home *** CD-ROM | disk | FTP | other *** search
- Note: To be viewed with a Monospaced, 9-point Font (i.e. Monaco, Courier)
-
- -----------------------------------------------------------------------------
- #### #### ##### ##### ##### ###### ##### ##### DOCUMENTATION
- ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### by oleBuzzard
- ### ### ### ### ### ### ### ### ### ### ### ### ### ### ###
- ### ### ### ### ### ### ### ### ### ### ### ### %%% % %%
- ### ### ### ####### ### ### ###### ####### ### % %% %% % %
- ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### % % % % %%%%
- ### ### ### ### ### ### ### ### ### ### ### ### ### ### ### %% % % % %
- ### ### ### ### ### ##### ##### ### ### ### ### ##### %%% % %%% % %
- -[01-29-96]------------------------------------------------------------------
-
-
- INTRODUCTION
-
- FINALLY! A half-way decent UNIX 'passwd' cracker for the Macintosh. MACCRAC
- is a very well ported version of one of the PC world's best 'passwd'
- Crackers, CRACK V4.1. MACCRAC is great if you know how to use it, AND, more
- importantly, if you know what UNIX password cracking is about in the first
- place. Unfortunatley, the Mac underground have been SO long deprived of a
- decent UNIX passwd cracker, alot of us are quite a bit behind in the
- concept. That's what this tutorial is provided for. Hopefully after reading
- it, not only will you have an understanding of how to use MACCRAC, but also
- an increased understanding of what UNIX hacking is about in the first place.
-
-
- PURPOSE OF CRACKING THE passwd
-
- Traditionally stated, the purpose of hacking a UNIX is: to "get to ROOT."
- This refers to the ROOT account that every UNIX system has as part of it's
- Operating system. The ROOT is a 'Trusted User' account, THE most powerful
- account on a UNIX. If you can hack a ROOT you can utilize or exploit every
- function a UNIX is capable of. But to get to "ROOT" you have to have
- somewhere to start. For the purposes of this file, that somewhere is with
- the 'passwd' file.
-
-
- WHAT'S THE passwd?
-
- 'passwd' is the common name of the file in which user account information is
- stored on a UNIX system. You might consider it a comprehensive users list.
- The file contains the information for an accounts USERNAME, PASSWORD, USER
- NUMBER, GROUP, GECOS, HOME DIRECTORY, and SHELL. A single entry of a passwd
- file entry might look like this:
-
-
- PASSWORD GROUP NUMBER HOME DIRECTORY
- / / /
- / / /
- kbahadur:8d34jSjs73hsb:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh
- \ \ \ \
- \ \ \ \
- USERNAME USER NUMBER GECOS INFORMATION SHELL
-
-
- Now take a look at the PASSWORD in this entry: 8d34jSjs73hsb. This is, in
- fact, NOT the password. It is, instead, the encrypted equivalent TO the
- password. As part of the UNIX Account Registration process, when a User
- designates a password, the UNIX takes the password, and (*this is
- important*) uses the other information from the account to generate an
- encrypted equivalent to the actual password. Why? Because as part of the
- UNIX operating system, users MUST have access to the 'passwd' file to be
- able to login. But if anyone who has an account can access the 'passwd'
- file, they can also see what everyone else's Password is. So, UNIX's
- security against this is to encrypt the password entry for each users
- account so that noone else will know what anyone elses password is.
- Unfortunaley/fortunatley (depending on who you are) the algorithm UNIX uses
- to perform this encryption has been known to Hackers for sometime. And so if
- you can see this:
-
- encrypted equivalent of pasword
- /
- kbahadur:8d34jSjs73hsb:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh
-
- ...you can use MACCRAC or any other of well over 50 'passwd' file crackers
- to "guess" the password to this account entry. "Guess?" You say? "How does
- that work?" It works like this:
-
-
- GUESSING THE PASSWORD
-
- First a UNIX 'passwd' file cracker takes an encrypted password equivalent
- (i.e.: 8d34jSjs73hsb) from an account entry in a UNIX 'passwd' file and
- holds it to be used as a Reference. From whichever account entry the
- encrypted equivalent was pulled, is the particular account the 'passwd' file
- cracker will attempt to crack at that time.
-
- Next the 'passwd' file cracker goes through a process of "guessing". In this
- process a single word is pulled from a Dictionary file (more on Dictionaries
- later), encrypted utilizing the UNIX encryption algorithm (the one all us
- hackers know about), and compared, checking to see if the derived encrypted
- word matches the encrypted password equivalent used as a Reference.
