home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
HACKING
/
HP2000B.TXT
< prev
next >
Wrap
Text File
|
1994-07-17
|
16KB
|
540 lines
******************* BIOC AGENT 003
'S TUTORIAL IN *************************
*
*
* ==========
========== *
* =HACKING T
HE HP2000= *
* ==========
========== *
*
*
***************************************
****************************************
PREFACE
-------
THE PURPOSE OF THIS TUTORIAL IS TO GIVE
POTENTIAL HACKERS USEFUL INFORMATION
ABOUT HEWLETT-PACKARD'S HP2000 SYSTEMS.
THE FOLLOWING NOTATION WILL BE USED
THROUGHOUT THIS TUTORIAL:
<CR> - CARRIAGE RETURN, RETURN, ENTER,
ETC.
^C - A CONTROL CHARACTER (CONTROL-C I
N EXAMPLE)
CAPITAL LETTERS - COMPUTER OUTPUT & USE
R INPUT
SYSTEM INFORMATION
------------------
EACH HP2000 SYSTEM CAN SUPPORT UPTO 32
USERS IN A TIMESHARED BASIC (TSB)
ENVIRONMENT. THE SYSTEM**MU11ERUN A
VERSION OF HEWLETT PACKARD'S
TIMESHARED/BASIC 2000 (VARIOUS LEVELS).
LOGON PROCEDURE
---------------
ONCE CONNECTED TO A HP2000, TYPE A NUME
RAL FOLLOWED BY A <CR>. THE SYSTEM
SHOULD THEN RESPOND WITH: PLEASE LOG I
N. IF IT DOES NOT IMMEDIATELY
RESPOND KEEP ON TRYING THIS PROCEDURE U
NTIL IT DOES (THEY TEND TO BE SLOW
TO RESPOND).
USER ID: THE USER ID CONSISTS OF A LET
TER FOLLOWED BY 3 DIGITS, EG, H241.
PASSWORD: THE PASSWORDS ARE FROM 1 TO
6 PRINTING AND/OR NON-PRINTING (CONTROL)
CHARACTERS. THE FOLLOWING C
HARACTERS WILL NOT BE FOUND IN ANY
PASSWORDS SO DON'T BOTHER TR
YING THEM: LINE DELETE (^X), NULL (^@),
RETURN (^M), LINEFEED (^J),
X-OFF (^S), RUBOUT, COMMA (^L), SPACE
(^@), BACK ARROW (<-), & UND
ERSCORE (_). HP ALSO SUGGESTS THAT ^E
IS NOT USE IN PASSWORDS (BUT
I HAVE SEEN IT DONE!).
THE LOGON FORMAT IS: HELLO-A123,PASSWD
WHERE: HELLO IS THE LOGI
N COMMAND. IT MAY BE ABBREVIATED TO
HEL. A123 IS THE
USER ID & PASSWD IS THE PASSWORD.
THE SYSTEM WILL RESPOND WITH EITHER ILL
EGAL FORMAT OR ILLEGAL ACCESS DEPENDING
UPON WHETHER YOU SCREWED UP THE SYNTAX
OR IT IS AN INVALID USER ID OR PASSWORD.
THE MESSAGES: PLEASE LOG IN, ILLEGAL F
ORMAT, & ILLEGAL ACCESS ALSO HELP YOU
IDENTIFY HP2000 SYSTEMS.
THE SYSTEM MAY ALSO RESPOND WITH ALL PO
RTS ARE BUSY NOW - PLEASE TRY AGAIN
LATER OR A SIMILAR MESSAGE. ONE OTHER
POSSIBILITY IS NO TIME LEFT WHICH MEANS
THAT THEY HAVE USED UP THEIR TIME LIMIT
WITHOUT PAYING.
UNLIKE OTHER SYSTEMS WHERE YOU HAVE A C
ERTAIN AMOUNT OF TRIES TO LOGIN, THE
HP2000 SYSTEM GIVES YOU A CERTAIN TIME
LIMIT TO LOGON BEFORE IT DUMPS YOU.
THE SYSTEM DEFAULT IS 120 SECONDS (2 MI
NUTES). THE SYSOP CAN CHANGE IT TO BE
ANYWHERE BETWEEN 1 AND 255 SECONDS, THO
UGH. IN MY EXPERIENCE, 120 SECONDS IS
SUFFICIENT TIME FOR TRYING BETWEEN 20-3
0 LOGON ATTEMPTS WHILE HAND-HACKING &
A MUCH HIGHER AMOUNT WHEN USING A HACKI
NG PROGRAM.
