get an error message such as this;
- EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON. (CIERR 1402)
- To login type 'hello', followed by the login information,
- which is in this format: USER.ACCOUNT,GROUP.
- The group is optional, but may be needed in some cases, and
- can give you different file sets and the sort.
- A great thing about HP3000's is they tell you exactly what
- is incorrect about the login name you've supplied them,
- be it the account is valid but the username is wrong, or the
- other way around.
- But unfortunely, if the system operators choose, they may
- password ALL of the login name segments; username, account
- and group.
- The internal prompt for MPE's is, again, :.
- 'Help' will give you help when inside a HP3000.
- When entering accounts, i'd suggest not to use a group at
- first. If you receive the error message 'not in home group',
- then try the group PUB, then if even that fails, move on to
- the common group list.
- I didn't list passwords along with the accounts, as it would
- be a bit of an awkward format, because of MPE's awkward
- format. The only manufacturer default passwords I am aware
- of are 'hponly', for mgr.telesup, 'lotus', for mgr.sys, and
- 'hpword' for field.support.
- Just remember to try the various parts of the account as a
- password, and anything else along those lines.
- If you need a password for the following user.accounts &
- groups, try the various parts of the name plus any
- combinations of it or names with obvious links to it(ie:
- field=service).
-
- COMMON ACCOUNTS:
-
- Username.Account
- ----------------
- mgr.3000devs
- mgr.acct
- mgr.backup
- manager.blast
- manager.blast1
- mgr.ccc
- spool.ccc
- mgr.cnas
- manager.cognos
- mgr.cognos
- operator.cognos
- mgr.common
- mgr.company
- mgr.conv
- mgr.corp
- mgr.cslxl
- mgr.demo
- operator.disc
- mgr.easy
- mgr.easydev
- mgr.extend
- mgr.hpdesk
- mgr.hplanmgr
- field.hpncs
- mgr.hpncs
- advmail.hpoffice
- deskmon.hpoffice
- mail.hpoffice
- mailman.hpoffice
- mailroom.hpoffice
- mailtrck.hpoffice
- manager.hpoffice
- mgr.hpoffice
- openmail.hpoffice
- pcuser.hpoffice
- spoolman.hpoffice
- x400fer.hpoffice
- x400xfer.hpoffice
- wp.hpoffice
- mgr.hponly
- mgr.hpoptmgt
- field.hpp187
- mgr.hpp187
- mgr.hpp189
- mgr.hpp196
- mgr.hppl85
- mgr.hppl87
- mgr.hppl89
- mgr.hppl96
- mgr.hpskts
- mgr.hpspool
- mgr.hpword
- mgr.hpx11
- dpcont.hq
- mgr.hq
- mgr.indhpe
- mgr.infosys
- mgr.intx3
- manager.itf3000
- mail.mail
- mgr.netbase
- mgr.netware
- operator.netware
- mgr.orbit
- mgr.prod
- mgr.rego
- mgr.remacct
- mgr.rje
- manager.security
- mgr.security
- mgr.sldemo
- mgr.snads
- mgr.softrep
- mgr.speedwre
- mgr.spool
- manager.starbase
- field.support
- mgr.support
- operator.support
- exploit.sys
- manager.sys
- mgr.sys
- operator.sys
- pcuser.sys
- rsbcmon.sys
- operator.syslib
- sysrpt.syslib
- mgr.sysmgr
- operator.system
- mgr.tech
- mgr.techxl
- mgr.telamon
- field.hpword
- mgr.opt
- manager.tch
- field.telesup
- mgr.telesup
- sys.telesup
- mgr.tellx
- monitor.tellx
- mgr.utility
- mgr.vecsl
- manager.vesoft
- mgr.vesoft
- mgr.word
- field.xlserver
- mgr.xlserver
- mgr.xpress
-
- COMMON GROUPS:
-
- admin
- advmail
- ask
- brwexec
- brwonlne
- brwspec
- bspadmin
- bspdata
- bspinstx
- bsptools
- catbin1
- catbin2
- catlib
- classes
- config
- console
- convert
- creator
- curator
- currarc
- current
- dat
- data
- database
- delivery
- deskmon
- devices
- diadb
- diag
- diafile
- diaipc
- doc
- docxl
- document
- dsg
- easy
- ems
- emskit
- etdaemon
- example
- examples
- ezchart
- galpics
- graphics
- hold
- hpaccss
- hpadvlk
- hpadvml
- hpdesk
- hpdraw
- hpecm
- hpemm
- hpenv
- hpgal
- hphpbkp
- hplibry
- hplist
- hplt123
- hpmail
- hpmap
- hpmenu
- hpprofs
- hpsw
- hptelex
- ibmpam
- idl
- idlc
- idpxl
- include
- infoxl
- instx
- internal
- itpxl
- job
- lib
- libipc
- library
- mailconf
- maildb
- mailhelp
- mailjob
- maillib
- mailserv
- mailstat
- mailtell
- mailxeq
- mediamgr
- memo
- memory
- mgr
- mmgrdata
- mmgrxfer
- mmordata
- mmorxfer
- monitor
- mpexl
- ndfiles
- ndports
- net
- network
- nwoconf
- office
- oldmail
- oper
- operator
- out
- pascalc
- patchxl
- pcbkp
- ppcdict
- ppcsave
- ppcutil
- prntmate
- prog
- prvxl
- pub
- pubxl
- qedit
- ref
- request
- restore
- sample
- sbase
- sfiles
- signal
- sleeper
- snax25
- sql
- sruntime
- subfile
- suprvisr
- sx
- sys
- sysmgr
- sysvol
- tdpdata
- telex
- telexjob
- text
- tfm
- ti
- tools
- transmit
- user
- users
- validate
- viewlib
- visicalc
- wp
- wp3
- x400data
- x400db
- x400fer
- x400file
- xspool
-
- VM/CMS- The VM/CMS Operating System is found on IBM mainframes, and
- while there are quite a few out there, they are commonly left
- alone by hackers who prefer Unix or VMS.
- VM/CMS systems are commonly found gated off Sim3278 VTAMs and
- ISM systems as well.
- The login prompt for CMS is '.', but additional information
- might be given before the prompt, such as;
- Virtual Machine/System Product
- !
- .
- or;
- VM/370
- !
- .
- and frequently over to the side;
- LOGON userid
- DIAL userid
- MSG userid message
- LOGOFF
- but they all represent a VM/CMS system.
- To logon, type 'logon' followed by the username, which is
- usually 1 to 8 characters in length.
- To be sure it is a CMS, type 'logon' followed by some random
- garbage. If it is a VM/CMS, it will reply;
- Userid not in CP directory
- This is one of the great things about CMS, it tells you if
- the login ID you entered is incorrect, thus making the
- finding of valid ones fairly easy.
- One thing to watch out for.. if you attempt brute forcing
- some systems will simply shut the account or even the login
- facility for some time. If that is the case, find out the
- limit and stay just underneath it.. drop carrier or clear the
- circuit if necessary, but if you continually shut down the
- login facilities you will raise a few eyebrows before you
- even make it inside.
- Once inside, typing 'help' will get you a moderate online
- manual.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- $aloc$
- admin operator, manager, adm, sysadmin, sysadm
- alertvm alert
- ap2svp
- apl2pp
- autolog1 autolog
- autolog2 autolog
- batch
- batch1 batch
- batch2 batch
- botinstl
- ccc
- cms
- cmsbatch cms, batch, batch1
- cmsuser cms, user
- cpms
- cpnuc
- cprm
- cspuser user, csp
- cview
- datamove
- demo1 demo
- demo2 demo
- direct
- dirmaint dirmaint1
- diskcnt
- entty
- erep
- formplus
- fsfadmin fsf, adm, sysadmin, sysadm, admin, fsfadm
- fsftask1
- fsftask2
- gcs
- gcsrecon
- idms
- idmsse
- iips
- infm-mgr infm, man, manager, mgr
- inoutmgr mgr, manager
- ipfappl
- ipfserv
- ispvm
- ivpm1
- ivpm2
- maildel
- mailman
- maint service
- moeserv
- netview network, view, net, monitor
- oltsep
- op1
- opbackup backup
- operatns op, operator, manager, admin
- operator op, operatns, manager, admin
- opserver
- pdm470
- pdmremi
- peng
- presdbm dbm
- procal
- prodbm prod
- promail
- psfmaint maint
- pssnews news
- pvm
- router
- rscs
- rscsv2
- savsys
- sfcm1 sfcm
- sfcntrl
- sim3278
- smart
- sna
- sqldba database
- sqluser user, sql
- syncrony
- sysadmin admin, adm, sysadm, manager, operator
- sysckp
- sysdump1 sysdump
- syserr
- syswrm
- tdisk disk, temp
- temp
- tsafvm
- vastest test
- vm3812
- vmarch
- vmasmon
- vmassys
- vmbackup backup
- vmbsysad
- vmmap map
- vmtape tape
- vmtest test, testuser
- vmtlibr
- vmutil util, utils
- vseipo
- vsemaint maint
- vseman
- vsm
- vtam
- vtamuser user, vtam
- x400x25
-
- PRIMOS- Run on the Prime company's mainframes, the Primos Operating
- System is in fairly wide use, and is commonly found on
- Packet-Switched Networks worldwide.
- Upon connect you will get a header somewhat like
- PRIMENET 23.3.0 INTENG
- This informs you that it is indeed a Primos computer, the
- version number, and the system identifier the owner picked,
- which is usually the company name or the city the Primos is
- located in. If you find a Primos on a network, you will
- receive the Primenet header, but if it is outside of a
- network, the header may be different(ie:Primecon).
- Hit a number of <CR>'s, and Primos will throw you the login
- prompt 'ER!'.
- At this point, type 'login' followed by your
- username.
- If hitting <CR>'s did not provoke an 'ER!', then type 'login'
- followed by your username.
- If you are blessed and you find some stone age company
- running 18.0.0 or below, you are guaranteed access.
- Just find a username and there will be no password prompt.
- If for some reason passwording exists, a a few control-C's
- should drop you in.
- Unfortunely, Primos almost always allows one and one attempt
- only at a username/password combination before it kicks you
- off, and Primos will not tell you if the ID you've entered is
- invalid.
- Once you are inside, you will find yourself at the prompt
- 'OK'.