-
- If the encrypted word matches the Reference, the 'passwd' file cracker
- considers it an accurate guess, it then logs the information, and moves on
- to the next account. If the two do not match, the 'passwd' file cracker
- pulls another word from the Dictionary file and goes through the guessing
- process again. If the 'passwd' file cracker goes through every word in a
- Dictionary file and never matches the Reference, the entry is skipped, and
- the cracker moves on to the next account.
-
- Now, as complicated as this may seem, it is all a relativley easy task for a
- computer. As such, UNIX 'passwd' files are cracked on a regular basis. As a
- result of this a number of security and other measures now (potentially)
- exist to prevent unauthorized persons from accessing a UNIXes'passwd' file.
- This is the topic of the next section. To this point you should understand
- why UNIXes are hacked (to get to ROOT) and understand a little about
- 'passwd' files and their role in UNIX hacking. Got it?
-
-
- GOT IT, NOW WHAT?
-
- Ok, at this point you should be ready to try and find a UNIX 'passwd' file
- to crack, right? Wrong. You still have a couple of minor, requisite tasks to
- perform. First, (obviously) you'll need to find a UNIX to hack. In most
- cases, you've already got one in mind, but just in case you don't we'll take
- a look at a few. Also, once you've found a UNIX to hack, you'll need an
- account on that UNIX. There's no way to steal the 'passwd' file from a UNIX
- without first having an account on it (not true, you can always get a
- 'passwd' file from someone else, but ignore this because I'm contradicting
- myself). Once you've accomplished your requisites you can start trying to
- steal the 'passwd' file.
-
-
- Step 1. Finding a UNIX to Hack
- ------------------------------
- Seeing as how you're reading this file you probably already have a UNIX in
- mind. But, for the sake of clarity, heres what a common UNIX login screen
- looks like:
-
- Ultrx v4.3 (rev .44)
-
-
- login:
-
- Other UNIX machines are: System V, BSD, Xenix, and AIX. Look for these names
- to be somewhere in the login screen. Knowing what type of UNIX you're using
- will aid you in hacking it.
-
- Step 2. An account to start with
- --------------------------------
- If you already have a UNIX account go to Step 3. If you do not already have
- an account, you need to get one. Either: trade for one, trash for one, get a
- legitimate one, or hack one out by hand. The first three options are
- probably the easiest. You can trade for UNIX accounts on IRC channels #hack
- or #phreak. You can trash for accounts in dumpsters and trashcans at most
- Colleges or Universities. You can buy legitimate accounts from any one of
- the rapidly increasing number of Internet Service Providers (they almost all
- use UNIX). But, of coure, as well know you're a hacker, and the only hing
- you wanna do is Hack an account. So be it. Here's a list of UNIX defaults.
- *NOTE* These are NON-PASSWORDED accounts. They are common on System V, BSD,
- Xenix, and AiX. "These defaults are included in standard setup on various
- machines so the Sysadmin can log on for the first time." In some instances,
- negligent Admins will forget to change or delete these accounts. If so,
- you've got an account to start with. Remember, these are NON-PASSWORDED so
- if they work you shouldn't be prompted for a password. If a password is
- prompted for, try using the Account name for the password as well.
-
- [Stolen from CoTNo #01]
-
- root bin adm
- makefsys sysadm sys
- mountfsys rje sync
- umountfsys tty nobody
- checkfsys somebody setup
- lp powerdown ingres
- dptp general guest
- daemon gsa user
- trouble games help
- nuucp public unix
- uucp test admin
- student standard pub
- field demo batch
- visitor listen network
- uuhelp usenet sysinfo
- cron console sysbin
- who root2 startup
- shutdown ncrm new
-
- Step 3. Stealing the passwd file
- --------------------------------
- Once you've got your UNIX accpunt you can ATTEMPT to steal the 'passwd' file
- from it. I emphasize ATTEMPT because the 'passwd' file can be protected in a
- number of ways, or located in a number of different places. We will explore
- some common methods of exploiting the 'passwd' file.
-
- -Common UNIX Hack-
-
- This is probably THE easiest and most common UNIX hack. ogin in to your
- account and try typing this at the prompt:
-
-
- prompt concatenate Note on: 'booya>' is the name of the account
- / / prompts prompt on the machine I'm using in
- booya> cat /etc/passwd these examples. The prompt on your
- / \ machine will be different. Also
- directory filename DON'T type 'booya>' with an entry.