USERS
-----
THE VARIOUS USERS ARE IDENTIFIED BY THE
IR USER ID (A123) & PASSWORD. USERS
ARE ALSO IDENTIFIED BY THEIR GROUP. EA
CH GROUP CONSISTS OF 100 USERS. FOR
EXAMPLE, A000 THROUGH A099 IS A GROUP,
AL"!I=U!A199 IS ANOTHER GROUP, &
Z900 THROUGH Z999 IS THE LAST POSSIBLE
GROUP. THE FIRST USER ID IN EACH GROUP
IS DESIGNATED AS THE GROUP MASTER & HEJHAS CERTAIN PRIVILEGES. FOR EXAMPLE,
A000, A100,...H200..., & Z900 ARE ALL G
ROUP MASTERS. THE USER ID A000 IS KNOWN
AS THE SYSTEM MASTER & HE HAS THE MOST
PRIVILEGES (BESIDES THE HARDWIRED SYSOP
TERMINAL). THE LIBRARY ASSOCIATED WITH
USER Z999 CAN BE USED TO STORE A HELLO
PROGRAM WHICH IS EXECUTED EACH TIME SOM
EONE LOGS ON.
SO, THE BEST THING TO HACK ON AN HP2000
SYSTEM IS THE SYSTEM MASTER (A000)
ACCOUNT. IT IS ALSO THE ONLY USER ID T
HAT MUST BE ON THE SYSTEM. HE LOGS ON BY
TYPING: HEL-A000,PASSWD. YOU JUST HAVE
TO HACK OUT HIS PASWORD. IF YOU DECIDE
TO HACK Z999, YOU CAN CREATE OR CHANGE
THE HELLO PROGRAM TO GIVE EVERY USER
YOUR OWN PERSONAL MESSAGE EVERY TIME HE
LOGS ON! THIS IS ABOUT ALL YOU CAN DO
WITH Z999 THOUGH SINCE IT IS OTHERWISE
A NON-PRIVILEGED ACCOUNT.
LIBRARY ORGANIZATION
--------------------
EACH USER HAS ACCESS TO 3 LEVELS OF LIB
RARIES: HIS OWN PRIVATE LIBRARY, A
GROUP LIBRARY, AND THE SYSTEM LIBRARY.
TO SEE WHAT IS IN THESE LIBRARIES YOU
WOULD TYPE: CATALOG, GROUP, & LIBRARY
RESPECTIVELY (ALL COMMANDS CAN BE
ABBREVIATED TO THE FIRST 3 LETTERS). T
HE INDIVIDUAL USER IS RESPONSIBLE FOR
HIS OWN LIBRARY AND MAINTANING ALL THE
FILES. IF A PROGRAM IS IN YOUR CATALOG,
THEN YOU CAN CHANGE IT.
[GROUP MASTERS]
GROUP MASTERS (GM) ARE RESPONSIBLE FOR
CONTROLING ALL PROGRAMS IN THE GROUP
LIBRARIES. ONLY MEMBERS OF THE GROUP C
AN USE THESE PROGRAMS. THESE ARE VIEWED
BY TYPING GROUP. FOR EXAMPLE, USER S50
0 CONTROLS ALL PROGRAMS IN THE GROUP
LIBRARY OF ALL USERS BEGINNING WITH ID
S5XX. OTHER USERS IN THE GROUP CANNOT
MODIFY THESE PROGRAMS. ALL PROGRAMS IN
THE GROUP LIBRARY ARE ALSO IN THE
GROUP MASTERS PRIVATE LIBRARY (CATALOG)
, THEREFORE HE CAN MODIFY THEM! THE
GROUP MASTER ALSO HAS ACCESS TO 2 PRIVI
LEGED COMMANDS. THEY ARE: PROTECT &
UNPROTECT. WITH PROTECT, THE GROUP MAS
TER CAN RENDER A PROGRAM SO IT CANNOT
BE LISTED, SAVED, CSAVED, PUNCHED TO PA
PER TAPE, OR XPUNCHED. FOR EXAMPLE, IF
THE GM TYPED PRO-WUMPUS, OTHER USERS IN
THE GROUP WOULD BE ABLE TO RUN WUMPUS
BUT THEY WOULD NOT BE ABLE TO LIST IT.