- 'help' brings up a so-so online help guide.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- backup
- backup_terminal
- batch_service
- batch
- bootrun
- cmdnc0
- demo
- diag
- dos
- dsmsr dsm
- dsm_logger dsm
- fam
- games
- guest
- guest1 guest
- lib
- libraries
- login_server
- mail
- mailer
- netlink net, primenet
- netman manager, man, mgr, netmgr
- network_mgt netmgt
- network_server server
- prime primos, system
- primenet net, netlink
- primos prime, system
- primos_cs primos, prime, system
- regist
- rje
- spool
- spoolbin spool
- syscol
- sysovl
- system prime, primos, sys1, operator
- system_debug
- system_manager
- tcpip_manager
- tele
- test
- timer_progress
- tools
-
- TOPS-10/20- An older and somewhat rare operating system, TOPS-10 ran on
- the DEC-10/20 machines. You can usually recognize a TOPS-10 by
- its' prompt, a lone period '.', while a TOPS-20 will have a
- '@' in its place. Most systems allow you to enter the commands
- 'SYSTAT' or 'FINGER' from the login prompt, before logging in.
- This command will let you see the users online, a valuable aide
- in hacking.
- To login, type 'login xxx,yyy', where the x and y's are
- digits.
- TOPS-10 does let you know when your username is incorrect.
-
- COMMON ACCOUNTS
-
- User ID Code Password
- ------------ --------
- 1,2 OPERATOR, MANAGER, ADMIN, SYSLIB, LIB
- 2,7 MAINT, MAINTAIN, SYSMAINT
- 5,30 GAMES
-
- IRIS- Unfortunely, i have no experience with IRIS whatsoever. To
- this day i haven't even seen one. So with regret i must
- present old material, the following info comes entirely from
- the LOD/H Technical Journal #3. Hopefully it will still be
- applicable.
- The IRIS Operating System used to run soley on PDP systems,
- but now runs on many various machines.
- IRIS will commonly present itself with a herald such as;
- "Welcome to IRIS R9.1.4 timesharing"
- And then an "ACCOUNT ID?" prompt.
- IRIS is kind enough to tell you when you enter an incorrect
- ID, it won't kick you off after too many attempts, and no
- logs are kept. And strangely enough, passwords are not used!
- So if you can find yourself an IRIS OS, try the following
- defaults and you should drop in..
-
- COMMON ACCOUNTS
-
- Username
- --------
- accounting
- boss
- demo
- manager
- noname
- pdp8
- pdp11
- software
- tcl
-
- NOS- The NOS(Network Operating System) is found on Cyber
- mainframes made by CDC(the Control Data Corporation).
- Cyber machines are commonly run by institutions such as
- universities and atomic research facilities.
- Cybers will usually give a herald of some sort, such as
- Sheridan Park Cyber 180-830 Computer System
- or
- Sacremento Cyber 180-830 CSUS NOS Software System
- The first login prompt will be 'FAMILY:', just hit <CR>.
- The next prompt is 'USER NAME:'. This is more difficult,
- usually 7 characters. The password is even worse,
- commonly 7 random letters. Sound bad? It is. Brute forcing
- an account is next to impossible.
- I've never seen these defaults work, but they are better than
- nothing. I got them out of the LOD/H Novice's Guide to
- Hacking, written by the Mentor. There are no known passwords
- for these usernames.
-
- COMMON ACCOUNTS
-
- Username
- --------
- $SYSTEM
- SYSTEMV
-
- DECSERVER- The Decserver, is as the name implies, a server made by the
- Digital Equipment Corporation, the same company that makes
- the VAX machines.
- It is possible the owner of the server put a password on it,
- if this is the case you will hit a # prompt. If the server
- has PADs or outdials on it, you can bet this is the case.
- You don't need a username, just the password. You will
- commonly get 3 tries, but it can be modified.
- The default password is 'access', but other good things to
- try are ; server, dec, network, net, system (and whatever
- else goes along with that).
- If you get past the #, or there isn't one, you will hit the
- prompt 'Enter Username>'. What you put really doesn't matter,
- it is just an identifier. Put something normal sounding, and
- not your hacker alias. It is actually interesting to look at
- the users online at a Decserver, as commonly there will be a few users
- with the username C or CCC or the like, usually meaning
- they are probably a fellow hacker.
- Also, at the Enter Username> prompt you are able to ask for
- help with the 'help' command, which spews out fairly lengthly
- logon help file.
- If all went well you should end up at a 'Local>' prompt.
- Decservers have a fairly nice set of help files, simply type
- 'help' and read all you want.
- It is a good idea to do a 'show users' when you first logon,
- and next do a 'show services' and 'show nodes'. The services
- are computers hooked up to the Decserver, which you can
- access. For obvious reasons you will often find many VAX/VMS
- systems on Decservers, but pretty much anything can be found
- Look for services titled Dial, Modem, PAD, X25,
- Network, or anthing like that. Try pretty much everything
- you see. Remember to try the usernames you see when you do
- a 'show users' as users for the systems online.
- Also, you will sometimes find your Decserver has Internet
- (Telnet, SLIP or FTP) access, make sure you make full use of
- this.
- To connect to the services you see, use 'c XXXX', where the
- X's represent the service name.
- Once inside, the manufacturer's default for privs is 'system'
- and it is rarely changed.
- The maintenance password changes from version to version.
- With the Decserver 200 & 500 it is 0000000000000000 (16 0's),
- but with 300 it is simply 0.
-
- GS/1- GS/1's are another server type system, but they are less
- common than the Decservers. The default prompt is 'GS/1>',
- but this can be changed to the sysadmins liking.
- To check for a GS/1, do a 'sh d', which will print out some
- statistics.
- To find what systems are available from the server, type
- 'sh n' or a 'sh c', and a 'sh m' for the system macros.
-
- XMUX- The XMUX is a multiplexing system that provides remote
- access, made by Gandalf Technologies, Inc., Gandalf of Canada
- Ltd. in Canada. As far as I can tell, the XMUX is used only on
- Packet-Switched Networks, Datapac in particular but with usage
- on PSNs world wide.
- The XMUX is not usually thought of as a stand alone system,
- but as a supportive system for multi-user networked systems,
- having a bit to do with system monitoring, channel control,
- and some of the features of multiplexing.
- Thus, you'll commonly find a XMUX on a mnemonic or a
- subaddress of another system, although you will find them
- alone on their own NUA frequently as well.
- To find the systems on a subaddress or a mnemonic, your best
- bet is to go with mnemonics, as the LOGGER mnemonic cannot be
- removed, while subaddressing is optional.
- You won't always want to check every single system, so i'll
- give a guideline of where to check;
- (REMINDER: this is only for systems on PSNs, and may not
- apply to your PSN)
-
- - PACX/ : The PACX/Starmaster is also made by
- Starmaster Gandalf, and the two are tightly
- Systems interwoven. If mnemonics don't work, be
- sure to try LCNs, as the CONSOLE on a
- PACX/Starmaster is an entirely different
- thing, and frequently using the mnemonic
- CONSOLE will bring you to the PACX
- console, not the XMUX console.
- - BBS Systems : BBS Systems on PSNs frequently need some
- help, and XMUXs are fairly commonly
- found with them.
- - Other misc. : Many of the other operating systems,
- systems such as Unix, AOS/VS, Pick and HP3000
- have the occasional XMUX along with it.
- - Networked : A good portion of networked systems have
- systems XMUXs.
-
- If a system does have a XMUX also, you can reach it almost
- always by the mnemonic CONSOLE, and if not, the node name of
- the XMUX. If that doesn't work, try LCNs up to and including
- 15.
- Occasionally the console of the XMUX will be unpassworded, in
- which case you will drop straight into the console. The XMUX
- console is self-explanatory and menued, so i will leave you
- to explore it.
- However, in all likeliness you will find yourself at the
- password prompt, 'Password >'. This can not be modified, but
- a one-line herald may be put above it.
- To check for a XMUX, simply hit <CR>. It will tell you that
- the password was invalid, and it must be 1 to 8 alphanumeric
- characters.
- As you can see, you do not need a username for the remote
- console of a XMUX. UIDs are used, but internally within the
- workstation.
- As it says, the password format is 1 to 8 alphanumeric
- characters. There is no default password, the console is left
- unprotected unless the owner decides to password it.
- However, there are common passwords. They are;
- console, gandalf, xmux, system, password, sys, mux xmux1
- I'll repeat them in the common passwords again later.
- But these will not always work, as it is up to the owner to
- pick the password(although they do like those).
- Your next best bet is to find out the node name of the XMUX
- (XMUXs are polling systems as well, usually hooked up somehow
- to one of the regional hubs).
- To do this, you must understand the parts of the XMUX.
- The XMUX has 4 default parts; the CONSOLE, the FOX, the
- LOGGER, and the MACHINE.
- I'll try and define the usage of them a bit more;
- CONSOLE- the main remote part of the XMUX, which performs all
- the maintenance functions and system maintenance.
- the actual system.
- reachable usually on the LCN(subaddress) of 0 or
- 4/5, and the default mnemonic CONSOLE, which can be
- changed.
- FOX - a test system, which runs through never ending lines
- of the alphabet and digits 0-9.
- reachable on the LCN of 1, mnemonic FOX.
- LOGGER - a device which displays log information, usually
- one or two lines, including the node name.
- reachable on the LCN of 2, mnemonic LOGGER.
- MACHINE- a system which i do not yet understand fully.
- performs some interesting functions.
- the prompt is '#'.
- type 'S' and you will(always) receive a short/long
- (depending on how much the system is used) system
- status report, containing among other things the
- system node name.
- if active, typing 'L' will bring up a more complete
- system log. This is VERY useful. It contains the
- NUAs of the systems which called the XMUX, and it
- contains the UIDs if used.
- As you can see, the XMUX is rather complicated upon
- first look, but it is actually fairly simple. The easiest
- way to grab the node name is to call the LOGGER.
- The logger MUST be present, always. It is a non-removable
- default. The LCN may be removed, but the mnemonic must stay.
- I explained mnemonics earlier, but i'll refresh your memory.
- To use the mnemonic, simply type the NUA, followed by a comma
- and then the mnemonic, ie;
- 12300456,LOGGER
- The very first thing in the data string you see is the node
- name. If it is a blank space, you have run across a rarity,
- a XMUX without a node name.
- The node name is THE most popular thing other than the other
- common passwords.
- Try combinations of it, and combinations of it along with
- the words XMUX and MUX.
- And of course, if a herald is used, use whatever you can find
- in the herald.
- But again, if it is a company, they love to use the company
- name or acronym as a password, and that acronym or name will
- often be the node name.
