💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › cyberhac.txt captured on 2023-01-29 at 07:39:38.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

   -=               Hacking Control Data Corporation's Cyber              =-

  This article will cover getting into and using NOS (Networking
Operating System) version 2.5.2 running on a Cyber 730 computer.  Cybers
generally run this operating system so I will just refer to this environ-
ment as Cyber.  Also, Cyber is a slow and outdated operating system that
is primarily used only for college campuses for running compilers.  First
off after you have scanned a bunch of carriers you will need to know how
Cyber identifies itself.  It goes like this:
WeLCOME TO THE NOS SOFTWARE SYSTEM.
COPYRIGHT CONTROL DATA 1978, 1987.
88/02/16. 02.36.53. N265100
CSUS CYBER 170-730.                     NOS 2.5.2-678/3.    
FAMILY:    
You would normally just hit return at the family prompt.  Next prompt is:
USER NAME: 
Usernames are in the format  abcdxxx  where a is the location of where
the account is being used from (A-Z).  the b is a grouping specifying
privs and limits for the account- usually A-G -where A is the lowest
access.  Some examples of how they would be used in a college system:
A = lowest access - class accounts for students
B = slightly higher than A (for students working on large projects)
C = Much higher limits, these accounts are usually not too hard to get
    and they will normally last a long time!  Lab assistants use these.
D = Instructors, Lecturers, Professors.. etc..
E = same... (very hard to get these!)
The C and D positions are usually constant according to the groupings.  
For example, a class would have accounts ranging from NADRAAA-AZZ
                                                          ^^^ ^^^
                                                 These can also be digits
There are also special operator accounts which start with digits instead
of numbers. (ie 7ETPDOC)  These accounts can run programs such as the 
monitor which can observe any tty connected to the system...
The next prompt will be for the password, student account passwords cannot
be changed and are 7 random letters by default, other account passwords
can be changed.  You get 3 tries until you are logged out.  It is very
difficult if not impossible to use a brute force hacker or try to guess
someones account.. so how do you get on?  Here's one easy way...
Go down to your local college (make sure they have a cyber computer!)
then just buy a class catalog (they only cost around 50 cents) or you
could look, borrow, steal someone else's... then find a pascal or fortran
class that fits your schedule!  You will only have to attend the class
3 or 4 times max.  Once you get there you should have no trouble, but
if the instructor asks you questions about why you are not on the roll,
just tell him that you are auditing the class (taking it without enrolling
so it won't affect your GPA).  The instructor will usually pass out 
accounts on the 3rd or 4th day of class.. this method also works well
with just about any system they have on campus!  Another way to get
accounts is to go down to the computer lab and start snooping!  Look
over someones shoulder while they type in their password, or look thru
someones papers while they're in the bathroom, or look thru the assistants
desk while he is helping someone... (I have acquired accounts both ways,
and the first way is alot easier with less hassles)  Also, you can use
commas instead of returns when entering username and password.
Example:  at the family prompt, you could type  ,nadrajf,dsfgkcd
                     or at the username prompt   nadrajf,dsfgkcd
After you enter your info, the system will respond with:
JSN: APXV, NAMIAF
/
The 'APXV, NAMIAF' could be different depending on what job you were
attached to.  The help program looks alot neater if you have vt100 
emulation, if you do, type [screen,vt100] (don't type the brackets! from
now on, all commands I refer to will be enclosed in brackets)
Then type help for an extensive tutorial or a list of commands.
Your best bet at this point is to buy a quick reference guide at the
campus because I am only going to describe the most useful commands.
The / means you are in the batch subsystem, there are usually 6 or 7 
other subsystems like basic, fortran, etc... return to batch mode by
typing [batch].
Some usefull commands:
   CATLIST    -  will show permanant files in your directory.
   ENQUIRE,F  -  displays temporary files in your workspace.
   LIMITS     -  displays your priveledges.
   INFO       -  get more online help.
   R          -  re-execute last command.
   GET,fn     -  loads fn into the local file area.
   CHANGE     -  change certain specs on a file.
   PERMIT     -  allow other users to use one of your files.
   REWIND,*   -  rewinds all your local files.
