home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty, File 4 of 14
-
- Network Miscellany
- *******************************************************
- < How to Acquire Information on Internet Computers >
- *******************************************************
- Compiled from Internet Sources
-
- by The Racketeer
- of The Hellfire Club
-
- Network Miscellany created by Taran King
-
-
- Generally speaking, information is everything. A lot of hacking any computer
- on a network is being able to gather information about the machine and its
- vulnerabilities. This file is about using the available resources on the
- Internet network in order to gain important information about any perspective
- sites.
-
- A large amount of information has been printed in Phrack recently about the
- Internet, most of it copied straight from manuals and in my opinion lacking
- hacking flair. Therefore, I'm going to take you straight into the heart of the
- heart of the matter with this file on acquiring information!
-
- Now, the Internet is notorious for not having an instruction manual. Most
- people who find out what the Internet is learn from their friends. It used to
- be that there was only one real landmark on the Internet, and that was the
- SIMTEL-20 FTP archive. Now, the Internet is probably the largest free network
- in existence. In fact, it's a hacker's paradise!
-
- Unfortunately, you have to know about "public" sites on the network before you
- can use them. Likewise, how are you going to hack an organization if you don't
- know any machines on it? Sort of like trying to complain to Packard-Bell about
- your computer equipment not working when the bastards don't supply their name,
- address, or phone number. You are going to have to find another way to get that
- information if you want to get anything done.
-
- There is not any one particular way to learn about a site. In fact, you'll
- have to combine several unusual methods of gathering information in order to
- obtain anything resembling a "complete picture." However, using the
- combinations of techniques described in this file, you can maneuver through any
- network on the Internet and learn about the machines within.
-
- The first stop on this journey is the ARPANet Network Information Center
- (frequently called "NIC" by experienced network users). NIC's purpose is
- simply to keep track of all the network connections, fields, domains, and hosts
- that people wish to be told about.
-
- To connect to NIC, you would issue a command from your Internet connected
- machine similar to this:
-
- .----------------------- command
- \/
- [lycaeum][1]> telnet nic.ddn.mil
-
- This will (within a short period of time) route you to the Network Information
- Center and grant you access. There isn't a straight forward login/logout
- system on NIC like other Unix computers; it will just connect you to the
- Information System upon connection. The message you will get will be similar
- to this:
-
- * -- DDN Network Information Center --
- *
- * For TAC news, type: TACNEWS <return>
- * For user and host information, type: WHOIS <return>
- * For NIC information, type: NIC <return>
- *
- * For user assistance call (800) 235-3155 or (415) 859-3695
- * Report system problems to ACTION@NIC.DDN.MIL or call (415) 859-5921
-
- SRI-NIC, TOPS-20 Monitor 7(21245)-4
- @ <prompt>
-
- Great, now we are in. Essentially, since NIC is just a great big telephone
- book, we need to let our fingers to the walking. Let's demonstrate a few
- simple commands as I go after one of the government contract giants, the
- corporation known as UNISYS. Let's start by entering WHOIS.
-
- @WHOIS
- SRI-NIC WHOIS 3.5(1090)-1 on Tue, 22 Aug 91 15:49:35 PDT, load 9.64
- Enter a handle, name, mailbox, or other field, optionally preceded
- by a keyword, like "host sri-nic". Type "?" for short, 2-page
- details, "HELP" for full documentation, or hit RETURN to exit.
- ---> Do ^E to show search progress, ^G to abort a search or output <---
- Whois:
-
- Okay, now we are in the database. Since Unisys is our target, let's go ahead
- and ask it about "Unisys."