-
-
- 'cat' is short for concatenate, a command used for reading and displaying
- files in standard output. '/etc' is the common directory for the password
- file on older UNIXes. 'passwd' is the common password filename on UNIXes. If
- you entered: cat /etc/passwd and got a listing that looks like this
- (abbreviated):
-
- kbahadur:IS3fhZdWX3JGU:2162:15:Ken Bahadur:/usr/users/kbahadur:/usr/bin/ksh
- \
- password intact
-
- ...then congrats! You've succesfully listed out (stolen) your first 'passwd'
- file. *Buffer* the entire contents to a text file, save it and jump down to
- the section: MACCRAC-ING.
-
- If you got a listing that looks like this:
-
- password tokenized
- /
- intruder:x:263:200:Jack Harmon:/usr/users/intruder:/bin/csh
-
- or:
-
- esvogt:PASSWORD HERE:2183:129:Novel,,,:/usr/users/advisor/esvogt:/usr/bin/ksh
- \
- password removed
-
- or you got:
-
- cat: cannot open /etc/passwd
-
- Then the UNIX you are on is utilizing some other form of protection or may
- be using a different 'passwd'-ing process. Keep reading.
-
- -AIX-
-
- On AIX systems, an UNIX variation, the 'passwd' file is in a different
- place. On an AIX type:
-
- booya> cat /etc/security/passwd
-
- If this lists out a 'passwd' file with the (encrypted) password intact, then
- you've succesfully listed out (stolen) your first 'passwd' file. *Buffer*
- the entire contents to a text file and save it, and jump down to MACCRAC-
- ING. If not, keep reading.
-
- -NIS/yp-
-
- Some UNIXes use a system called Yellow Pages [taken from #hack/alt.2600 FAQ
- beta .013]:
-
- "NIS (Network Information System) is the current name for what was once
- known as yp (Yellow Pages). The purpose for NIS is to allow many
- machines on a network to share configuration information, including
- password data. NIS IS NOT DESIGNED TO PROMOTE SYSTEM SECURITY. If
- your system uses NIS you will have a very short /etc/passwd file that
- includes a line that looks like this:
-
- +::0:0:::
-
- "To view the real password type this command:"
-
- booya> ypcat passwd
-
- If 'ypcat' lists a password file with the (encrypted) password still intact,
- *buffer* the entire contents and go on to MACCRAC-ING, if not, keep reading.
-
- -Password Shadowing-
-
- Some systems use what is called password shadowing [again, taken from
- #hack/alt.2600 FAQ beta .013]:
-
- "Password shadowing is a security system where the encrypted password
- field of /etc/passwd is replaced with a special token and the
- encrypted password is stored in a separate file which is not readable
- by normal system users.
-
- "To defeat password shadowing on many (but not all) systems, write a
- program that uses successive calls to getpwent() to obtain the
- password file.
-
- "Example:
-
- -------------------------------------------------------------CUT HERE
- #include <pwd.h>
- main()
- {
- struct passwd *p;
- while(p=getpwent())
- printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd,
- p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
- }
- -------------------------------------------------------------CUT HERE
-
- Now then, for those you who are unfamiliar with UNIX scripts and/or their
- implementation, follow these directions:
-
- First Copy the above script (not including the CUT HEREs) into a Text
- file and save it as 'getp.c'. Next Login to your UNIX account and create a
- directory called 'executables'. (At the prompt) Type:
-
- prompt directory name
- / /
- booya> mkdir executables
- /
- make directory
-
- Now, use Fetch or some other FTP client to FTP into your account and
- Upload 'getp.c' into the directory 'executables'. Once you've done this,
- login to your account, and goto the 'executables' directory:
-
- change directory
- /
- booya> cd executables
-
- Type 'ls' to List the directory to make sure the file is there. If it is
- you can attempt to compile the 'getp.c' script. Almost all UNIX boxes
- have Compilers, it's just a matter of whether or not you have acces TO
- the Compiler. Typically you do. at the UNIX prompt Type:
-
- prompt compiler executable
- \ / /
- booya> cc -o getp.c getfile
- / \
- output filename
- option
-
- If you don't get an error you should be left with a file named 'a.out'.
- Type:
-
- booya> a.out
-
- If you get a listing with the (encrypted) password intact, *buffer* the
- contents to a text file and go on to MACCRAC-ING. if not, keep readin'.
-
- If you got an error when you tried to compile the 'getp.c' script: 'cc:
- Command not found' then you either don't have that compiler or you don't
- have access to it. In either case, try compiling with the GNU C Compiler:
-
- gnu c compiler
- /
- booya> gcc getp.c
- \
- filename
-
- Again, you should be left with a file named 'a.out'. At the UNIX prompt
- type: a.out. If you get a password file with the (encrypted) password file
- intact, *buffer* the entire contents and go on to MACCRAC-ING. If not, keep
- reading.