- Ok, have fun..
-
- COMMON ACCOUNTS
-
- Console Passwords
- -----------------
- CONSOLE
- XMUX
- GANDALF
- SYSTEM
- PASSWORD
- MUX
- XMUX1
- SYS
- (node name)
-
- One other thing. I did not include the profile or remote
- profile names, or the UIDs, as they are as far as i know
- inapplicable from remote.
- And a final comment. XMUXs are powerful and potentially
- extremely harmful to a network. DO NOT DELETE ANYTHING. The
- only submenus you will have reason to access are 'DEFINE' and
- 'DISPLAY'. Don't boot people off channels or add console
- passwording or remove profiles..you will end up with your ass
- in jail. Taking down a network is less than funny to the
- people that run it. Explore, don't harm.
-
- STARMASTER- The Starmaster/PACX 2000 is still a somewhat mysterious
- /PACX system, but i have now explored all the security barriers as
- well as the network and the internal functions, so i feel
- this is fairly complete.
- The Starmaster/PACX system is a networking/server system made
- by, again, Gandalf Technologies Inc., Gandalf of Canada Ltd.,
- in Canada, and is also known informally (and some what
- incorrectly) as the 'Gandalf Access Server.' The Access is
- similar, but different, as described later.
- It is a fairly popular system on Datapac, and has some usage
- in other regions of the world. Again, it is used mainly
- on Packet-Switched Networks, although, thanks to the dialing
- directory of a Sam24V outdial on a Starmaster, I have
- discovered that Starmasters do indeed have dialin access.
- The first possible security barrier is the dialin password,
- which is rarely used, but you should know about.
- The prompt is usually ;
- DIALIN PASSWORD?
- But can be changed, although it should remain similar.
- Dialin passwords are 1 to 8 characters, and are usually
- one of the following defaults;
- GANDALF SERVER PACX NET NETWORK STARMAST DIALIN PASSWORD
- ACCESS
- If the Starmaster has a XMUX resident(explained in previous
- system definition; XMUXs), find out the node name and try it.
- The next possible security barrier is that the sysadmin
- desires the users to enter a username/password before
- entering the server.
- You will find yourself at a prompt such as;
- USERNAME?
- This is the most common prompt.
- Usernames are 1 to 8 characters, and the Starmaster will let
- you know if it is wrong or not with an error message such as;
- INCORRECT USERNAME
- or
- INVALID RESPONSE
- This, like the username prompt, can be changed, but it will
- usually be in all-caps.
- You are allowed between 1 and 10 attempts at either a valid
- username or a valid password, depending on the owners
- preference.
- This means(if it is set to ten tries) you can enter 9 invalid
- usernames, and on the tenth enter a valid username, then have
- 10 attempts at a valid password.
- The defaults for this(which i will list later also) prompt
- are; TEST, TESTUSER, TESTER, GANDALF, SYSTEM, GUEST
- USER, HP, CONSOLE, and finally OPERATOR.
- Also, first names will work usually.
- The next prompt you will face, or the first one if usernames
- are not implemented, is the server prompt. This is the main
- user prompt for a Starmaster, all major user commands are
- used from here.
- But as you can guess, commands aren't used really, it is
- service names you desire.
- Sometimes you will get a list upon entering the server, but
- other times you will just hit the server prompt, which
- usually looks something like;
- SERVICE?
- or
- CLASS?
- or even
- service?
- or
- class?
- or
- service
- Or whatever the sysadmin feels like. 'SERVICE?' is the
- default, and the most common.
- Keep in mind that the services CAN be passworded, but
- rarely are. In the case of passwording, use your imagination.
- Another thing; from the PACX console, where the services are
- defined, there is an option which decides whether the service
- is allowed for remote users. If this is set to NO, then you
- are out of luck, you have to be in the workstation to use the
- command. This is common for the CONSOLE and the MAIL, and
- occasionally modems and PADs. You will get an error message
- something like 'SERVICE NOT ALLOWED'.
- I will give a more complete list of common services, but
- I will list the defaults and the major ones now.
-
- PAD, X25, X28- Will commonly take you to a Gandalf PAD,
- (or name of for which the default prompt is '*'.
- your PSN) 'HELP' will bring up a list of commands.
- MAIL - A non-removable default, but i've never
- seen it with the remote access flag in the
- ON position.
- CONNECT - Another non-removable default which i have
- never seen with the remote access flag in
- the on position.
- MODEM, DIAL - And variations therof. The common outdial
- is the Gandalf made Sam24V, which comes with
- a great set of help files.
- CONSOLE - The motherlode. The system controller,
- maintenance computer, test machine, and
- all of that. DON'T confuse the PACX console
- with the XMUX console, they are two very
- different things.
- The console should be protected by the
- sysadmin with his/her life, as every faction
- of the Starmaster is controlled from within
- the Console.
- The CONSOLE is a non-removable service from
- the server, BUT remote access can be removed
- thus cutting off our means of getting to it.
- Try it first, if it works the screen will
- scroll down a number of lines and give this
- herald/prompt;
- GANDALF TECHNOLOGIES INCORPORATED, COPYRIGHT 1990
- OPERATOR NAME?
- This is not changable, it will remain the
- same except for possibly the copyright date.
- There can be 8 operators at the most, and
- they will have 1 to 8 characters in their
- name and password. And again, the PACX will
- tell you if your operator name is incorrect.
- You will be allowed 1 to 10 attempts at the
- login name and then it resets to 0 for the
- password attempt when you've found an
- operator name, but same limit.
- The same defaults for the usernames work
- here, if you are lucky, with the exception
- of HP. I'll list them again at the end.
- Once you get in, it is all menued and
- explanatory. DON'T FUCK THINGS UP. By that
- I mean deleting or modifying. Look. There
- is MUCH to see. The PACX console is
- incredibly powerful, and you will have much
- more fun exploring it.
- Besides, once you are in the console, the
- game is over. You have control over all the
- services, users, and all security barriers.
- If you get a high level console account,
- you are the God of the PACX, no joke.
-
- COMMON ACCOUNTS
-
- Usernames Passwords
- --------- ---------
- CONSOLE CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
- GAND GAND
- GANDALF GANDALF, SYSTEM, PACX, STARMAST, SYS
- GUEST GUEST, VISITOR, USER
- HP HP
- OPERATOR OPERATOR, SYSTEM, SYSLIB, LIB, GANDALF
- SYSTEM SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
- TEST TEST, TESTUSER, USER, TESTER
- TESTUSER TEST, TESTUSER, USER, TESTER
- TESTER TEST, TESTUSER, USER, TESTER
- USER USER, GUEST, TEST, VISITOR, GANDALF
- (i've never seen an account such as MAINT, but i would guess
- one exists, along with standard system defaults. Try
- anything outside these lines)
-
- Services
- --------
- 1 (if it works; higher)
- A (through Z)
- 10 (if it works; higher in sequence of tens)
- BBS
- CLUSTER
- CONNECT
- CONSOLE
- DATABASE
- DATAPAC
- DEC
- DIAL
- DIALOUT
- FILES
- FTP
- GATEWAY
- GEAC
- HELP
- HP
- INTERNET
- LIB
- LIBRARY
- LOOP
- MAIL
- MENU
- MODEM
- MUX
- NET
- NETWORK
- OUT
- OUTDIAL
- PACX12
- PACX24
- PACX96
- PAD
- PRIME
- PRIMOS
- PROD
- SALES
- SERVER
- SUN
- SUNOS
- SYS
- SYSTEM
- TELNET
- TYMNET
- UNIX
- VAX
- VMS
- X25
- X28
- XCON
- XGATE
- XMUX
-
- And anything else you can think of.
- First names are also fairly common.
-
- Operator Name Password
- ------------- --------
- TEST TEST, TESTUSER, USER, TESTER
- TESTUSER TEST, TESTUSER, USER, TESTER
- TESTER TEST, TESTUSER, USER, TESTER
- GANDALF GANDALF, SYSTEM, PACX, CONSOLE, SYS
- GUEST GUEST, VISITOR, USER
- SYSTEM SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
- CONSOLE
- USER USER, GUEST, TEST, VISITOR, GANDALF
- OPERATOR OPERATOR, SYSTEM, CONSOLE, GANDALF
- CONSOLE CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
- SYS SYS, SYSTEM, GANDALF, PACX, CONSOLE
-
-
- And again, try first names and ANYTHING you can think of.
- Getting into the console should be your main objective.
-
- ACCESS2590- The Access2590 is another Gandalf creation. While it is a
- server system, it is different in some respects to a PACX.
- The Starmaster generally only connects computers on a local
- or wide area network(they do connect to X.25 & IP addresses,
- but they *usually* don't), while the Access 2590 connects
- to local & wide area network services, X.25 address, and IP
- addresses with suprising versatility. The PACX is, however,
- in much wider distribution.
- It will usually have an initial herald screen, often letting
- you know that it is indeed an Access server made by Gandalf.
- If the operator wishes he can include a menu of services
- with their respective descriptions in this provided space.
- Then you will find yourself at a prompt, the default being
- "Access 2590 >". I haven't seen any sort of initial
- protection before you hit that prompt, but i'm betting it
- does exist, and it probably goes along the lines of the PACX.
- Follow the trend I set with the PACX and you should do fine.
- Anyways, the one thing I like so much more about the Access
- 2590 compared to the Starmaster is the command "show symbols"
- . That was one of the big problems from a hacking point of
- view with the PACX; it doesn't have a command available to
- show you the services. If you get console access on the PACX
- you can get a listing of services that way, but you simply
- cannot hack a console account everytime, and besides that
- often the owner will have turned the remote console access
- flag off.
- If the operator wanted to give you help with services he had
- to take the initiative himself and design a herald screen or
- implement a help service, and few do. But the "show symbols"
- on an Access will give you a listing of all the available
- "symbols", which is Gandalf's term for services. Connect to
- them with "c xxx" where "xxx" is of course the service.
- And yes, to you eager folks who have tasted the PACX
- console's power, the Access does have a console. Type "c
- console" to get to it.
- Follow the PACX's guidelines, and you'll do fine.
-
- PICK- The PICK system was created by Dick Pick(no joke), and is
- a fairly widespread system, there are a few of them out there
- on the major PSNs. I really dislike PICK, but for those of
- you wishing to try it yourself, it is a fairly easy hack.