-
- Whois: unisys
-
- Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil (904) 234-0451
- Ebersberger, Eugen (EE35) UNISYS@HICKAM-EMH.AF.MIL (808) 836-2810
- Lichtscheidl, Mark J. (MJL28) UNISYS@BUCKNER-EMH1.ARMY.MIL (DSN) 634-4390
- Naval Warfare Assessment Center (UNISYS) UNISYS.NWAC.SEA06.NAVY.MIL
- 137.67.0.11
- Navratil, Rich (RN74) UNISYS@COMISO-PIV.AF.MIL (ETS) 628-2250
-
- There are 28 more matches. Show them? y --> of course
-
- Peterson, Randy A. (RP168) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
- Przybylski, Joseph F. (JP280) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
- UNISYS Corporation (BIGBURD) BIGBURD.PRC.UNISYS.COM 128.126.10.34
- UNISYS Corporation (GVLV2) GVL.UNISYS.COM 128.126.220.102
- UNISYS Corporation (MONTGOMERY-PIV-1) MONTGOMERY-PIV-1.AF.MIL 26.5.0.204
- Unisys Corporation (NET-MRC-NET)MRC-NET 192.31.44.0
- Unisys Corporation (NET-SDC-PRC-CR) UNISYS-ISF-11 192.26.24.0
- Unisys Corporation (NET-SDC-PRC-LBS) UNISYS-ISF-9 192.26.22.0
- UNISYS Corporation (NET-SDC-PRC-NET) UNISYS-ISF-7 192.12.195.0
- Unisys Corporation (NET-SDC-PRC-SA) UNISYS-ISF-10 192.26.23.0
- Unisys Corporation (NET-SDC-PRC-SW) UNISYS-ISF-8 192.26.21.0
- Unisys Corporation (NET-UNISYS-CULV) UNISYS-CULV 192.67.92.0
- Unisys Corporation (NET-UNISYS-PRC) UNISYS-PRC 128.126.0.0
- Unisys Corporation (NET-UNISYS-RES1) UNISYS-RES1 192.39.11.0
- Unisys Corporation (NET-UNISYS-RES2) UNISYS-RES2 192.39.12.0
- Unisys Corporation (NET-UNISYS2)UNISYS-B2 129.221.0.0
- Unisys Corporation (STARS) STARS.RESTON.UNISYS.COM 128.126.160.3
- Unisys Corporation (UNISYS-DOM) UNISYS.COM
- Unisys Linc Development Centre (NET-LINC) LINC 143.96.0.0
- UNISYS (ATC-SP) ATC.SP.UNISYS.COM 129.218.100.161
- Unisys (FORMAL) FORMAL.CULV.UNISYS.COM 192.67.92.30
- UNISYS (KAUAI-MCL) KAUAI.MCL.UNISYS.COM 128.126.180.2
- UNISYS (MCLEAN-UNISYS) MCLEAN-UNISYS.ARMY.MIL 26.13.0.17
- UNISYS (NET-UNISYS-RES3) UNISYS-RES3 192.67.128.0
- Unisys (NET-UNISYS-SP) UNISYS-SP 129.218.0.0
- UNISYS (SALTLCY-UNISYS) SALTLCY-UNISYS.ARMY.MIL 26.12.0.120
- UNISYS (SYS-3) SYS3.SLC.UNISYS.COM 129.221.15.85
- Wood, Roy (RW356) UNISYS@LAKENHEATH-SBLC.AF.MIL
- 0044-0638-522609 (DSN) 226-2609
-
- As you can see, the details on these computers get fairly elaborate. The first
- "column" is the matching information, second column is the network name or
- title, then it is followed by a phone number or IP port address. If the phone
- number has an area code, then it is of a standard phone nature; however, if it
- is (DSN) then it's on the "Data Security Network," aka Autovon (the military
- phone system).
-
- Now, as you can tell from the above list, there are several UNISYS accounts at
- military machines -- including a military machine NAMED after Unisys (mclean-
- unisys.army.mil). This stands to reason since Unisys deals mostly in military
- computer equipment. Since it is a secretive military group, you'd figure an
- outsider shouldn't be able to gain much information about them.
-
- Here is what happens if you center on a specific person:
-
- Whois: cartee
- Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil
- 7500 McElvey Road
- Panama City, FL 32408
- (904) 234-0451
- MILNET TAC user
-
- Record last updated on 18-Apr-91.
-
- Hmm.. Very interesting. This user obviously has access to military computers
- since she has a TAC card, and goes under the assumed identity as "Unisys" in
- general. Could this person be a vital link to the Unisys/U.S. Defense
- connection? Quite possibly. More likely she is a maintenance contact, since
- she can use her TAC card to contact multiple (confined) military networks.
