💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › defaults.txt captured on 2023-01-29 at 07:40:32.
⬅️ Previous capture (2021-12-04)
-=-=-=-=-=-=-
Updated - 4/1/92 to include XENIX systems The Hollow's Alliance * 415-236-2371 * MONDO h/ph/c g-files and discussion Here's our seventh, and like I promised a few issues back, a large list of default passwords. This includes the HP-3000, Primos, Unix, VM/CMS, and VMS systems. I would have liked to also made this a thorough file on identifying systems, but that'll have to be another file, there are about 10 other systems I'd like to go over. This is in no-way a guide to hacking, just a list of defaults. I compromised the extras to get this file out sooner. You should assume to use the account name as password too for all defaults listed. . ... and we're off!! ___________________________ /...........................\ ( HP-3000 running MPE XL or V ) ::::::::::::::::::::::::::::: e.g. log-on : <pressed enter> EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON. (CIERR 1402) : hello mgr.intx3,pub ENTER ACCOUNT (INTX3) PASSWORD: intx3 <not echoed> ENTER ACCOUNT (INTX3) PASSWORD: hponly <not echoed> ENTER ACCOUNT (INTX3) PASSWORD: manager <not echoed> INCORRECT PASSWORD. (CIERR 1441) As you can see, the account is made up of a USER.ACCOUNT,JOB ID so try the following ones in every combination possible. The job id (e.g. pub) is always optional. USER names ACCOUNT names JOB IDs ~~~~~~~~~~ ~~~~~~~~~~~~~ ~~~~~~~ mgr cognos pub manager disc sys operator hpoffice field hpword support sys system telesup xlserver Default accounts are almost always open, but in case you're asked for a password, first try the user names, account names, and things common like: hponly manager hp mpe Here are the most common default accounts: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ operator.cognos mgr.hpword field.hpword manager.hpoffice mgr.hpoffice wp.hpoffice spoolman.hpoffice mailman.hpoffice advmail.hpoffice mail.hpoffice field.support operator.support operator.sys rsbcmon.sys pcuser.sys operator.system operator.disc mgr.xlserver mgr.hpdesk mgr.robelle mgr.vesoft manager.itf3000 sys.telesup manager.security mgr.conv mgr.rje mgr.hpp187 mgr.hpp189 mgr.hpp196 field.hpp187 mgr.intx3 mgr.carolian manager.tch mgr.word ____________________ /....................\ ( Prime running PRIMOS ) :::::::::::::::::::::: When connected you might not get anything on the screen, type "login" or "login <userid>" to be prompted. Try all User ids as passwords. It seems that not many people have had luck hacking the Primos operating system. e.g. log-on login User id? fam Password? fam <not echoed> Invalid user id or password; please try again. User ids Passwords ~~~~~~~~ ~~~~~~~~~ mail prime prime/primos primos_cs prime/primos primenet mfd fam (v.18 Primos and below) system (v.18 Primos and below) system/prime dos (v.18 Primos and below) tele netlink test guest guest1 guest1/guest ______ /......\ ( VM/CMS ) :::::::: You may not always see this standard VM/CMS logon screen, alot of systems have a customized logon screen. But if it asks you to 'LOGON', then you usually have a VM/CMS. e.g. log-on VM/370 ONLINE--VM/3084--PRESS BREAK KEY TO BEGIN SESSION ! Enter one of the following commands : LOGON userid (Example : LOGON VMUSER1) DIAL userid (Example : DIAL VMUSER2) MSG userid message (Example : MSG VMUSER2 GOOD MORNING) LOGOFF .LOGON EREP Userids ~~~~~~~ $ALLOC$ TEMP TDISK CPNUC DIRECT SAVSYS SYSERR SYSCKP SYSWRM AUTOLOG1 CMSBATCH CMSUSER EREP GCS IVPM1 IVPM2 MAINT CPCMS OLTSEP OPERATNS OPERATOR SYSDUMP1 TSAFVM OPERATOR SYSDUMP1 TSAFVM VSEMAINT VSEIPO ROUTER AP2SVP APL2PP VMASSYS VMASMON VMASTEST BATCH BATCH1 BATCH2 CSPUSER CVIEW DIRMAINT DATAMOVE FSFCNTRL FSFTASK1 FSFTASK2 FSFADMIN IIPS ADMIN DISKACNT CPRM OP1 VMUTIL IPFSERV ISPVM NETVIEW PRODBM PROMAIL PROCAL SYSADMIN SFCM1 PSFMAINT PDM470 PDMREMI PVM RSCS RSCSV2 SMART SQLDBA SQLUSER VMARCH VMBACKUP VMBSYSAD DEMO1-4 VMTAPE VMTLIBR VMMAP VTAM VM3812 VSEMAN PENG MOESERV VTAMSUER CCC IDMSSE IDMS ______________________________________ /......................................\ ( VAX running VMS: Virtual Memory System ) :::::::::::::::::::::::::::::::::::::::: You can sometimes identify a VMS by the beep you hear after connecting. e.g. log-on Username: SYSTEST_CLIG Password: SYSTEST_CLIG <not echoed> User authorization failure <pressed enter> Username: DEMO etc.. . . Usernames Passwords ~~~~~~~~~ ~~~~~~~~~ allin1 allin1mail backup dcl dec decmail decnet default default/user demo field field/service/test/digital games guest help helpdesk host info ingres link mail mailer mbmanager mbwatch netcon netmgr netpriv netserver network newingres news operator opervax pfmuser postmaster priv report rje student sys sysmaint sysmaint/service/digital systest systest/uetp systest_clig system system/manager/operator/syslib teledemo test uetp user userp vax vms ______ /......\ ( UNIX ) :::::::: e.g. log-on login: root password: root1234 <not echoed> Login incorrect login: somebody password: ydobemos Login incorrect logi.. .etc.. . . logins ~~~~~~ root makefsys mountfsys umountfsys checkfsys lp daemon trouble nuucp uucp bin adm sysadm sys rje sync tty nobody somebody setup powerdown ingres general guest gsa user games help public unix test admin student standard pub field demo batch visitor w listen network uuhelp usenet sysinfo cron console sysbin who ___XENIX___ cron bin sysh uucp vib rt1 adm sys sysa uia dos vpix