-
- -Last Resorts-
-
- In some cases none of the above listed attacks may work. It might be because
- you're running a newer version of UNIX like SunOS v5.4. Also it, may just be
- that you don't have permissions to access the 'passwd' file for whatever
- reason. In the case of SunOs v5.4, v5.4 doesn't have those helpful v4.1.x
- bugs so well documented in the CERT Advicories. In this case your best bet
- may be to go pick up a book on UNIX (so you can know what you're doing), and
- then goto the Bugtraq Archives:
-
- http://www.eecs.nwu.edu/~jmyers/bugtraq/search.html
-
- ...and do a search for 'SunOS 5.4'. Any vulnerabilities in 5.4 (or any other
- system for that matter) may be found there.
-
- In cases where you just don't have access to the 'passwd' file for whatever
- reason, you might try the 'Dumb User' Hack: Login to a UNIX using whatever
- account you have. Once you're logged in, at the prompt type:
-
- change directory up 1
- /
- booya> cd ..
- ^
- Note space ' ' between 'cd' and '..'
-
- booya> ls
- \
- lists contents of directory accounts
- / \
- 1031exch dianafcr jetski91 \ mikesotto sanders
- aa7bq diane jgroff \ milton saucy
- aacker digna jhill \ mjwright sawgal
- aardvark dillon jillk mkansgen sbarnes
- acarr / ditomaso jimfinly mmadison sbray
- \ /
- accounts [ALL of these are accounts]
-
- [etc...]
-
- What this process does is give you the names of all the common accounts on
- the UNIX you're on. Buffer this list and print it out. Exit the UNIX (type:
- exit) and try to Hack back using these accounts with the Account name as the
- password. i.e.:
-
- UNIX(r) System V Release 4.0 (arthur)
-
- login: jetski91
- Password: jetski91 -- would not be shown
- Login incorrect /
- login: mkansgen /
- Password: mkansgen
- Last login: Sat Jan 27 12:34:31 from slip212m.vinue.net
- Sun Microsystems Inc. SunOS 5.4 Generic July 1994
- You have new mail.
- Sat Jan 27 12:41:04 MST 1996
- /usr/users/mkansgen
- arthur{mkansgen}/usr/users/mkansgen%
-
- This is the 'Dumb User' Hack. Because a user was 'dumb' enough use his
- account name for his password, it was easily hacked, and now that dummy's
- account is your's. If the Dumb User's account has more privileges than
- yours (i.e. Permission to read the 'passwd' file), go back through the
- previously described methods and attempt to get the 'passwd' file. If the
- account has no greater privileges, keep the account for later trading on
- #hack and try and hack another account with more privileges.
-
- If you've tried everything and you still haven't succeed in stealing a
- 'passwd' file, goto bed and thank God you don't have more troubles in life.
-
-
- MACCRAC-ING
-
- At this point you should have a processable 'passwd' file. This file should
- contain account entries with the encrypted password intact, and it should be
- saved as a plain text file. If these are completed you can proceed with
- using MACCRAC.
-
- Now to use MACCRAC there a couple of operating mechanics to go over.
- Remember MACCRAC is a ported version of an IBM program, and since this is a
- BETA, its still a little buggy, and frills free. Basically, there are four
- main components of MACCRAC:
-
- MacCrac.FAT--This is the main MacCrac application which processes
- and crack's UNIX 'passwd' files.
-
- MacCrac.Log--This is the file where all information generated during the
- process off cracking a UNIX 'passwd' file is stored.
-
- DICTIONARY--This is a dictionary file containing words MACCRAC will use
- to try and crack a 'passwd' file.
-
- passwd--This the file that contains the UNIX account information.
-
-
- Important notes on the above:
-
- MacCrac.FAT
- -----------
- MACCRAC REQUIRES that ALL FILENAMES MUST BE AS THEY ARE LISTED ABOVE! There
- will be no dialogs to ask you which DICTIONARY or 'passwd' file you wish to
- use. MACCRAC Will look ONLY for a Dictionary file called DICTIONARY and a
- UNIX 'passwd' called passwd, AND it will only look for them in the immediate
- folder it is in, so make sure these files are in the same folder with
- MACCRAC.