-
- I've gone ahead and requested specific information about kauai.mcl.unisys.com,
- which as far as I know is a focal point for the Unisys Networks. Of course,
- the information on this machine is non-classified (or if it IS classified,
- Unisys will probably be chewed out by Uncle Sam). Notice all the great
- information it gives:
-
- Whois: kauai.mcl.unisys.com
- UNISYS (KAUAI-MCL)
- Building 8201, 10th Floor Computer Room
- 8201 Greensboro Drive
- McLean, VA 22102
-
- Hostname: KAUAI.MCL.UNISYS.COM
- Nicknames: MCL.UNISYS.COM
- Address: 128.126.180.2
- System: SUN-3/180 running SUNOS
-
- Coordinator:
- Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
- (215) 648-2573
-
- domain server
-
- Record last updated on 05-Aug-91.
-
- No registered users.
-
- Aha! The Coordinator on this machine doesn't use it! There are no registered
- users! Namely, if you wanted to hack it, you aren't screwing with the higher
- ups (this is good). Since when does Unisys buy computers from other companies?
- Can't they just grab a few off the assembly line or something? The computer is
- stationed in McLean, Virginia! That's where the CIA is! Could Unisys be
- developing computers for the international espionage scene? Obviously, there
- is a great deal of information to be sucked out of this machine.
-
- How? The answer was listed there. The machine is a DOMAIN SERVER. That means
- this computer holds the network information used to identify all the computer
- systems on its network and all we need to do right now is figure out a way to
- squeeze that information out! But first, let's see if our hunch was correct in
- assuming the bigwigs are far away by checking out the head honcho, "Mr.
- Meidinger."
-
- Whois: jim@burdvax.prc.unisys.com
- Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
- Unisys Corporation
- Computer Resources
- Room g311
- P.O. Box 517
- Paoli, PA 19301-0517
- (215) 648-2573
-
- Record Last Updated on 04-Jul-90.
-
- Yup, Mr. Meidinger is far away -- Pennsylvania, to be exact. Not exactly
- keyboard's length away, is he? Besides, being in the "Computer Resources"
- department, I'd suspect he is just an accountant. Accountants are to computing
- as beavers are to trees (unless, of course, they actually like computers, which
- isn't a foregone conclusion in the business world).
-
- I'm going to skip the rest of the information on NIC, since it has been
- overkilled in this particular magazine anyway. The only hint I have is to read
- CERT's and DDN's news blurbs, since they give out some interesting information
- which would be useful and educational. Besides, messing around with the CIA's
- hired goons sounds much more fun.
-
- Now is the time for a little bit of a lesson in critical reasoning: the
- Internet isn't exactly a "free to the public" network, meaning you just can't
- attach your computer to a machine on the Internet and expect it to work all of
- a sudden. You need to configure your machine around the computers in the
- network domain you are linking into, and if you have their permission, then
- everything is cool. But once you're configured, and your router and/or server
- has been notified of your existence, does that mean anyone else has that
- information? The answer is yes, although that info won't be forwarded to a
- place like NIC -- it will have to be obtained another way.
-
- All packets of data on the Internet need to be routed to and from valid
- computer hosts. Therefore, all of this information is stored on the network's
- gateway. But the routing information stored is simply in numeric format, such
- as 128.126.160.3. At least, that is as understandable as it gets, since
- Ethernet addresses are even more elaborate and in binary.
-
- However, as Internet users know, there is more than a single way of describing
- a computer. "telnet 128.126.160.3" would be one way of connecting to a
- computer, or "telnet aviary.stars.reston.unisys.com" would be another way of
- connecting to the same computer. These names are chosen by the owner of the
- network, and are described through the use of "domain servers."
-
- As you recall, kauai.mcl.unisys.com was listed by NIC as a domain server. This
- means that the names of the computer systems on that network are stored on that
- particular host. Of course, that's not the only thing. The domain server
- presents the computer name and IP number to the connecting machine allowing you
- to connect to the computer by using a "domain style name." Ultimately,
- everything is converted to IP numbers.
-
- Most network software allows compatibility with domain servers, meaning if you
- want to connect to nic.ddn.mil, and you specify a command "telnet nic.ddn.mil"
- then you will connect to nic.ddn.mil. Sadly, this isn't true of all computers
- (which require IP numbers only), but at least it is true enough that the
- general user is likely to have such computer resources.