   NEW,fn     -  creates new file.
   PURGE      -  deletes files.
   LIST,F=fn  -  list file.
   UPROC      -  create an auto-execute procedure file.
   MAIL       -  send/receive private mail.
   BYE        -  logoff.
Use the [helpme,cmd] command for the exact syntax and parameters of these
commands.  There are also several machine specific 'application' programs
such as pascal, fortran, spitbol, millions of others that you can look
up with the INFO command... there are also the text editors; edit, xedit,
and fse (full screen editor).  Xedit is the easiest to use if you are
not at a Telray 1061 terminal and it has full documentation.  Simply
type [xedit,fn] to edit the file 'fn'.
Special control characters used with Cyber:
Control S and Control Q work normally, the terminate character is 
Control T followed by a carriage return.  If you wanted to break out of
an auto-execute login program, you would have to hit ^T C/R very fast
and repetitively in order to break into the batch subsystem.  Control Z
is used to set environment variables and execute special low level
commands, example: [^Z TM C/R] this will terminate your connection...
So now you're thinking, what the hell is Cyber good for?  Well, they 
won't have any phone company records, and you can't get credit information
from one, and I am not going to tell you how to crash it since crashing
systems is a sin.  There are uses for a cyber though,  one handy use is
to set up a chat system, as there are normally 30-40 lines going into
a large university cyber system.  I have the source for a chat program
called the communicator that I will be releasing soon.  Another use is
some kind of underground information exchange that people frequently
set up on other systems, this can easily be done with Cyber.
Procedure files:
A procedure file is similiar to a batch file for MS-DOS, and a shell
script for UNIX.  You can make a procedure file auto-execute by using
the UPROC command like [uproc,auto] will make the file 'auto', auto 
execute.  There is also a special procedure file called the procfile in
which any procedure may be accessed by simply a - in front of it.  If your
procfile read:
.proc,cn.
.*  sample procedure
$catlist/un=7etpdoc.
$exit.
then you could simply type -cn and the / prompt and it would execute
the catlist command.  Now back to uprocs,  you could easily write a whole
BBS in a procedure file or say you wanted to run a chat system and you
did not want people to change the password on your account, you could
do this:
.proc,chat,
PW"Password: "=(*A).
$ife,PW="cyber",yes.
   $chat.
   $revert.
   $bye.
$else,yes.
   $note./Wrong password, try again/.
   $revert.
   $bye.
$endif,yes.
This procedure will ask the user for a password and if he doesn't type
"cyber" he will be logged off.  If he does get it right then he will be
dumped into the chat program and as soon as he exits the chat program,
he will be logged off.  This way, the user cannot get into the batch
subsystem and change your password or otherwise screw around with the
account.  The following is a listing of the procfil that I use on my
local system, it has a lot of handy utilities and examples...
----  cut here  ----
.PROC,B.
.******BYE******
$DAYFILE. 
$NOTE.//////////////////////////
$ASCII.
$BYE.
$REVERT,NOLIST.
#EOR
.PROC,TIME.
.******GIVES DAY AND TIME******
$NOTE./THE CURRENT DAY AND TIME IS/
$FIND,CLOCK./
$REVERT,NOLIST.
#EOR
.PROC,SIGN*I,IN.
.******SIGN PRINT UTILITY******.
$GET,IN.
$FIND,SIGN,#I=IN,#L=OUT.
$NOTE./TO PRINT, TYPE:   PRINT,OUT,CC,RPS=??/
$REVERT,NOLIST.
#EOR
.PROC,TA. 
.******TALK******
$SACFIND,AID,COMM.
$REVERT,NOLIST.
#EOR
.PROC,DIR,UN=,FILE=.
.******DIRECTORY LISTING OF PERMANENT FILES****** 
$GET(ZZZZDIR=CAT/#UN=1GTL0CL) 
ZZZZDIR(FILE,#UN=UN)
$RETURN(ZZZZDIR)
$REVERT,NOLIST.
#EOR
.PROC,Z19.
.******SET SCREEN TO Z19******
$SCREEN,Z19.
$NOTE./SCREEN,Z19.