-
- Dictionary
- ----------
- The DICTIONARY is a standard Word Processing Dictionary as used by say,
- Microsoft Word. MACCRAC's Dictionary is somewhat larger than most Word
- Processoing Dictionaries with a size 2,431k. But other than it's size, it's
- no different. Dictionary files consist of alphabetized words with one word
- per line (carriage return) and no spaces. Heres a short sample of a
- DICTIONARY file:
-
- A
- a
- aa
- aal
- aalii
- aam
- Aani
- aardvark
- aardwolf
-
- Now, at 2,413k, MACCRAC's Dictionary is fairly large...although certainly
- not the largest. I personally have seen Dictionary files as large as 4
- gigabytes! But normally you won't need a Dictionary that big. In fact the
- DICTIONARY file that comes with MACCRAC should be more than adequate. But if
- you would like to use a larger Dictionary or would like to use a Dictionary
- of say, Foreign Words, or Star Trek Terms, or Dog Names, then you can either
- make them or, find them on the internet.
-
- In using these Dictionary files, it's important to remember that what ever
- name they're called when you find them, they MUST be RENAMED to DICTIONARY,
- and placed in the same Folder as MACCRAC in order to be used. If the
- Dictionary file is not called DICTIONARY, or is not in the same Folder as
- MACCRAC, it will not/cannot be used.
-
- As a final note on Dictionaries, there is a program called 'Word List
- Maker'. This is a Drag&Drop program which allows you to Drag two or more
- Dictionary files on to it, and it will combine them into a single Dictionary
- AND delete all duplicate entries. This is great for making custom, or more
- extensive DICTIONARY files for MACCRAC to use. Keep in mind though, that the
- larger the Dictionary, the slower the process.
-
- passwd
- ------
- Well the 'passwd' file is what we spent the majority of this Tutorial
- discussing, so I shouldn't need to go into it much here. The most important
- thing to say about the 'passwd' file at THIS point is that included with
- MACCRAC is a file called 'passwd'; DELETE IT! This is just a sample file
- included with MACCRAC probably for Development or Testing purposes. It will
- do you no good. Replace it with your newly acquired 'passwd' file, and make
- sure this newly acquired file is called: passwd. Also make sure it's in the
- same Folder with MACCRAC
-
-
- LET'S DO IT
-
- Well, f you have your 'passwd' file, and you have whatever Dictionay file
- you're going to use, and all of the files are correctly named and placed in
- the same Folder with MACCRAC, then I guess you're ready, so lets do it!
-
- For the sake of speed, and because you won't be able to use your computer
- anyway, I suggest Restarting your Mac with Exensions Off (even if you have
- RamCharger or RamDoubler). Once you've restarted, Double click on the
- MACCRAC icon. If this is your first time running MACCRAC, just go up to
- 'Crack' in the menubar and select: Start Cracking!. The first thing you'll
- probably notice is that once you've started a Cracking Session you can't do
- anything else. Thats because MACCRAC hogs the processor. I would suggest
- starting a session around 11:00 pm and letting it run all night. By morning,
- it should have cracked at least 40-50 accounts.
-
- If for some reason you want or need to stop a session before an entire
- 'passwd' file is cracked, the only way to do it is with COMMAND-OPTION-ESC.
- Don't worry, any cracks MACCRAC has cracked to that point will be saved.
-
- If you've already started Cracking a 'passwd' file but had to quit, you can
- pickup where you left off by going up to the 'CRACK' menubar and dragging
- down to Settings. Once in Settings select 'Recover session from "Point
- File"'. Now you can 'Start Cracking!' where ever you let off.
-
-
- OUTRO
-
- If you've let it run long enough, you should have passwords. At this point
- you're on your way to geting to "ROOT". The topic of Hacking "root" on UNIX
- has been addressed by any of a number of well written, informative and
- readily available T-Philes on UNIX Hacking. At this point I suggest you
- pursue them as this file will not address that topic (remember, this is a
- Tutorial on MACCRAC)
-
- I'd like to thank Disorder, Voyager and the rest of TNo Crew for their
- incite and assistance. That's it for this one. Look for more oleBuzzard's T-
- Philes on the World's Greatest Underground Mac Board...
-
- oleBuzzard's 7 Macintosh/PC Underground
- /<n0wledge phreak 1 PowerPC 9500-604
- ### ######### 9 5500+ Philez/1.2 Gigz
- ### ### ## ###_{_}## ###### 5 Hack/Phreak/Phraud/Anarchy
- ###### ## / ###\_/ ## ### ### 7 UnionNET/IIRG-Net
- ##### ##,(___### ## ### ### 8 Home of the UNDERGROUNDMAC
- ###### ## o \ \## ## ### ### 8 SCAM! Magazine Distro Site
- ### ### ######### ###### 2 Runnin Hermes v3.4
- / ### 8 2400-28.800 kbaud
- 'No Bullshit!' 8 Only like US$20/month
-