-
- Reaching back to the Dark Ages, there is a computer program that allows
- machines that don't directly interpret domain style addresses to IP addresses
- to still find out what the name of a machine is. This program is called
- "nslookup" and is usually found in the Unix operating system (at least, I
- haven't used it anywhere else -- it might only work on Unix).
-
- "nslookup" stands for Name Server Lookup (there has been some debate, it seems,
- if a domain server is really a name server, or visa versa; in fact, both
- describe what they do well enough to have conflict). Regardless, let's go
- ahead and work on learning how to use nslookup.
-
- [lycaeum][2]> nslookup
- Default Name Server: lycaeum.hfc.com
- Address: 66.6.66.6
-
-
- Now, going back to that NIC information we got earlier, let's continue to hack
- on poor old Unisys, which is giving up its info every step we make. We
- determined that the kauai.mcl.unisys.com was a domain server, so let's jump
- ahead to that by changing our server to their server (after all, the computers
- we are after aren't on our machine).
-
- > server kauai.mcl.unisys.com
- Default Server: kauai.mcl.unisys.com
- Address: 128.126.180.2
-
- Okay, now we have connected to the server. This isn't a constant connection,
- by the way. It will only establish a connection for the brief instant that it
- takes for it to execute commands. It doesn't require a password or an account
- to get this information off of a nameserver.
-
- Let's start off by having it give us a list of everything about Unisys that
- this server knows. "Everything" is pretty much a good place to start, since we
- can't go wrong. If we come up with nothing, then that's what's available. The
- basic command to list machines is "ls" like the Unix directory command.
-
- > ls unisys.com
- [kauai.mcl.unisys.com]
- Host of domain name Internet address
- unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- unisys.com server = kronos.nisd.cam.unisys.com 3600
- kronos.nisd.cam.unisys.com 128.170.2.8 3600
- unisys.com server = kauai.mcl.unisys.com 3600
- kauai.mcl.unisys.com 128.126.180.2 43200
- unisys.com server = io.isf.unisys.com 3600
- io.isf.unisys.com 128.126.195.20 3600
- reston.unisys.com server = aviary.stars.reston.unisys.com 3600
- aviary.star.reston.unisys.com 128.126.160.3 3600
- aviary.star.reston.unisys.com 128.126.162.1 3600
- reston.unisys.com server = kauai.mcl.unisys.com 3600
- kauai.mcl.unisys.com 128.126.180.2 43200
- rosslyn.unisys.com server = aviary.stars.reston.unisys.com 3600
- aviary.stars.reston.unisys.com 128.126.160.3 3600
- aviary.stars.reston.unisys.com 128.126.162.1 3600
- rosslyn.unisys.com server = kauai.mcl.unisys.com 3600
- kauai.mcl.unisys.com 128.126.180.2 43200
- rmtc.unisys.com server = rmtcf1.rmtc.unisys.com 3600
- rmtcf1.rmtc.unisys.com 192.60.8.3 3600
- rmtc.unisys.com server = gvlv2.gvl.unisys.com 3600
- gvlv2.gvl.unisys.com 128.126.220.102 3600
- sp.unisys.com server = dsslan.sp.unisys.com 3600
- dsslan.sp.unisys.com 129.218.32.11 3600
- sp.unisys.com server = sys3.slc.unisys.com 3600
- sys3.slc.unisys.com 129.221.15.85 3600
- cam.unisys.com server = kronos.nisd.cam.unisys.com 3600
- kronos.nisd.cam.unisys.com 128.170.2.8 3600
- cam.unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- prc.unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- prc.unisys.com server = kronos.prc.unisys.com 3600
- kronos.prc.unisys.com 128.170.2.8 3600
- prc.unisys.com server = walt.prc.unisys.com 3600
- walt.prc.unisys.com 128.126.2.10 3600
- walt.prc.unisys.com 128.126.10.44 3600
- culv.unisys.com server = formal.culv.unisys.com 3600
- formal.culv.unisys.com 192.67.92.30 3600
- culv.unisys.com server = kronos.nisd.cam.unisys.com 3600
- kronos.nisd.cam.unisys.com 128.170.2.8 3600
- slc.unisys.com server = sys3.slc.unisys.com 3600