- A normal PICK login prompt looks somewhat like;
- 07 JUN 1993 04:00:21 Logon please:
- Additional data can be entered in that line, and a header
- may be used above that. However, PICKs are usually
- recognizable by that logon prompt which will normally
- contain the date and time, as well as the 'Logon please:'.
- If you aren't sure, enter the username 'SYSPROG', in ALL CAPS
- , as PICK is case sensitive and SYSPROG will be in capitals.
- SYSPROG is the superuser(or as PICK calls it the 'Ultimate
- User') and is similar to root on a Unix; it must be present.
- PICK lets you know when you've entered an invalid Username,
- which is helpful when finding valid accounts.
- Experiment with the upper and lower case if you wish, but
- upper case is the norm.
- The people who make PICK like to think of PICK as more a
- DBMS than an OS, and it is often sold just as that. Because
- of that, you may find it on Unix, MPE, and Primos based
- systems among others.
- One last note, internal passwording is possible on the PICK,
- so don't be too suprised if you think you've found an
- unpassworded system only to be hit by a password before the
- internal prompt.
-
- COMMON ACCOUNTS
-
- Usernames Passwords
- --------- ---------
- 1
- ACC
- ACCT
- ACCTNAME
- ACCUMATH
- ACCUPLOT
- ACCUPLOT-DEMO ACCUPLOT, DEMO
- ARCHIVE
- AUDITOR
- AUDITORS
- BACKUP
- BATCH
- BLOCK-CONVERT
- BLOCK-PRINT
- COLDSTART
- COMBINATION
- COMM
- COMTEST
- CPA
- CPA.DOC CPA, DOC
- CPA.PROD CPA, PROD
- CTRL.GROUP CTRL, CONTROL
- DEMO
- DA
- DCG
- DEV
- DM DATA, MANAGER, MAN, MGR, DATAMGR, DATAMAN
- DOS
- ERRMSG
- EXCEPTIONAL
- EXECUTE-CONTROL
- EXPRESS.BATCH EXPRESS, BATCH
- FILE-SAVE FILESAVE, SAVE
- FILE-TRANSFER
- FINANCE
- FLUSHER
- FMS
- FMS.PROD FMS, PROD
- GAMES
- GAMES.DOS GAMES
- GENERAL
- INSTANT
- INSTANT.DOS INSTANT
- JOB
- KILL
- LEARN
- LEARN.DLR LEARN, DLR, LEARNDLR
- LOGON
- LOTUS
- LOTUS.DOS LOTUS
- MAIL.BOX MAIL
- MINDER
- MODEM-SECURITY
- MOTD.DATA MOTD
- NETCOM
- NET.OFF
- NETOFF
- NETUSER
- NETWORK
- NEWAC
- NOLOG
- OLD.USER
- ON-LINE-DIAGS DIAGS
- PERFECT-BKGRND
- POINTER-FILE
- PRICE.DOS PRICE
- PRICES.DOS PRICES
- PROCLIB PROC, LIBRARY, LIB
- PROD
- PROMCOR
- PROMIS-ARCHIVE PROMIS, ARCHIVE
- PROMIS-BKGRND PROMIS, BKGRND
- PROMO
- PWP
- QA QUALITY, CONTROL
- SCC.SYSPROG SCC, SYSPROG
- SCREENLIB
- SECURITY
- SET.PLF SET, PLF, PLFSET
- SL
- SPSYM
- STUDENT
- SUPPORT
- SYM.DOS SYM
- SYS
- SYS.DOC SYS
- SYSLIB SYSTEM, LIBRARY, SYS, LIB
- SYSPROG SYSTEM, PROGRAM, SYS, PROG, OPERATOR, DM
- SYSPROG-PL SYSPROG, PL
- SYSTEM-ERRORS
- TCL
- TEMP
- TEMP-SYSPROG TEMP, SYSPROG
- TEST
- TEST-BKGRND TEST
- TRAINING
- TRY.DOS TRY
- ULTICALC
- ULTILINK
- ULTIMATION
- UNIMAX
- WORDS
- WP
- WP.DOS WP
- WP42.DOS WP, WP42
- WP50.DOS WP, WP50
- WP51 WP, WP51
- WP51.DOS WP, WP51
- XES
-
- AOS/VS- AOS/VS is made by Data General Corporation(DGC), and is in
- my opinion the worst operating system i've seen yet.
- But, in the quest of knowledge, and to broaden your computer
- horizons, i suggest that you try to hack even this system,
- for what it's worth.
- The AOS/VS will usually readily identify itself with a
- banner such as;
- (yes, i'm overstepping my margin, i apologize)
-
- **** AOS/VS Rev 7.62.00.00 / Press NEW-LINE to begin logging on ****
-
- AOS/VS 7.62.00.00 / EXEC-32 7.62.00.00 11-Jun-93 0:27:31 @VCON1
-
- Username:
-
- The username prompt looks deceivingly like a VMS, but it is
- not, and you can be sure by entering garbage for the username
- and password. The AOS/VS will reply;
- Invalid username - password pair
- AOS/VS will not let you know when you've entered an incorrect
- username.
- And a standard system will let you have 5 tries at a username/
- password combination, but after that it gives this annoying
- message;
- Too many attempts, console locking for 10 seconds
- Having the system lock for 10 seconds does really nothing to
- the hacker, except slow brute forcing down a small bit(10
- seconds).
- Anyways, once inside 'HELP' will give you a set of help files
- which i didn't enjoy too much, and 'WHO' will list the users
- online.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- guest
- op operator, op
- sysmgt sys, mgt, system, man, mgr, manager
- test
- user
-
- RSTS- Probably the oldest OS that is still out there is RSTS. RSTS
- was a very common OS a decade or so ago, but is now nearing
- extinction. However, there are still a few out there on PSNs,
- and thus you might want to attempt to hack in.
- The RSTS will usually identify itself like;
- RSTS V9.7-08 93.06.10 02:36
- User:
- Before attempting to hack, try the SYSTAT command. It is
- likely it will be disabled, but it is worth a try.
- RSTS will tell you if the ID you've entered is incorrect with
- the error message;
- ?Invalid entry - try again
- The UIDs are in the format xxx,yyy , where x and y are digits.
- Just guess at UIDs until you hit one with a password.
- Also, the IDs will generally not go above 255 in both the x
- and y spots(ie: 255,255 is generally the highest ID).
-
- COMMON ACCOUNTS
-
- User ID Password
- ------- --------
- 1,2 SYSLIB
-
- WNT- I really don't know much about Windows NT, mostly having to
- do with the fact that it was just released a little while ago
- and I have not seen it in action to this date. I don't know
- at what time in the future it will become widespread, but for
- you future hackers I did a little research and came up with
- the two manufacturer defaults; administrator and guest. Both
- come unpassworded.. administrator is the equivalent to root
- on a Unix, and guest is just as you'd expect .. a low level
- guest account. Interestingly enough, in the manuals I saw WNT
- sysadmins were encouraged to keep the guest account...
- unpassworded at that! Highly amusing.. let's see how long that
- lasts! Anyways..
- Oh yeah.. case sensitive, too.. I'm pretty sure it is
- lowercase, but it is possible that the first letter is
- capitalized. Remember that when attempting to brute force new
- accounts. Oh, and keep in mind possible accounts such as
- "test" and "field" and the such.
-
- COMMON ACCOUNTS
-
- Username
- --------
-
- administrator
- guest
-
- NETWARE- Novell Netware is the most common PC LAN software and is a
- popular among high-schools. The internal (and external for
- that matter) security is poor.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- admin operator, supervisor, sysadm
- backup
- guest visitor, user
- netware
- novell netware
- public
- remote
- server
- staff
- supervisor admin, operator, sysadm, supervis, manager
- system1
- tape backup
- test testuser
- user
- visitor guest
-
- Sys75/85- AT&T's System75/85 have made a big splash in recent months
- despite their being around for years previous.. mostly due
- to codez kids discovering the PBX functions.
- Anyways, the hype has pretty much died down so it is probably
- safe to post the defaults. If you don't like my doing this,
- suck yourself. Anyone with access to this file probably has
- them by now anyways. And if not, all the better. Free
- information has always been one of our primary goals, and I
- don't intend to change that for some insecure pseudo-hackers.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- browse looker
- craft crftpw, craftpw
- cust custpw
- field support
- inads indspw, inadspw
- init initpw
- rcust rcustpw
-
- AS400- Another OS that was only really in use before my time, AS-400
- is IBM made. I pulled this from the old UPT messages, thanks
- to anybody who contributed.
- It should in fact identify itself as an AS-400 at login time.
- I'm unsure of the case-sensativity of the characters.. i'll
- enter them as lowercase, but if unsuccessful use caps.
-
- COMMON ACCOUNTS
-
- Username
- --------
- qsecofr
- qsysopr
- quser
- sedacm
- sysopr
- user
-
- TSO- An IBM product, TSO can be found stand alone, but is commonly
- found off an ISM.
- Upon connect you should see a login prompt that looks like:
- IKJ56700A ENTER USERID-
- Or something close.
- It will tell you if the username entered is incorrect:
- IKJ5642OI USERID xxx NOT AUTHORIZED TO USE TSO
- IKJ56429A REENTER-
- Occasionally some of the accounts will have the STC attribute
- and can not be used for remote login.
-
- COMMON ACCOUNTS
-
- Username Password
- -------- --------
- admin adm, sysadm, op
- guest
- init
- maint
- systest test
- test1 test
- tso
-
-
- BRUTE FORCE
- ===========
- -----------
-
- Passwords
- =========
-
- Occasionally you will find yourself in a position where you wish to
- penetrate a system, but defaults are taken off and social engineering is not
- possible.
- The dedicated hacker then begins the tedious process of trying password
- after password, hoping to crowbar his way into the system. Thus the term
- 'Brute Force' was born, aptly describing this process.
- Brute force is the absolute ugliest way of obtaining an account, but is
- is often effective. It is ugly for a number of reasons, having to do with the
- fact that you will have to call the system hundreds of times if the account is
- not easily brute forced.
- However, first i will explain a modified form of brute force; intelligent
- brute force. In this process, the hacker tries the users first name, as that
- is the most common password of all, and a database of 20-100 common passwords.
- The difference between this and the normal brute forcing is you cut your
- time down considerably, but your chances of getting in go down as well.
- Normal brute forcing is rarely done nowadays; the greats of yesterday
- would spend 6 hours at a sitting trying passwords, but people nowadays seem to
- think 5 minutes is sufficient. Ugh.
