___(\·----------------------- ---- --- -- - - - \) IN A WORLD OF DREAMS - IN A WORLD OF PASSION THIS FILE DECIDED TO PASS ONE OF THE LAST AND REAL BULLETIN BOARD SYSTEMS IN CENTRAL EUROPE THE ONLY WAY TO SURVIVE - FAITH! (\ ___ - - --- --- ------- ----------------------·\) @BEGIN_FILE_ID.DIZ *[pR0TEUS]* _____ ______________| |____/\________ \_______ \_ ____/ _____/ | | | | \_____ \__ | ______|________| | / |_____| H P A V C= |________/ | | | hOW t0 hACK A :| | uNiX sYSTEM :| | :| !-(98-07-11)-------! `-----------[cPT]--' (How To Hack a UNiX System) @END_FILE_ID.DIZ .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. ·[pR0TEUS]· _______________________________________________ ______________\______ \_ _ \_ __/___ ____ \_ | |__________ \_________ | __) _| | | | | `_____| | | _______/ | | | \_ \_ ` | ` | ! | ' _|_____ \__ | ______|____|_____|_______|________|________|_______\ | | |_______| \_________| cORRUPT * sTANELY * JUMAN * pYTON _ _ _ _ .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. ( This file contains IS0-aSCii ) ( For PC- Users this file may ) ( look very fishy :) ) ·tHE tEXT iS d0WN hERE· ·dOWN hERE· ·dOWN hERE· ·sOMEWHERE· ¿ nowhere ? HERE :) . ·[pR0TEUS]· _______________________________________________ ______________\______ \_ _ \_ __/___ ____ \_ | |__________ \_________ | __) _| | | | | `_____| | | _______/ | | | \_ \_ ` | ` | ! | ' _|_____ \__ | ______|____|_____|_______|________|________|_______\ | | |_______| \_________| cORRUPT * sTANELY * JUMAN * pYTON __ \_O : pROTEUz : : . / Æ# _ø _____/ : hACKiNG ...:...: ( uØw«wwÆ# |_,ww__ : _, : : . ¬\ _د ¯Ø¹ |_.._°# : Ø# ø-, :.... ____) -@ ÆK _ø@°"°Ø@ _øww ,Ø´ _ °-° :.. [_____ _ __ _ - ° 7#__wÆØ_ .ØK : Æ#wø@´ á#_ ,_ __ | |¯¬ ¶@° ¬#w__ á@¶#_ _Ø" ØØ@°¶&_ ____ `------' ¯¬¯ |¶ ¬0x áØ´ öع 7Ø _ؤ°°¶# :.|... ¯ : ¬° Æ@" ØK___ØK : : : ·[cPT]· _°°¶@Ø# u . :......: áØ__ ع ¨°#«#° . \ ·hOW tO hACK a UNiX sYSTEM· / \ / \___________________________________________________________/ ·[971117]· 1: How to recognize a unix-system. 2: different types of unix systems 3: Basic Commands 4: How to get in (The fun part :) ) 5: How to get root access 6: Sysop command 8: How to crash the system 9: Word list 10: Unix history map ------------------------------------------------------------------------------ C1 HOWTO RECOGNIZE A UNIX SYSTEM: First of all... look at the login in prompt if the loginprompt looks like Login: or Login? It should be a unix system if the login propmt looks like this or similar. C2 DIFFERENT TYPES OF UNIX SYSTEMS: .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. The most commen UNIX system is Unix system V, second was Sun OS 5.4 but now is Solaris, And the third is Linux. Here are some unix system SVR4 (unix system v) SOLARIS SUN OS LINUX SCO UNIX BSD FREE BSD AIX MINIX XENIX OFS ----------- SVR4 Is my third favourit system. Today, this is the most common unix system for almost all existing computor types. SOLARIS Sun Microsystems famous Soaris :) It's mostely based on SVR. Comes with the Bash,KSH,CSH shells. SUN OS Is the console part of solaris LINUX: Linux is the best unix system (At least i think and i belive there are many who shares my thoughts :).) Linux is based on SVR4 and BSD. It comes with Tom's C shell and the bourne shell. SCO UNIX: Wants to be the unix system of the future. It's the most common unix system on Intel based computors [60%]. (that is what we call Personal crap(PC)) It is based on the Xenix system. SCO Unix comes with 3 kind's of shells: Bourne shell/C-shell/Korn shell BSD: Is a commonly used unix system worldwide. Based on the bourne shell. was created in Berkeley university. Shells: Bourne shell/Tom's C shell/Korn Shell FREE BSD: a BSD offspring. MINIX: Mini linux. Mosteley based on Linux. Useless. XENIX: No comment's i hate it. even if it is the best attempt from microsoft to make a unix system. This system is mosteley based on the UNIX I version 6. OSF Based on the berkeley unix.. Suxx like shit C3 _ _ _ _ .