- sys3.slc.unisys.com 129.221.15.85 3600
- slc.unisys.com server = dsslan.sp.unisys.com 3600
- dsslan.sp.unisys.com 129.218.32.11 3600
- slc.unisys.com server = nemesis.slc.unisys.com 3600
- nemesis.slc.unisys.com 128.221.8.2 3600
- bb.unisys.com server = sunnc.wwt.bb.unisys.com 3600
- sunnc.wwt.bbs.unisys.com 192.39.41.2 3600
- bb.unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- isf.unisys.com server = orion.ISF.unisys.com 3600
- orion.ISF.unisys.com 128.126.195.7 3600
- isf.unisys.com 128.126.195.1 3600
- isf.unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- isf.unisys.com server = io.isf.unisys.com 3600
- io.isf.unisys.com 128.126.195.20 3600
- gvl.unisys.com 128.126.220.102 172800
- gvl.unisys.com server = gvlv2.gvl.unisys.com 3600
- gvlv2.gvl.unisys.com 128.126.220.102 3600
- gvl.unisys.com server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- mcl.unisys.com 128.126.180.2 43200
- mcl.unisys.com server = kauai.mcl.unisys.com 43200
- kauai.mcl.unisys.com 128.126.180.2 43200
- mcl.unisys.com server = burdvax.prc.unisys.com 43200
- burdvax.prc.unisys.com 128.126.10.33 3600
- mcl.unisys.com server = kronos.nisd.cam.unisys.com 43200
- kronos.nisd.cam.unisys.com (dlen = 1152?) 4096
- ListHosts: error receiving zone transfer:
- result: NOERROR, answers = 256, authority = 0, additional = 3.
-
- Bummer, an error. Funny, it claims there isn't an error, yet it screwed up the
- kronos address and knocked me out. Apparently, this domain server is screwed.
- Oh well, I guess that's really their problem because in the information it gave
- us, it was able to provide all the answers we needed to figure out the next
- step!
-
- Quick analysis of the above information shows that most of the servers were
- connected to at LEAST two other servers. Quite impressive: A fault-tolerant
- TCP/IP network. Since it is fault tolerant, we can go ahead and use a
- different machine to poke into the "mcl.unisys.com" domain. Since "mcl" stands
- for McLean, that's where we want to go.
-
- Remember that NIC told us that kauai.mcl.unisys.com had an alias? It was also
- called "mcl.unisys.com". Looking at the above list, we see toward the bottom
- that mcl.unisys.com is also domain served by the computers
- burdvax.prc.unisys.com and kronos.nisd.cam.unisys.com. Let's connect to one of
- them and see what we can gather!
-
- Whenever a server starts acting screwy like kauai was doing, I make it a habit
- of using IP numbers when they are available. I'm going to connect to
- burdvax.prc.unisys.com through its IP address of 128.126.10.33.
-
- > server 128.126.10.33
- Default server: [128.126.10.33]
- Address: 128.126.10.33
-
- Now that we are connected, let's see the network information again, but this
- time let's try something different and possibly more useful. This time we will
- use the -h command, which happens to describe the computer type (CPU) and the
- operating system it runs on (OS) which will give us a better idea of what we
- are dealing with.
-
- > ls -h mcl.unisys.com
- Host or domain name CPU OS
- maui.mcl.Unisys.COM SUN-2/120 UNIX 43200
- cisco.mcl.Unisys.COM CISCO GATEWAY CISCO 43200
- kauai.mcl.Unisys.COM SUN-3/180 UNIX 43200
- voyager.mcl.Unisys.COM SUN-4/330 UNIX 43200
- dial.mcl.Unisys.COM SUN-3/260 UNIX 43200
- astro.mcl.Unisys.COM SUN-3/60 UNIX 43200
- hotrod.mcl.Unisys.COM Unisys 386 SCO/UNIX 43200
- oahu.mcl.Unisys.COM VAX-11/785 UNIX 43200
- lanai.mcl.Unisys.COM SUN-3/160 UNIX 43200
- mclean_is.mcl.Unisys.COM 386 NOVELL 43200
-
- WOW! Look at all those Suns! I guess Unisys has no faith in their own
- computers or something! If only President Bush could see this display of a
- company backing their product! In fact, the only Unisys computer in this whole
- lot is a cheesy 386 clone which probably is some guy's desktop machine.