- If standard brute forcing is done, it is accomplished with automation,
- usually. Meaning the hacker will set up a program or a script file to spew out
- dictionary passwords for him, then go to the movies or whatever. Obviously,
- any way you do it, standard brute forcing is fairly dangerous. A sysadmin is
- more likely to notice you trying a username/password 2000 times than 50. If
- you choose to do automated brute forcing, it might be a good idea to set up
- a hacked system to do it for you, such as a procured Unix. I would not,
- however, suggest wasting the powers of a Cray on such a menial task as brute
- force. You can only go as fast as the host system will let you. The danger
- in this is obvious, you will have to be connected to the remote system for
- a long time, leaving you wide open for a trace. It is up to you.
- And, of course, brute forcing requires a username. If you don't have a
- username, you are probably out of luck.
- One thing you should definetly do is make a list of first names, and make
- it fairly complete. Buy/steal a baby names book or look inside your phone
- book and copy down the more commmon names on to a piece of paper or into a
- file. Other than first names, husband/wife, boyfriend/girlfriend and
- childs names are the most common passwords.
- Ok, here are the basics to intelligent brute force hacking;
- 1. try the users first name
- 2. try your list of first names, male and female
- 2. try the users first name, with a lone digit(1 to 9) after the
- username
- 3. try the users first name, with a lone digit(1 to 9) after the
- username
- 4. try the users first name, with a letter appended to the end(A to Z)
- 5. try anything related to the system you are on. If you are on a
- VAX running VMS on the Datapac PSN, try VAX, VMS, Datapac, X25, etc
- 6. try anything related to the company/service the system is owned by.
- if the user is on a system owned by the Pepsi Cola company, try
- Pepsi, Cola, Pepsico, etc.
- 7. finally, try passwords from your list of common passwords. your
- list of common passwords should not be above 200 words.
- The most popular passwords are;
- password secret money sex smoke beer x25 system
- hello cpu aaa abc fuck shit
- Add on popular passwords to that as you see fit.
- Remember; most passwords are picked spontaneously, on whatever
- enters the users mind at that time(you know the feeling, i bet).
- Attempt to get into the users mind and environment, to think what
- he would think. If you can't do that, just try whatever comes to
- your mind, you'll get the hang of it.
-
- Brute Forcing User Names
- ========================
-
- A different form of brute force is that when you need a username to
- hack passwords from. In order to guess a valid username, you must be on a
- system that informs you when your username is invalid; thus VMS and Unix are
- out of the question.
- There are two types of usernames(by my definition); user and system.
- The user usernames are the standard user's usernames. Examples would be
- John, Smith, JMS, JSmith, and JohnS.
- The system usernames are special usernames used by the system operators
- to perform various functions, such as maintenance and testing. Since these
- usernames are not owned by actual people(usually), they are given a name which
- corresponds to their function.
- Guessing either type is usually fairly easy.
- User usernames are standardly in one of 2 formats; first name or last name
- the more common format being first name. Less common formats are initials,
- first initial/last name, and first name/last initial. Occasionally the
- username formats will have nothing to do with names at all, and will instead
- be 6 or 8 digit numbers. Have fun.
- The users of a system will almost always have the same format as
- each other. When you guess one, guessing more shouldn't be too hard.
- For first names, again consult the list you made from the baby names book.
- For last names, construct a list of the most common last names, ideally
- out of the phone book, but if you are too lazy your mind will do fine. SMITH
- and JONES are the most common non-foreign names.
- For initials, use common sense. Guess at 3 letter combinations, and use
- sensible formats. Meaning don't use XYZ as a rule, go for JMS, PSJ, etc, to
- follow along with common first names and last names.
- If you are getting no luck whatsoever, try switching your case(ie: from
- all lower case to all upper case), the system might be case sensitive.
- Usually guessing system names shouldn't be necessary; I gave a default
- list for all the major systems. But if you run across a system not listed, you
- will want to discover defaults of your own. Use common sense, follow along
- with the name of the new OS and utilities that would fit with that name.
- Attempt to find out the username restrictions for that system, if usernames
- have to be 6 characters long, try only 6 character user names.
- And finally, here is a list of common defaults(they are capitalized for
- convienience, but as a rule use lower case);
- OPERATOR SYSOP OP OPER MANAGER SYSMAN SYSMGR MGR MAN ADMIN
- SYSADMIN ADM SYSADM BOSS MAIL SYSTEM SYS SYS1 MAINT SYSMAINT
- TEST TESTER TESTUSER USER USR REMOTE PUB PUBLIC GUEST VISITOR
- STUDENT DEMO TOUR NEWS HELP MGT SYSMGT SYSPROG PROD SALES
- MARKET LIB LIBRARY FILES FILEMAN NET NETWORK NETMAN NETMGR
- RJE DOS GAMES INFO SETUP STARTUP CONTROL CONFIG DIAG SYSDIAG
- STAT SYSDIAGS DIAGS BATCH SUPRVISR SYSLIB MONITOR UTILITY
- UTILS OFFICE CORP SUPPORT SERVICE FIELD CUST SECURITY WORD
- DATABASE BACKUP FRIEND DEFAULT FINANCE ACCOUNT HOST ANON
- SYSTEST FAX INIT INADS SETUP
-
- Brute Forcing Services
- ======================
-
- There is also the time when you are on a server system, and you need
- places to go. You will surely be told if the service you've entered is
- incorrect, so just try things that come to mind, and the following list;
- (the server may be case sensitive..use upper or lower case as you wish)
- (NOTE: Try digits(1 +) and letters(A-Z) also)
- SERVER NETWORK NET LINK LAN WAN MAN CONNECT LOG LOGIN HELP DIAL
- OUT OUTDIAL DIALOUT MODEM MODEMOUT INTERNET TELNET PAD X25 X28 FTP
- SYSTEM SYS SYS1 SYSTEM1 UNIX VAX VMS HP CONSOLE INFO CMDS LIST
- SERVICES SERVICE SERVICE1 COMP COMPUTER CPU CHANNEL CHANNEL1 CH1
- CH01 GO DO ? LOG ID USERS SHOW WHO PORT1 PORT NODE1 NODE LINK1
- DISPLAY CONFIG CONTROL DIAGS SYSDIAGS DIAG SYSDIAG HELLO EMAIL
- MAIL SET DEFINE PARAMS PRINT PHONE PHONES SESSION SESSION1 BEGIN
- INIT CUST SERVICE SUPPORT BUSINESS ACCT ACCOUNT FINANCE SALES
- BUFFER QUEUE STAT STATS SYSINFO SYSTAT FTP ACCESS DISK LIB SYSLIB
- LIBRARY FILES BBS LOOP TEST SEARCH MACRO CALL COMMANDS TYPE FIND
- ASK QUERY JOIN ATTACH JOB REMOTE COM1 COM CALLER LOGGER MACHINE
- BULLITEN CLUSTER RUN HELLO PAYROLL DEC
-
- SOCIAL ENGINEERING
- ==================
- ------------------
-
- While I am in no way going to go indepth on SE(social engineering) at this
- point, i will explain the premise of SE to those new to it.
- Social engineering can be defined any number of ways, but my definition
- goes along the lines of; "Misrepresentation of oneself in a verbal manner to
- another person in order to obtain knowledge that is otherwise unattainable."
- Which in itself is a nice way of putting "manipulation, lying and general
- bullshitting".
- Social engineering is almost always done over the phone.
- I'll give an example. The hacker needs information, such as an account,
- which he cannot get by simple hacking. He calls up the company that owns the
- system he wishes to penetrate, and tells them he is Joe Blow of the Computer
- Fixing Company, and he is supposed to fix their computers, or test them
- remotely. But gosh, somebody screwed up and he doesn't have an account. Could
- the nice lady give him one so he can do his job and make everybody happy?
- See the idea? Misrepresentation of the truth; pretending to be someone you
- aren't.
- If you are skeptical, you shouldn't be. SE is tried and true, due to the
- fact that any company's biggest security leak is their employees. A company
- can design a system with 20 passwords, but if an uncaring employee unwittingly
- supplies a hacker with all of these passwords, the game is over.
- You *must* have the voice for it. If you sound like a 12 year old, you
- aren't going to get shit. If you can't help it, there are telephone-voice
- changers(which any SE practicer should have anyways) that will do it for you.
- If the person wishes to contact higher authority(who will probably suspect
- somethings up), get mad. Don't go into a rage, but do get angry. Explain that
- you have a job to do, and be persuasive.
- I won't go more into SE, there are tons of text files out there on it
- already. Just remember to keep calm, have a back up plan, and it is a good
- idea to have the script on paper, and practice it a bit before hand. If you
- sound natural and authorative, you will get whatever you want.
- And practice makes perfect.
-
- TRASHING
- ========
- --------
-
- Trashing is another thing i will not go too indepth on, but i will provide
- a very quick overview.
- Trashing is the name given to the process of stealing a companies trash,
- then rooting through it and saving the valuable information.
- Trashing is practiced most often on the various RBOCs, but if you are
- attempting to hack a system local to you, it might be a good idea to go
- trashing for a few weeks, you might find a printout or a scrap of paper with
- a dialup or username and password written on it.
-
- ACRONYMS
- ========
- --------
-
- This is a basic list of H/P acronyms I've compiled from various sources..