THE GM CAN REMOVE THESE RESTRICTIONS
WITH THE UNPROTECT COMMAND.
[SYSTEM MASTER]
THERE IS EXACTLY ONE SYSTEM MASTER (SM)
AND HIS USER ID IS A000. HE CAN
PROTECT & UNPROTECT PROGRAMS IN THE SYS
TEM LIBRARY. ALL USERS HAVE ACCESS TO
THESE FILES BY TYPING LIBRARY TO VIEW T
HEM. ONLY THE SYSTEM MASTER CAN MODIFY
THESE FILES SINCE HIS PRIVATE LIBRARY &
GROUP LIBRARY CONSTITUTE THE SYSTEM
LIBRARY. THE SM ALSO HAS ACCESS TO OTH
ER PRIVILEGED COMMANDS SUCH AS:
DIRECTORY: THIS COMMAND WILL PRINTOUT
ALL FILES AND PROGRAMS STOED ON THE
SYSTEM ACCORDING TO USERS.
DIR WILL PRINT OUT THE ENTIRE
DIRECTORY. DIR-S500 WILL S
TART LISTING THE DIRECTORY WITH USER
S500.
EXAMPLE:
DIR
BOCES ED 1 053/84 1243
ID NAME DATE LENGTH DISC
DRUM
A000 ALPHA 043/84 00498 001384
BCKGMN 053/84 04564 001526
FPRINT 053/84 00567 002077
STOCK 038/84 04332 002753
TFILE 020/83 F 00028 002804
WUMPUS 053/84 P 02636 003142
B451 BLJACK 316/75 03088 011887
GOLF 316/75 02773 011911
S500 GIS 050/84 C 03120 019061
GISCL4 050/84 F 03741 022299
Z999 HELLO 021/84 00058 011863
IN THIS EXAMPLE, THE SYSTEM NAME IS BOC
ES ED 1. THE DATE OF THE PRINTOUT IS
THE 53RD DAY OF 1984 (053/84) AND THE T
IME IS 12:43 (24-HR). THE FILES
APPEARING UNDER A000 ARE THOSE IN THE S
YSTEM LIBRARY. THE DATE ASSOCIATED WITH
THE PROGRAM IS THE DATE IT WAS LAST REF
ERENCED. THE LENGTH IS HOW LONG IT IS
IN WORDS. DISC REFERS TO ITS STORAGE B
LOCK LOCATION ON ONE OF THE HARD DRIVES.
DRUM REFERS TO ITS LOCATION ON THE DRUM
STORAGE UNIT. ONLY SANCTIFIED PROGRAMS
ARE STORED ON A DRUM TO INCREASE THEIR
ACCESS TIME. THE LETTERS AFTER THE DATE
REFER TO F IF IT IS A FILE, P MEANS IT
IS PROTECTED, AND C MEANS THE PROGRAM IS
COMPILED. IN THE EXAMPLE THE SYSTEM PR
OGRAM, WUMPUS, WAS LAST USED ON THE 53RD
DAY OF 1984 (2-22-84); IT IS CURRENTLY
UNLISTABLE (PROTECTED) AND IT OCCUPIES
2636 WORDS OF MEMORY STARTING AT DISC B
LOCK 3142. THE COMMAND SDIRECTORY WILL
PRINT OUT PROGRAMS THAT ARE ONLY STORED
ON DRUM. MOST SYSTEM DIRECTORIES ARE
USUALLY LONGER THAN THE EXAMPLE. THE A
BOVE EXAMPLE IS AN ABRIDGED VERSION OF A
43 PAGE DIRECTORY! THE <BREAK> KEY WIL
L STOP THE LISTING IF NECESSARY.
REPORT
THE REPORT COMMAND WILL SHOW THE USER I
D, HOW MUCH TERMINAL TIME THEY HAVE USED
SINCE THE LAST BILLING PERIOD (IN MINUT
ES), AND HOW MUCH DISC SPACE THEY ARE
USING.
EXAMPLE:
REPORT
BOCES ED 1 055/84 1905
ID TIME SPACE ID TIME SPACE
I TIME SPACE
A000 01150 12625 B451 00003 05861
B864 00000 00000
S500 00235 06861