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. BASIC COMMANDS: This explains all: UNIX: MSDOS: AMIGA DOS 3.0: ls dir dir (list) cat type type chmod attrib protect cd cd cd mkdir md makedir rmdir rd delete "drawername" rm del delete mv move NOTHING tar pkzip lha su NOTHING NOTHING login NOTHING NOTHING logout exit endcli ftp ftp NOTHING telnet NOTHING NOTHING vi edit ed,memacs,ced sh command newshell,cli,shell xinit,startx,xstart,x11 win loadwb,gowb free mem avail pwd cd cd passwd NOTHING NOTHING cp copy copy alias NOTHING alias jobs NOTHING Process ps NOTHING Process & NOTHING run PS1,Set prompt Set Prompt Prompt sort sort sort passwd NOTHING NOTHING help help NOTHING LS: easy to understand CAT: cat CHMOD : chmod augo+-rwx example: Chmod ugo+rw /etc/passwd every user on the system can read the file now. CD: easy to understand MKDIR: mkdir RMDIR: rmdir RM: rm -i MV: mv or mv TAR: tar cv to packdown tar xv to extract SU: su LOGIN: Just write "login" to relogin LOGOUT: Just write "logout" to exit FTP: ftp self explaining TELNET: telnet VI: vi SH: start new Shell. XINIT: self explaining FREE: shows avaiable memory PWD: show current directory PASSWD: self explaining CP: cp ALIAS: alias ="" or alias "" ex: alias xinit "x" now you can write X instead of xinit. JOBS: show jobs. PS: show processes running &: run program in the background PS1: ps1="" or set prompt "" SORT: self explaining PASSWD: change password HELP: shows you a help file. ( Instead of reading this list of commands when you want to learn unix ) ( borrow "inside unix" or "the linux bible" at your local library ) C4 _ _ _ _ .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. (:(:(:(:(:(:(:(:(:(:(:(:(:(:(:(:):):):):):):):):):):):):):):):):):):):):):) HOW TO GET IN: So, now were here. there are many ways to hack your self in to a unix system the best and safest way is to just sitt down and start looking after users. ok, i guess you wonder, How should i do that??? Oki. Never mind. Getting Login Names and passwords: On UNIX systems the file that contains the passwords for all the users on the system is located in the /etc directory. The filename is passwd. I bet your thinking...."Great. All I have to do is get the file called /etc/passwd and I'll be a hacker." If that is what you are thinking then you are dead wrong. All the accounts in the passwd file have encrypted passwords. These passwords are one-way encrypted which means that there is no way to decrypt them. However, there are programs that can be used to obtain passwords from the file. Such programs uses a dictionary file composed of thousands of words. they compares the encrypted forms of the words in the list to the encrypted passwords in the passwd file and it notifies you when it finds a match. One wordlist can be found at the end of this file. That was the easy part. Now to the hard part. the system administrator has a file that has passwords for everyone on his or her system, and they are not going to just give it to you. You have to have a way to retrieve the /etc/passwd file without logging into the system. There are 2 simple ways that this can sometimes be accomplished. Often the /etc directory is not blocked from FTP. To get the passwd file this way try using an FTP client to access the site anonymously then check the /etc directory to see if access to the passwd file is restricted. If it is not restricted then download the file and run Cracker Jack on it. If it is restricted then try plan B. On some systems there is a file called "PHF" in the /cgi-bin directory. If there is then you are in luck. PHF allows users to gain remote-access to files (including the /etc/passwd file) over the www. To try this method goto your web browser and type in this URL: http://xxx.xxx.xxx/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd Then substitute the site you are trying to hack for the xxx.xxx.xxx. For example, if I wanted to hack Geocities (and I have already) I would type in http://www.geocities.