$REVERT,NOLIST.
#EOR
.PROC,VT. 
.******SET SCREEN TO VT100******
$SCREEN,VT100.
$NOTE./SCREEN,VT100.
$REVERT,NOLIST
#EOR
.PROC,SC. 
.******SET SCREEN TO T10******
$SCREEN,T10.
$NOTE./SCREEN,T10.
$REVERT,NOLIST
#EOR
.PROC,C.
.******CATLIST******
$CATLIST. 
$REVERT,NOLIST.
#EOR
.PROC,CA. 
.******CATLIST,LO=F******
$CATLIST,LO=F.
$REVERT,NOLIST.
#EOR
.PROC,MT. 
.******BBS******
$SACFIND,AID,MTAB.
$REVERT,NOLIST.
#EOR
.PROC,LI,FILE=.
.******LIST FILE******
$GET,FILE.
$ASCII.
$COPY(FILE)
$REVERT.
$EXIT.
$CSET(NORMAL)
$REVERT,NOLIST. WHERE IS THAT FILE??
#EOR
.PROC,LOCAL.
.******DIRECTORY OF LOCAL FILES******
$RETURN(PROCLIB,YYYYBAD,YYYYPRC)
$GET(QQQFILE=ENQF/UN=1GTL0CL) 
QQQFILE.
$REVERT,NOLIST.
$EXIT.
$REVERT. FILES ERROR
#EOR
.PROC,RL. 
.******RAISE LIMITS******
$SETASL(*)
$SETJSL(*)
$SETTL(*) 
$CSET(ASCII)
$NOTE./ Limits now at max validated levels.
$CSET(NORMAL)
$REVERT,NOLIST.
#EOR
.PROC,CL. 
.******CLEAR******
$CLEAR,*. 
$CSET(ASCII)
$NOTE./LOCAL FILE AREA CLEARED
$REVERT,NOLIST.
#EOR
.PROC,P,FILE=THING,LST=LIST.
.***********************************************************
$CLEAR.
$GET(FILE)
$PASCAL4,FILE,LST.
$REVERT.
$EXIT.
$REWIND,*.
$CSET(ASCII)
$COPY(LIST)
$CSET(NORMAL)
$REVERT,NOLIST.
#EOR
.PROC,RE. 
.******REWIND****** 
$REWIND,*.
$CSET(ASCII)
$NOTE./REWOUND.
$REVERT,NOLIST.
#EOR
.PROC,FOR,FILE,LST=LIST.
.******************************************************************** 
$CLEAR.
$GET(FILE)
$FTN5,I=FILE,L=LST. 
$REPLACE(LST=L)
$CSET(ASCII)
$REVERT. Fortran Compiled
$EXIT.
$REWIND,*.
$COPY(LST)
$REVERT. That's all folks.
#EOR
.PROC,WAR.
.******WARBLES******
$SACFIND,AID,WAR.
$REVERT,NOLIST.
#EOR
.PROC,M.
.******MAIL/CHECK******
$MAIL/CHECK.
$REVERT,NOLIST.
#EOR
.PROC,MA. 
.******ENTER MAIL******
$MAIL.
$REVERT,NOLIST.
#EOR
.PROC,HE,FILE=SUMPROC,UN=.
.******HELP FILE******
$GET,FILE/#UN=UN.
$COPY(FILE)
$REVERT.
$EXIT.
$REVERT,NOLIST.
#EOR
.PROC,DYNAMO.
.******WHO KNOWS??******
$GET,DYNMEXP/UN=7ETPDOC.
$SKIPR,DYNMEXP.
$COPYBR,DYNMEXP,GO. 
$FIND,DYNAMO,GO.
$REVERT,NOLIST.
#EOR
#EOR
#EOI
----  cut here  ----
I have covered procfil's fairly extensively as I think it is the most
useful function of cyber for hackers.  I will be realeasing source codes
for several programs including 'the communicator' chat utility, and a BBS
program with a full message base.  If you have any questions about cyber
or you have gotten into one and don't know what to do, I can be contacted
at the Forgotten Realm BBS or via uucp mail at ...!uunet!ncoast!ghost.