-
- Once again, there is some fascinating information here. Let's run through it
- really quick:
-
- Maui is a Sun 2, which is a really old RISC computer. You don't see many of
- these around but they still can be useful for storing stuff on. But then
- again, it probably is faster than a PC!
-
- Oahu is a Vax-11 which is apparently running Ultrix. This may be where Unisys
- hoards all their programmers since it isn't being used for serious networking
- (at least, as far as we can tell).
-
- Mclean_is happens to be the file server for a PC network. We can't really tell
- from this point how many computers are on this network, but it could be
- possible it is used for public information trade, where secretaries or
- receptionists use it to confirm trade and scheduling.
-
- Hotrod is also a 386, made by Unisys even! Oddly, it is running a copy of SCO
- Unix, which means it is, no doubt, a personal computer someone uses for Unix
- programming. If Unisys were itself a part of the government, I'd think this
- computer would have been a kludged bidding contract which they got stuck with
- because they were aiming for lowest bid and were unfortunately not very picky.
-
- Voyager is an interesting machine, which is apparently the most modern on this
- network. Since it is a Sun-4 computer (probably IPX) it would be a high-speed
- graphics workstation. This could be the machine where many CAD applications
- are stored and worked on. Another possibility is that Sun 4 computers were
- extremely expensive when they purchased this network of Suns, and they
- purchased this one machine to be the file server to the other Sun 3s and the
- Sun 2. If you were to gain access to one of the other machines, it's possible
- you would have access to all of them.
-
- Cisco is just a standard Cisco Router/Gateway box, linking that particular
- network to the Internet.
-
- Kauai is a messed up domain server, big deal. It might work on the same
- network as Astro and Lanai.
-
- Dial is a Sun-3. Is there something in a name? This could be the
- telecommunications dial-in for the network. Maybe the same computer system has
- a dialout attached to it. It might even be possible that "dial" has a guest
- account for people logging in so that they can easily connect to other
- computers on the same network (probably not).
-
- Astro and Lanai are also Sun 3 computers. It isn't quite obvious what their
- purpose is. Essentially, we have the impression that they were all purchased
- about the same time (explaining the large number of Sun-3 computers in this
- network) and it is quite possible they are just linked up to the Sun 4 in a
- file sharing network. It is also possible they are older and fundamental to
- the operation of Unisys's communication platform at this particular site.
-
- There is one flaw that makes using the -h switch somewhat unreliable:
- Sometimes people realize you can do this and take the time to remove or never
- include the information about the individual machines on the network.
- Therefore, it is always best for you to do a "ls <domain>" and check everything
- out in case a computer has been removed. Using "telnet" to connect to the
- computer is usually a foolproof method of finding out what computer it is they
- are talking about.
-
- > ls mcl.unisys.com
- [[128.126.10.33]]
- Host or domain name Internet address
- mcl.Unisys.COM server = kauai.mcl.unisys.com 3600
- kauai.mcl.unisys.com 128.126.180.2 3600
- mcl.Unisys.COM server = burdvax.prc.unisys.com 3600
- burdvax.prc.unisys.com 128.126.10.33 3600
- mcl.Unisys.COM server = kronos.nisd.cam.unisys.com 3600
- kronos.nisd.cam.unisys.com 128.170.2.8 3600
- mcl.Unisys.COM 128.126.180.2 43200
- maui.mcl.Unisys.COM 128.126.180.3 43200
- cisco.mcl.Unisys.COM 128.126.180.10 43200
- kauai.mcl.Unisys.COM 128.126.180.2 3600
- voyager.mcl.Unisys.COM 128.126.180.37 43200
- dial.mcl.Unisys.COM 128.126.180.36 43200
- LOCALHOST.mcl.Unisys.COM 127.0.0.1 43200
- astro.mcl.Unisys.COM 128.126.180.7 43200
- hotrod.mcl.Unisys.COM 128.126.180.125 43200
- oahu.mcl.Unisys.COM 128.126.180.1 43200
- lanai.mcl.Unisys.COM 128.126.180.6 43200
- mclean_is.mcl.Unisys.COM 128.126.180.9 43200
-
- Well, running down the list, it appears that there aren't any more computers
- important to this domain that we don't know already. LOCALHOST is just another
- way of saying connect to where you are, so that isn't a big deal. Hotrod being
- separate from the rest of the machines seems apparent since its IP address is
- x.x.x.125, which is quite separate from the others. Even though this doesn't
- have to be, it seems it is a wiring kludge -- probably for an office like I
- surmised.