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd (I enyoy geocities lame security flaw :) ) If the preceding to methods fail then try any way you can think of to get that file. If you do get the file and all the items in the second field are X or ! or * then the password file is shadowed. Shadowing is just a method of adding extra security to prevent hackers and other unwanted people from using the password file. Unfortunately there is no way to "unshadow" a password file but sometimes there are backup password files that aren't shadowed. Try looking for files such as /etc/shadow and other stuff like that. If that's the case i can't help you :(. C5 HOW TO GET ROOT ACCESS .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. If your lucky, you got the root password when you decrypted the /etc/passwd. But if you didnt, here is a tip how you could do. Login with an user account at the system you want to gain root access at. write this at the prompt. ftp Server wants you to enter login name: press enter Server wants you to enter password : press enter at the prompt type. quota user ftp then type quota cwd ~root then type quota pass ftp Done! :) Now delete the logfile so they cant see you where online. the logfiles lies in /var/adm This DOES work at older systems like universities runns. It may work with linux allso , (i have not tried it yet on linux) C9 WORDLIST aaa daniel jester rascal academia danny johnny really ada dave joseph rebecca adrian deb joshua remote aerobics debbie judith rick airplane deborah juggle reagan albany december julia robot albatross desperate kathleen robotics albert develop kermit rolex alex diet kernel ronald alexander digital knight rosebud algebra discovery lambda rosemary alias disney larry roses alpha dog lazarus ruben alphabet drought lee rules ama duncan leroy ruth amy easy lewis sal analog eatme light saxon anchor edges lisa scheme andy edwin louis scott andrea egghead lynne scotty animal eileen mac secret answer einstein macintosh sensor anything elephant mack serenity arrow elizabeth maggot sex arthur ellen magic shark asshole emerald malcolm sharon athena engine mark shit atmosphere engineer markus shiva bacchus enterprise marty shuttle badass enzyme marvin simon bailey euclid master simple banana evelyn maurice singer bandit extension merlin single banks fairway mets smile bass felicia michael smiles batman fender michelle smooch beauty fermat mike smother beaver finite minimum snatch beethoven flower minsky snoopy beloved foolproof mogul soap benz football moose socrates beowulf format mozart spit berkeley forsythe nancy spring berlin fourier napoleon subway beta fred network success beverly friend newton summer bob frighten next super brenda fun olivia support brian gabriel oracle surfer bridget garfield orca suzanne broadway gauss orwell tangerine bumbling george osiris tape cardinal gertrude outlaw target carmen gibson oxford taylor carolina ginger pacific telephone caroline gnu painless temptation castle golf pam tiger cat golfer paper toggle celtics gorgeous password tomato change graham pat toyota charles gryphon patricia trivial charming guest penguin unhappy charon guitar pete unicorn chester hacker peter unknown cigar harmony philip urchin classic harold phoenix utility coffee harvey pierre vicky coke heinlein pizza virginia collins hello plover warren comrade help polynomial water computer herbert praise weenie condo honey