- it should be big enough to serve as an easy reference without being incredibly
- cumbersome
-
- ABSBH: Average Busy Season Busy Hour
- AC: Area code
- ACC: Automatic Communications Control
- ACC: Asynchronous Communications Center
- ACD: Automatic Call Distributor
- ACE: Automatic Calling Equipment
- ACF: Advanced Communications Functions
- ACN: Area Code + Number
- ADPCM: Adaptive Differential Pulse Code Modulation
- AIS: Automatic Intercept System
- ALFE: Analog Line Front End
- ALRU: Automatic Line Record Update
- AM: Account Manager
- AM: Access Module
- AM: Amplitude Modulation
- AMA: Automatic Message Accounting
- AMSAT: American Satellite
- AN: Associated Number
- ANI: Automatic Number Identification
- ANXUR: Analyzer for Networks with Extended Routing
- AOSS: Auxiliary Operator Services System
- AP: Attached Processor
- ARC: Automatic Response Control
- ARP: Address Resolution Protocol
- ARPA: Advanced Reasearch Projects Agency
- ARS: Automatic Response System
- ARSB: Automated Repair Service Bureau
- AT: Access Tandem
- ATB: All Trunks Busy
- ATH: Abbreviated Trouble History
- ATM: Automated Teller Machine
- ATM: Asynchronous Transfer Mode
- AT&T: American Telegraph and Telephone Company
- AVD: Alternate Voice Data
- BCD: Binary Coded Decimal
- BCUG: Bilateral CUG
- BELLCORE: Bell Communications Research
- BGP: Border Gateway Protocol
- BHC: Busy Hour Calls
- BLV: Busy Line Verification
- BOC: Bell Operating Company
- BOR: Basic Output Report
- BOS: Business Office Supervisor
- BSC: Binary Synchronous Module
- BSCM: Bisynchronous Communications Module
- BSOC: Bell Systems Operating Company
- CA: Cable
- CADV: Combined Alternate Data/Voice
- CAMA: Centralized Automatic Message Accounting
- CATLAS Centralized Automatic Trouble Locating & Analysis System
- CAU: Controlled Access Unit
- CAVD: Combined Alternated Voice/Data
- CBC Cipher Block Chaining
- CBS: Cross Bar Switching
- CBX: Computerized Branch Exchange
- CBX: Computerized Business Exchange
- CC: Calling Card
- CC: Common Control
- CC: Central Control
- CC: Country Code
- CCC: Central Control Complex
- CCC: Clear Channel Capability
- CCC: Central Control Computer
- CCIS: Common Channel Interoffice Signalling
- CCITT: International Telephone and Telegraph Consultative Committee
- CCM: Customer Control Management
- CCNC: Common Channel Network Controller
- CCNC: Computer Communications Network Center
- CCS: Common Channel Signalling
- CCSA: Common Control Switching Arrangement
- CCSA: Common Central Switching Arrangement
- CCSS: Common Channel Signalling System
- CCT: Central Control Terminal
- CCTAC: Computer Communications Trouble Analysis Center
- CDA: Call Data Accumulator
- CDA: Crash Dump Analyzer
- CDA: Coin Detection and Announcement
- CDAR: Customer Dialed Account Recording
- CDC: Control Data Corporation
- CDI: Circle Digit Identification
- CDO: Community Dial Office
- CDPR: Customer Dial Pulse Receiver
- CDR: Call Dial Recording
- CDS: Cicuit Design System
- CEF: Cable Entrance Facility
- CERT: Computer Emergency Response Team
- CF: Coin First
- CGN: Concentrator Group Number
- CI: Cluster Interconnect
- CIC: Carrier Identification Codes
- CICS: Customer Information Control System
- CID: Caller ID
- CII: Call Identity Index
- CIS: Customer Intercept Service
- CISC: Complex Instruction Set Computing
- CLASS: Custom Local Area Signalling Service
- CLASS: Centralized Local Area Selective Signalling
- CLDN: Calling Line Directory Number
- CLEI: Common Language Equipment Identification
- CLI: Calling Line Identification
- CLID: Calling Line Identification
- CLLI: Common Language Location Indentifier
- CLNP: Connectionless Network Protocol
- CMAC: Centralized Maintenance and Administration Center
- CMC: Construction Maintenance Center
- CMDF: Combined Main Distributing Frame
- CMDS: Centralized Message Data System
- CMIP: Common Management Information Protocol
- CMS: Call Management System
- CMS: Conversational Monitoring System
- CMS: Circuit Maintenance System
- CMS: Communications Management Subsystem
- CN/A: Customer Name/Address
- CNA: Communications Network Application
- CNAB: Customer Name Address Bureau
- CNCC: Customer Network Control Center
- CNI: Common Network Interface
- CNS: Complimentary Network Service
- CO: Central Office
- COC: Central Office Code
- COCOT: Customer Owned Coin Operated Telephone
- CODCF: Central Office Data Connecting Facility
- COE: Central Office Equipment
- COEES: Central Office Equipmet Engineering System
- COER: Centarl Office Equipment Reports
- COLT: Central Office Line Tester
- COMSAT: Communications Satellite
- COMSEC: Communications Security
- COMSTAR: Common System for Technical Analysis & Reporting
- CONS: Connection-Oriented Network Service
- CONTAC: Central Office Network Access
- COS: Class of Service
- COSMIC: Common Systems Main Inter-Connection
- COR: Class Of Restriction
- COSMOS: Computerized System For Mainframe Operations
- COT Central Office Terminal
- CP: Control Program
- CPBXI: Computer Private Branch Exchange Interface
- CPC: Circuit Provisioning Center
- CPD: Central Pulse Distributor
- CPMP: Carrier Performance Measurement Plan
- CRAS: Cable Repair Administrative System
- CRC: Customer Record Center
- CRC: Customer Return Center
- CREG: Concentrated Range Extension & Gain
- CRG: Central Resource Group
- CRIS: Customer Record Information System
- CRS: Centralized Results System
- CRSAB: Centralized Repair Service Answering Bureau
- CRT: Cathode Ray Tube
- CRTC: Canadian Radio-Television and Telecommunications Commission
- CSA: Carrier Servicing Area
- CSAR: Centralized System for Analysis and Reporting
- CSC: Cell Site Controller
- CSC: Customer Support Center
- CSDC: Circuit Switch Digital Capability
- CSP: Coin Sent Paid
- CSMA/CD: Carrier Sense Multiple Access/Collission Detection
- CSR: Customer Service Records
- CSS: Computer Special Systems
- CSS: Computer Sub-System
- CSU: Channel Service Unit
- CT: Current Transformer
- CTC: Channel Termination Charge
- CTC: Central Test Center
- CTM: Contac Trunk Module
- CTMS: Carrier Transmission Measuring System
- CTO: Call Transfer Outside
- CTSS: Compatible Time Sharing System
- CTSS: Cray Time Sharing System
- CTTN: Cable Trunk Ticket Number
- CTTY: Console TeleType
- CU: Control Unit
- CU: Customer Unit
- CUG: Closed User Group
- CWC: City-Wide Centrex
- DA: Directory Assistance
- DACC: Directort Assistance Call Completion
- DAA: Digital Access Arrangements
- DACS: Digital Access and Cross-connect System
- DACS: Directory Assistance Charging System
- DAIS: Distributed Automatic Intercept System
- DAL: Dedicated Access Line
- DAO: Directory Assistance Operator
- DAP: Data Access Protocol
- DARC: Division Alarm Recording Center
- DARPA: Department of Defense Advanced Research Projects Agency
- DARU: Distributed Automatic Response Unit
- DAS: Device Access Software
- DAS: Directory Assistance System
- DAS: Distributor And Scanner
- DAS: Dual Attachment Station
- DASD: Direct Access Storage Device
- DBA: Data Base Administrator
- DBA: Digital Business Architecture
- DBAC: Data Base Administration Center
- DBAS: Data Base Administration System
- DBC: Digital Business Center
- DBM: Database Manager
- DBMS: Data Base Management System
- DBS: Duplex Bus Selector
- DCA: Defense Communications Agency
- DCC: Data Country Code
- DCC: Data Collection Computer
- DCE: Data Circuit-Terminating Equipment
- DCE: Data Communicating Equipment
- DCL: Digital Computer Language
- DCLU: Digital Carrier Line Unit
- DCM: Digital Carrier Module
- DCMS: Distributed Call Measurement System
- DCMU: Digital Concentrator Measurement Unit
- DCO-CS: Digital Central Office-Carrier Switch
- DCP: Duplex Central Processor
- DCS: Digital Cross-Connect System
- DCSS: Discontiguous Shared Segments
- DCSS: Digital Customized Support Services
- DCT: Digital Carrier Trunk
- DDCMP: Digital Data Communications Message Protocol
- DDD: Direct Distance Dialing
- DDN: Defense Data Network
- DDR: Datapac Design Request
- DDS: Digital Data Service
- DDS: Digital Data System
- DDS: Dataphone Digital Service
- DEC: Digital Equipment Corporation
- DES: Data Encryption Standard
- DF: Distributing Frame
- DGC: Data General Corporation
- DH: Distant Host
- DID: Direct Inward Dialing
- DIMA: Data Information Management Architecture
- DINS: Digital Information Network Service
- DIS: Datapac Information Service
- DISA: Direct Inward System Access
- DLC: Digital Loop Carrier
- DLS: Dial Line Service
- DM: Demultiplexer
- DMA: Direct Memory Access
- DN: Directory Numbers
- DNA: Datapac Network Address
- DNA: Digital Named Accounts
- DNA: Digital Network Architecture
- DNIC: Data Network Identifier Code
- DNR: Dialed Number Recorder
- DNS: Domain Name Service
- DNS: Domain Name System
- DOCS: Display Operator Console System
- DOD: Department Of Defense
- DOM: District Operations Manager
- DPSA: Datapac Serving Areas
- DPTX: Distributed Processing Terminal Executive
- DSC: Data Stream Compatibility
- DSI: Data Subscriber Interface
- DSL: Digital Subscriber Line
- DSN: Digital Services Network
- DSU: Data Service Unit
- DSU: Digital Service Unit
- DSX: Digital Signal Cross-Connect
- DTC: Digital Trunk Controller
- DTE: Data Terminal Equipment
- DTF: Dial Tone First
- DTG: Direct Trunk Group
- DTI: Digital Trunk Interface
- DTIF: Digital Tabular Interchange Format
- DTMF: Dual Tone Multi-Frequency
- DTN: Digital Telephone Network
- DTST: Dial Tone Speed Test
- DVM: Data Voice Multiplexor
- EAEO: Equal Access End Office
- EA-MF: Equal Access-Multi Frequency
- EBDI: Electronic Business Data Interchange
- EC: Exchange Carrier
- ECC: Enter Cable Change
- EDC: Engineering Data Center
- EDI: Electronic Data Interchange
- EE: End to End Signaling
- EEDP: Expanded Electronic Tandem Switching Dialing Plan