-
- The next step? Go ahead and hack away! This is where all those system hacks
- people trade on the net and all those CERT Advisories become useful. If you
- become good hacking a single machine (Suns, for example), using nslookup will
- help you identify those machines and make it easier for you to hack.
-
- Looking for annex computers, libraries, guest machines, and other such
- computers also becomes easy when you use nslookup, because the names and
- computer types are there for your convenience. Checking on sites by selecting
- interesting "special purpose" machines with nslookup first can yield good
- results. People have called this "netrunning," and it sounds like as good a
- name as any.
-
- Of course, the other big problem when dealing with domain servers is trying to
- identify them. The largest list of domain servers can be found off of the
- Department of Defense Network Listing (usually called hosts.txt) which is
- available almost everywhere on the Internet through anonymous FTP. Here is a
- rundown on how to get the file:
-
- [lycaeum][3]> ftp wuarchive.wustl.edu
-
- 220 wuarchive.wustl.edu FTP server (Version 6.24 Fri May 8 07:26:32 CDT 1992)
- ready.
- Remote host connected.
- Username (wuarchive.wustl.edu:rack): anonymous
- 331 Guest login ok, send your complete e-mail address as password.
- Password (wuarchive.wustl.edu:anonymous):
- 230- This is an experimental FTP server. If your FTP client crashes or
- 230- hangs shortly after login please try using a dash (-) as the first
- 230- character of your password. This will turn off the informational
- 230- messages that may be confusing your FTP client.
- 230-
- 230- This system may be used 24 hours a day, 7 days a week. The local
- 230- time is Wed Jun 3 20:43:23 1992.
- 230-
- 230-Please read the file README
- 230- it was last modified on Mon Mar 2 08:29:25 1992 - 93 days ago
- 230-Please read the file README.NFS
- 230- it was last modified on Thu Feb 20 13:15:32 1992 - 104 days ago
- 230 Guest login ok, access restrictions apply.
-
- ftp> get /network_info/hosts.txt
- 200 PORT command successful.
- 150 Opening ASCII mode data connection for /network_info/hosts.txt (1088429 bytes).
- 226 Transfer complete.
- Transferred 1109255 bytes in 182.95 seconds (6063.29 bytes/sec, 5.92 KB/s).
-
- ftp> quit
- 221 Goodbye.
-
- Now let's convert it to a file we can use effectively: let's take out of that
- huge list of only the machines that are domain servers:
-
- [lycaeum][4]> grep -i domain hosts.txt > domains
-
- Okay, now that we have done that, let's prove that this is a way of finding a
- domain server without connecting to anyplace. Let's just use the grep command
- to search the file for a server in the mcl.unisys.com domain:
-
- [lycaeum][5]> grep -i mcl.unisys.com domains
- HOST : 128.126.180.2 : KAUAI.MCL.UNISYS.COM,MCL.UNISYS.COM : SUN-3/180 :
- SUNOS : TCP/TELNET,TCP/FTP,TCP/SMTP,UDP/DOMAIN :
- [lycaeum][6]>
-
- And there you have another way. Everything we looked at is here: IP number,
- the name, the "alias," the computer type, the operating system, and a brief
- list of network protocols it supports, including the domain server attribute.
- However, none of the other machines on the mcl.unisys.com network were
- displayed. The DoD isn't a complete list of network machines, only the network
- machines that are vital to the functioning of the Internet (in the last year,
- this list has grown from about 350K to 1.1 megabytes -- and this only reflects
- the "new" networks, not including the addition of new machines onto old
- networks; the Internet is definitely "in;" I believe it was estimated 25%
- growth per month!).
-
- Obviously, this is very effective when going after university sites. It seems
- they have too many machines to take good care of security on. Essentially, the
- DoD list contains much the same information as NIC does, and is about a million
- times more discreet. I'm not sure if NIC is fully logged, but it does have a
- staff Head of Security (*snicker*).
-
- Well, that will pretty much wrap it up for this file. Hope some of it was
- useful for you.
- _______________________________________________________________________________
-
-
-