prelude whatnot condom horse prince whitney cookie imperial protect will cooper include pumpkin william create ingres puppet willie creation innocuous rabbit winston creator irishman rachmaninoff wizard cretin isis rainbow wombat daemon japan raindrop yosemite dancer jessica random zap C10 unix family tree ~~~~~~~~~~~~~~~~ ( Version 1 ) | ( Version 2 ) ( Version 3 ) ( Version 4 ) ( Version 5 ) ( Version 6 )___________________ / | ( 4 BSD ) _____/ | | ( Xenix )_/ | (4.2 BSD) | (Unix-II) | | | | | (Unix-III) (4.3 BSD) | | __| (SCO Unix) (Unix-V)_ / \_____ | | \______( AIX )__________/ \ \ \ (SVR 3.2) / (MACH) \ \____ | ( v1 ) | | \___(SVR 3.2) ______/ | | | / (NeXt Step) | (SVR 4.0)____________/ | \/ | | /\_____(Sun OS) | / | | / (SOLARIS) | / | (Linux) | | | (Free BSD) Made by Corrupt the chief of pROTEUS! iN 1997-12-29 Special thanx and a new Sun Enterprise 450 to: Dalamar For helping me with linux/hacking. Eagle For Intruducing me to unix, and hacking. Coke For giving me H/P programs. thorpe For helping me getting started with modeming iRONFiST For giving me accounts at unix/vms systems :) Rasmus For giving humanity food for 4million years :) amigainfo For being there protecting the sacred amiga :) Energy 104.0Mhz For Playing good music day and night :) Sun Microsoftsystems For just being there. :) Only thorpe understands about rasmus .. THANX Special FUCKOFF's and several 200MT HydrogenBombs to: Orvar For Allways disturbing me. DIE! Codeman For living in the same solarsystem as me. and being such a damn lamererous lamer! DIE Greger No comments. Gey-martin(crocker) For being so fucking dumb! (his iq is highest 85, honestly!) Martin Nilsson For being Motional disturbed. Nick Noslund For Thinking the world is around his house. Thorp For Abusing rasmus, the poor little doggie :( Carlitos For Thinking he's Einstein (E=mailc²) Sapphire For Nuking me from his Board two years ago. Case For Being Cought by the coppers. CD-trading razor For Being Cought by the coppers. CD-trading Dansken&boggan For Being Cought by the coppers. CD-trading Microsoft For Existing Magnus Juel For being ugly. Bill microsoftbrain gates For ever have been born!. _ _ _ _ .ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç.ç׳°³×ç. ---------------------------[DANGER! LAMER!]--------------------------------- If YOU see anyone that calls himself "crocker" or "next" PING HIM! MAIL BOMB HIM! Please.. (; E-mail=pcmartin@hotmail.com ---------------------------------------------------------------------------- Visit our Homepage: HTTP://WWW.proteus.8m.com/haska.html ............ /\ : : / \ _________________________________________/ \ \ / \ \___ / \ \____/\ _______ \ \ ______/\\ /_______\ \ \ \_____ \\ __/ \ / \ _ / | | \\_______/ __\ /__ \_____ ______ / \____/ | ` /____ ____/\ \_ \_/__/ ______\/ __ __\/ /\_____ _| ____/ Y __ \ / | \ / __ \ / Y \ / ___/ \_ --¦ l Y | Y _____Y | Y___ \_ | | | | | | · | / `------^-----^-------^--[cPT]^--------^-------^---\_/ : : ........: : : :) : :.. : : : :................: ......: : ......................................... : : : pR0TEUS: H/P/A/V/T/C/ : :.......................................: __ \_O : : : . / Æ# _ø _____/ : hACKiNG ...:...: ( uØw«wwÆ# |_,ww__ : _, : : . ¬\ _د ¯Ø¹ |_.._°# : Ø# ø-, :.... ____) -@ ÆK _ø@°"°Ø@ _øww ,Ø´ _ °-° :.. [_____ _ __ _ - ° 7#__wÆØ_ .ØK : Æ#wø@´ á#_ ,_ __ | |¯¬ ¶@° ¬#w__ á@¶#_ _Ø" ØØ@°¶&_ ____ `------' ¯¬¯ |¶ ¬0x áØ´ öع 7Ø _ؤ°°¶# :.|... ¯ : ¬° Æ@" ØK___ØK : : : ·[cPT]· _°°¶@Ø# u . :......: áØ__ ع ¨°#«#° . ( This file contains IS0-aSCii ) ( For PC- Users this file may ) ( look very fishy :) ) ----------------------------------[EOF]----------------------------------- / \ ·/(_____ sPEEEEEEEED aND fRIENDS ONlY! _____)\· / \ fILE pASSED tHE L.E.BBS \ _____ _____ / ·\( sPEEEEEEEED aND fRIENDS ONlY! )/· \ /