- EGP: Exterior Gateway Protocol
- EIES: Electronic Information Exchange System
- EIU: Extended Interface Unit
- EKTS: Electonic Key Telephone Service
- ELDS: Exchange Line Data Service
- EMA: Enterprise Management Architecture
- EO: End Office
- EOTT: End Office Toll Trunking
- EREP: Environmental Recording Editing and Printing
- ESA: Emergency Stand Alone
- ESB: Emergency Service Bureau
- ESN: Electronic Serial Number
- ESP: Enhanced Service Providers
- ESS: Electronic Switching System
- ESVN: Executive Secure Voice Network
- ETS: Electronic Tandem Switching
- EWS: Early Warning System
- FAC: Feature Access Code
- FAM: File Access Manager
- FCC: Federal Communications Commission
- FCO: Field Change Order
- FDDI: Fiber Distributed Data Interface
- FDM: Frequency Division Multiplexing
- FDP: Field Development Program
- FEP: Front-End Processor
- FEV: Far End Voice
- FIFO: First In First Out
- FIPS: Federal Information Procedure Standard
- FM: Frequency Modulation
- FMAP: Field Manufacturing Automated Process
- FMIC: Field Manufacturing Information Center
- FOA: First Office Application
- FOIMS: Field Office Information Management System
- FPB: Fast Packet Bus
- FRL: Facilities Restriction Level
- FRS: Flexible Route Selection
- FRU: Field Replaceable Unit
- FS: Field Service
- FSK: Frequency Shift Keying
- FT: Field Test
- FTG: Final Trunk Group
- FTP: File Transfer Protocol
- FTPD: File Transfer Protocol Daemon
- FX: Foreign Exchange
- GAB: Group Access Bridging
- GCS: Group Control System
- GECOS: General Electric Comprehensive Operating System
- GGP: Gateway-to-Gateway Protocol
- GOD: Global Out Dial
- GPS: Global Positioning System
- GRINDER: Graphical Interactive Network Designer
- GSA: General Services Administration
- GSB: General Systems Business
- GTE: General Telephone
- HCDS: High Capacity Digital Service
- HDLC: High Level Data Link Control
- HLI: High-speed LAN Interconnect
- HDSC: High-density Signal Carrier
- HPO: High Performance Option
- HUTG: High Usage Trunk Group
- HZ: Hertz
- IBM: International Business Machines
- IBN: Integrated Business Network
- IC: Intercity Carrier
- IC: InterLATA Carrier
- IC: Interexchange Carrier
- ICAN: Individual Circuit Analysis Plan
- ICH: International Call Handling
- ICM: Integrated Call Management
- ICMP: Internet Control Message Protocol
- ICN: Interconnecting Network
- ICPOT: Interexchange Carrier-Point of Termination
- ICUG: International Closed User Group
- ICVT: Incoming Verification Trunk
- IDA: Integrated Digital Access
- IDCI: Interim Defined Central Office Interface
- IDDD: International Direct Distance Dialing
- IDLC: Integrated Digital Loop Carrier
- IDN: Integrated Digital Networks
- IEC: Interexchange Carrier
- IMP: Internet Message Processor
- IMS: Information Management Systems
- IMS: Integrated Management Systems
- IMTS: Improved Mobile Telephone Service
- INAP: Intelligent Network Access Point
- INS: Information Network System
- INTT: Incoming No Test Trunks
- INWATS: Inward Wide Area Telecommunications Service
- IOC: Interoffice Channel
- IOC: Input/Output Controller
- IOCC: International Overseas Completion Center
- IP: Intermediate Point
- IP: Internet Protocol
- IPCF: Inter-Program Communication Facility
- IPCH: Initial Paging Channel
- IPCS: Interactive Problem Control System
- IPL: Initial Program Load
- IPLI: Internet Private Line Interface
- IPLS: InterLATA Private Line Services
- IPSS: International Packet-Switched Service
- IRC: Internet Relay Chat
- IRC: International Record Carrier
- ISC: Inter-Nation Switching Center
- ISDN: Integrated Services Digital Network
- ISIS: Investigative Support Information System
- ISO: International Standards Organization
- ISSN: Integrated Special Services Network
- ISU: Integrated Service Unit
- ISWS: Internal Software Services
- ITDM: Intelligent Time Division Multiplexer
- ITI: Interactive Terminal Interface
- ITS: Interactive Terminal Support
- ITS: Incompatible Time-Sharing System
- ITT: International Telephone and Telegraph
- IVP: Installation Verification Program
- IX: Interactive Executive
- IXC: Interexchange Carrier
- JCL: Job Control Language
- JES: Job Entry System
- KP: Key Pulse
- LAC: Loop Assignment Office
- LADS: Local Area Data Service
- LADT: Local Area Data Transport
- LAM: Lobe Access Module
- LAN: Local Area Network
- LAP: Link Access Protocol
- LAPB: Link Access Protocol Balanced
- LAPS: Link Access Procedure
- LASS: Local Area Signalling Service
- LASS: Local Area Switching Service
- LAST: Local Area System Transport
- LAT: Local Area Transport
- LATA: Local Access Transport Area
- LAVC: Local Area VAX Cluster
- LBS: Load Balance System
- LCDN: Last Call Directory Number
- LCM: Line Concentrating Module
- LCN: Logical Channel
- LD: Long Distance
- LDEV: Logical Device
- LDM: Limited Distance Modem
- LDS: Local Digital Switch
- LEBC: Low End Business Center
- LEC: Local Exchange Carrier
- LEN: Low End Networks
- LENCL: Line Equipment Number Class
- LGC: Line Group Controller
- LH: Local Host
- LIFO: Last In First Out
- LIP: Large Internet Protocol
- LLC: Logical Link Control
- LM: Line Module
- LMOS: Loop Maintenance and Operations System
- LSI: Large Scale Integration
- LTC: Line Trunk Controller
- LU: Local Use
- LVM: Line Verification Module
- MAC: Media Access Control
- MAC: Message Authentication
- MAN: Metropolitan Area Network
- MAP: Maintenance and Administration Position
- MAP: Manufacturing Automation Protocol
- MAT: Multi-Access Trunk
- MAU: Multistation Access Unit
- MBU: Manufacturing Business Unit
- MCA: Micro Channel Architecture
- MCI: Microwave Communications, Inc.
- MCP: Master Control Program
- MCT: Manufacturing Cycle Time
- MCU: Multi Chip Unit
- MDR: Message Detail Record
- MDS: Message Design Systems
- MDU: Marker Decoder Unit
- MF: Multi-Frequency
- MFD: Main Distributing Frame
- MFR: Mult-Frequency Receivers
- MFT: Metallic Facility Terminal
- MHZ: Mega-Hertz
- MIB: Management Information Base
- MIC: Management Information Center
- MIF: Master Item File
- MIS: Management Information Systems
- MJU: MultiPoint Junction Unit
- MLHG: Multiline Hunt Group
- MLT: Mechanized Loop Testing
- MNS: Message Network Basis
- MOP: Maintenance Operation Protocol
- MP: Multi-Processor
- MPL: Multischedule Private Line
- MPPD: Multi-Purpose Peripheral Device
- MRAA: Meter Reading Access Arrangement
- MSCP: Mass Storage Control Protocol
- MSI: Medium Scale Integration
- MTBF: Mean Time Between Failure
- MTS: Message Telecommunication Service
- MTS: Message Telephone Service
- MTS: Message Transport Service
- MTS: Mobile Telephone Service
- MTSO: Mobile Telecommunications Switching Office
- MTU: Maintenence Termination Unit
- MUX: Multiplexer
- MVS: Multiple Virutal Storage
- MWI: Message Waiting Indicator
- NAM: Number Assignment Module
- NAS: Network Application Support
- NC: Network Channel
- NCCF: Network Communications Control Facility
- NCI: Network Channel Interface
- NCIC: National Crime Information Computer
- NCP: Network Control Program
- NCS: Network Computing System
- NCTE: Network Channel Terminating Equipment
- NDA: Network Delivery Access
- NDC: Network Data Collection
- NDIS: Network Device Interface Specification
- NDNC: National Data Network Centre
- NDS: Network Data System
- NDU: Network Device Utility
- NEBS: Network Equipment Building System
- NECA: National Exchange Carriers Association
- NFS: Network File Sharing
- NFS: Network File System
- NFT: Network File Transfer
- NI: Network Interconnect
- NI: Network Interface
- NIC: Network Information Center
- NIC: Network Interface Card
- NJE: Network Job Entry
- NLM: Netware Loadable Modules
- NLM: Network Loadable Modules
- NM: Network Module
- NMR: Normal Mode Rejection
- NOS: Network Operating System
- NPA: Numbering Plan Area
- NPA: Network Performance Analyzer
- NSF: National Science Foundation
- NSP: Network Services Protocol
- NTE: Network Terminal Equipment
- NUA: Network User Address
- NUI: Network User Identifier
- OC: Operator Centralization
- OCC: Other Common Carrier
- OD: Out Dial
- ODA: Office Document Architecture
- ODDB: Office Dependent Data Base
- ODI: Open Data Interface
- OGT: Out-Going Trunk
- OGVT: Out-Going Verification Trunk
- OIS: Office Information Systems
- OLTP: On-Line Transaction Processing
- ONI: Operator Number Identification
- OPCR: Operator Actions Program
- OPM: Outside Plant Module
- OPM: Outage Performance Monitoring
- OR: Originating Register
- OS: Operating System
- OSI: Open Systems Interconnection
- OSL: Open System Location
- OSS: Operator Services System
- OST: Originating Station Treatment
- OTC: Operating Telephone Company
- OTR: Operational Trouble Report
- OUTWATS: Outward Wide Area Telecommunications Service
- PABX: Private Automated Branch Exchange
- PACT: Prefix Access Code Translator
- PAD: Packet Assembler/Disassembler
- PADSX: Partially Automated Digital Signal Cross-Connect
- PAM: Pulse Amplitude Modulation
- PAX: Private Automatic Exchange
- PBU: Product Business Unit
- PBX: Private Branch Exchange
- PC: Primary Center
- PCM: Pulse Code Modulation
- PCP: PC Pursuit
- PFM: Pulse Frequency Modulation
- PGA: Pin Grid Array
- PIN: Personal Identification Number
- PLA: Programmable Logic Array
- PLD: Programmable Logic Device
- PLS: Programmable Logic Sequencer
- PM: Phase Modulation
- PM: Peripheral Module
- PMAC: Peripheral Module Access Controller
- PMR: Poor Mans Routing
- PNC: Primenet Node Controller
- POC: Point of Contact
- POF: Programmable Operator Facility
- POP: Point of Presence
- POS: Point Of Sale
- POT: Point of Termination
- POTS: Plain Old Telephone Service
- PPN: Project Program Number
- PPP: Point to Point Protocol
- PPS: Public Packet Switching
- PPSN: Public Packet Switched Network
