💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › hacking101.hac captured on 2023-01-29 at 07:45:57.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

HACKING 101 - By Johnny Rotten  - Course #1 - Hacking, Telenet, Life
---------------------------------------------------------------------

Since I have always felt that Baton Rouge was at a loss for *GOOD* hackers,
I have taken it upon myself to educate the masses on this rather elusive of
subjects.

This course will cover a straight jaunt into Telenet, how to get there, what
to do, where to go, and what to do once your in.

The very first thing that you will need to do is to get NUAA from the Sprawl.
This rather nifty utility scans Telenet for valuable, connectable "addresses".
These addresses are a numeric code which is broken down as such:
                508266 - typical Telenet address
                ^^^
                This is basically an area code...
                The 266 part can also go up as high as 9999 (or above)
                That's the unique part of the address

Alright, scan a known area code...you will almost certainly get a large number
of connections, and using NUAA, it doesn't take very long (an hour or so to
scan over 800 possible connections...indeed not very long).

NUAA will produce a logfile, and another file of NUAs (network user addresss,
get the connection?).  Check this NUA file.  All of those addresses are valid
connects.  And, it also gives the first line of text that came across on this
system.

This is where you will begin.  Look through this list for anything that says
Unix.  Once you find a NUA that goes to a Unix, your work shall begin.

The first thing to try and do when trying to access a Unix is to try "default"
accounts.  These are accounts that are built into an initial Unix installation.
However, these accounts are usually changed.  IF they were always changed, then
we would never get in anywhere.

The list of defaults for a Unix that I am aware of are:
        informix, sync, uucp, golden, anonymous, user, login, demo

These accounts usually have the same password as their username.  I.e. account
"informix" will have it's password as "informix".

Dr. Hacker and the Bladerunner have additional information concerning defaults,
and I am sure that they will comment.

What to do when you have gotten into the system
-----------------------------------------------

Watch the logon screen for the last login date.  If it was a day ago, or a
few hours ago, or even a week ago, IMMEDIATELY hang up.  These accounts are
better left for the local pro (Dr. Hacker) or the semi-pros (myself and
Bladerunner).  However, if the last logon date was more than a week ago, or
even a year ago, IMMEDIATELY hang up.

Why?  Well, unused accounts are just as dangerous as used accounts.  You should
call here and alert us to the system that you have found (in E-MAIL, not in the
public forums).  The only way that your further education in this matter can be
attained is if you remain undetected, and the process to determine that is more
complicated than I care to go into.  But once you have determined that you can
get in, let us know.

So, that's the first part of this lesson.  Once you have completed this much of
it, then let me know, and I will go on to the next part, which is - "What kind
of fun things are there here to do".

Any questions...??


JR

Downloaded From P-80 International Information Systems 304-744-2253