- PSAP: Public Safety Answering Point
- PSDC: Public Switched Digital Capability
- PSDCN: Packet-Switched Data Communication Network
- PSDN: Packet-Switched Data Network
- PSDS: Public Switched Digital Service
- PSN: Packet-Switched Network
- PSS: Packet-Switched Service
- PSW: Program Status Word
- PTE: Packet Transport Equipment
- PTS: Position and Trunk Scanner
- PTT: Postal Telephone & Telegraph
- PVC: Permanent Virtual Call
- PVN: Private Virtual Network
- PWC: Primary Wiring Center
- QPSK: Quadrature Phase-Shift Keying
- RACF: Resource Access Control Facility
- RAO: Revenue Accounting Office
- RARP: Reverse Address Resolution Protocol
- RBG: Realtime Business Group
- RBOC: Regional Bell Operating Company
- RC: Rate Center
- RC: Regional Center
- RDB: Relational Database
- RDSN: Region Digital Switched Network
- RDT: Restricted Data Transmissions
- RDT: Remote Digital Terminal
- REP: Reperatory Dialing
- REXX: Restructured Extended Executer Language
- RFC: Request For Comments
- RIP: Routing Information Protocol
- RIS: Remote Installation Service
- RISC: Reduced Instruction Set Computer
- RISD: Reference Information Systems Development
- RJE: Remote Job Entry
- RLCM: Remote Line Concentrating Module
- RNOC: Regional Network Operations Center
- ROTL: Remote Office Test Line
- RPC: Remote Procedure Call
- RPE: Remote Peripheral Equipment
- RSA: Reference System Architecture
- RSB: Repair Service Bureau
- RSC: Remote Switching Center
- RSCS: Remote Spooling Communications Subsystem
- RSS: Remote Switching System
- RSU: Remote Switching Unit
- RTA: Remote Trunk Arrangement
- RTG: Routing Generator
- R/W: Read/Write
- RX: Remote Exchange
- SA: Storage Array
- SABB: Storage Array Building Block
- SAM: Secure Access Multiport
- SARTS: Switched Access Remote Test System
- SAS: Switched Access Services
- SAS: Single Attachment System
- SBB: System Building Block
- SABM: Set Asynchronous Balanced Mode
- SAC: Special Area Code
- SBS: Satellite Business Systems
- SC: Sectional Center
- SCC: Specialized Common Carrier
- SCC: Switching Control Center
- SCCP: Signaling Connection Control Part
- SCCS: Switching Control Center System
- SCF: Selective Call Forwarding
- SCF: Supervision Control Frequency
- SCM: Station Class Mark
- SCM: Subscriber Carrier Module
- SCP: Signal Conversion Point
- SCP: System Control Program
- SCP: Service Control Point
- SCR: Selective Call Rejection
- SDLC: Synchronous Data Link Control
- SF: Single-Frequency
- SFE: Secure Front End
- SIDH: System Identification Home
- SIT: Special Information Tones
- SLIC: Subscriber Line Interface Card
- SLIM: Subscriber Line Interface Module
- SLIP: Serial Line Internet Protocol
- SLS: Storage Library System
- SLU: Serial Line Unit
- SM: System Manager
- SMDI: Storage Module Disk Interconnect
- SMDR: Station Manager Detail Recording
- SMI: System Management Interrupt
- SMP: Symmetrical Multi-Processing
- SMS: Self-Maintenance Services
- SMS: Station Management System
- SMTP: Simple Mail Transfer Protocol
- SNA: Systems Network Architecture
- SNMP: Simple Network Management Protocol
- SONDS: Small Office Network Data System
- SOST: Special Operator Service Treatment
- SP: Service Processor
- SPC: Stored Program Control
- SPCS: Stored Program Control System
- SPCSS: Stored Program Control Switching System
- SPM: Software Performance Montior
- SQL/DS: Structured Query Language/Data System
- SRC: System Resource Center
- SS: Signaling System
- SSAS: Station Signaling and Announcement System
- SSCP: Systems Service Control Point
- SSCP: Subsystem Services Control Point
- SSP: Switching Service Points
- SSS: Strowger Switching System
- ST: Start
- STC: Service Termination Charge
- STD: Subscriber Trunk Dialing
- STP: Signal Transfer Point
- STS: Synchronous Transport Signal
- SVC: Switched Virtual Call
- SWG: Sub Working Group
- SxS: Step-by-Step Switching
- T-1: Terrestrial Digital Service
- TAC: Trunk Access Code
- TAC: Terminal Access Circuit
- TAC: Terminal Access Center
- TAS: Telephone Answering Service
- TASI: Time Assignment Speech Interpolation
- TBU: Terminals Business Unit
- TC: Toll Center
- TCAP: Transaction Capabilities ApplicationPart
- TCC: Technical Consulting Center
- TCC: Telecommunications Control Computer
- TCF: Transparent Connect Facility
- TCM: Time Compression Multiplexing
- TCP: Transmission Control Protocol
- TDAS: Traffic Data Administration System
- TDCC: Transport Data Coordinating Committee
- TDM: Time Division Multiplexer
- TDMS: Terminal Data Management System
- TDS: Terrestrial Digital Service
- TH: Trouble History
- TIDE: Traffic Information Distributor & Editor
- TIS: Technical Information Systems
- TLB: TransLAN Bridge
- TM: Trunk Module
- TMSCP: Tape Mass Storage Control Protocol
- TNDS: Total Network Data System
- TNPS: Traffic Network Planning Center
- TO: Toll Office
- TOP: Technical Office Protocol
- TOPS: Traffic Operator Position System
- TP: Transport Protocol
- TP: Toll Point
- TP: Transaction Processing
- TPC: Transaction Processiong Performance Council
- TREAT: Trouble Report Evaluation and Analysis Tool
- TRIB: Throughput Rate in Information Bits
- TRT: Tropical Radio and Telephone
- TSB: Time Shared Basic Environment
- TSG: Timing Signal Generator
- TSN: Terminal Switching Network
- TSO: Time Sharing Option
- TSPS: Traffice Service Position System
- TTL: Transistor-to-Transistor Logic
- TTS: Trunk Time Switch
- TWX: Type Writer Exchange
- UA: Unnumbered Acknowledgement
- UAE: Unrecoverable Application Error
- UART: Universal Asynchronous Receiver Transmitter
- UCS: Uniform Communication Standard
- UDC: Universal Digital Channel
- UDP: User Datagram Protocol
- UDVM: Universal Data Voice Multiplexer
- UID: User Identifier
- UPC: Utility Port Conditioner
- USC: Usage Surcharge
- USDN: United States Digital Network
- USTS: United States Transmission Systems
- UUCP: Unix to Unix Copy Program
- VAN: Value Added Networks
- VAX: Virtual Address Extention
- VCPI: Virtual Control Program Interface
- VDU: Visual Display Unit
- VF: Voice Frequency
- VFU: Vertical Forms Unit
- VFY: Verify
- VIA: Vax Information Architecture
- VLM: Virtual Loadable Module
- VLSI: Very Large Scale Integration
- VMB: Voice Mail Box
- VMCF: Virtual Machine Communications Facility
- VMS: Virtual Memory System
- VMS: Voice Mail System
- VM/SP: Virtual Machine/System Product
- VPA: VAX Performance Advisor
- VPS: Voice Processing System
- VSAM: Virtual Storage Access Method
- VSE: Virtual Storage Extended
- VTAM: Virtual Telecommunications Access Method
- VTOC: Volume Table Of Contents
- VUIT: Visual User Interface Tool
- VUP: Vax Unit of Processsing
- WAN: Wide Area Network
- WATS: Wide Area Telecommunications System
- WATS: Wide Area Telephone Service
- WC: Wiring Center
- WCPC: Wire Center Planning Center
- WDCS: Wideband Digital Cross-Connect System
- WDM: Wavelength Division MultiPlexing
- WES: Western Electronics Switching
- WUI: Western Union International
- XB: Crossbar Switching
- XBAR: Crossbar Switching
- XBT: Crossbar Tandem
- XNS Xerox Network Systems
- XSV Transfer Cost System Value
- XTC Extended Test Controller
-
-
- CONCLUSION
- ==========
- ----------
-
- Last words
- ==========
-
- Well, i sincerely hope that this file was of some use to you, and i would
- encourage you to distribute it as far as you can. If you enjoyed it, hated it,
- have suggestions, or whatever, feel free to email me at my Internet address(my
- only permanent one for now) or at a BBS, if you can find me.
- Have phun...
-
- - Deicide -
-
- Recommended Reading
- ===================
- Neuromancer, Mona Lisa Overdrive, Count Zero and all the rest, by William
- Gibson
- The Hacker Crackdown, by Bruce Sterling
- Cyberpunk, by Katie Hafner and John Markoff
- The Cuckoo's Egg, by Cliff Stoll
- 2600: The best h/p printed zine. $21 in American funds, U.S. & Canada.
- 2600 Subscription Dept., P.O. Box 752, Middle Island NY 11953-0752
- Office: 516-751-2600 Fax: 516-751-2608
- The issues of CUD, cDc, & Phrack electronic newsletters, and the LOD/H TJs,
- all of which can be found on the Internet and any good h/p oriented BBS.
-
- BBSes
- =====
-
- Although most boards have a lifespan equivalent to that of a fruitfly,
- I finally have a list which is somewhat stable.. getting on them is your
- problem.. just be yourself and be willing to learn.
- - Unphamiliar Territories
- - Demon Roach Underground
- - Temple of the Screaming Electron
- - Burn This Flag
- - Dark Side of the Moon
- and Phrozen Realm if it returns..
-
- References
- ==========
-
- All the material used in this publication is original unless specifically
- stated otherwise.
- However, i'd like to thank Phrack and the LOD/H for their textfiles
- which gave me a valuable push in the right direction..
- And of course all the great h/p folks who have helped me along the way..
-
- And finally
- ===========
- Thanks to the EFF, for their continued support of all of the world's rights
- in this technological era.
- Thanks to all the folks running the FreeNets who continue to support the
- right to free access to information in this world of cynicism.
- Thanks to cDc, for not selling out after all these years...
- Musical inspirations: Primus, Rage Against the Machine, Jimi Hendrix, Led
- Zeppelin, Dead Kennedys, White Zombie, the Beastie Boys, etc, etc.
-
- "Yes I know my enemies. They're the teachers who taught me to fight me.
- Compromise, conformity, assimilation, submission, ignorance, hypocrisy,
- brutality, the elite"
- - /Know Your Enemy/ (c) Rage Against the Machine
-
- - Deicide -
- deicide@west.darkside.com
-
- DISCLAIMER
- ==========
- This file was provided for informational purposes only.
- The author assumes no responsibilities for any individual's actions after
- reading this file.
-
-