💾 Archived View for spam.works › mirrors › textfiles › hacking › ttyspoof.txt captured on 2023-06-14 at 16:58:29.
-=-=-=-=-=-=-
TTY SPOOFING by SubEthan I know what you are going to say... "THAT WAS ALREADY COVERED BY VAXBUSTER IN PHRACK-41!" Yeah, I know, but if you would shut your mouth for long enough and pay attention you might learn something. This file is meant to be a follow up of VaxBuster's very informative article on TTY spoofing. Vax does a great job in explaining how TTY spoofing works, but falls short in a few areas. This article will NOT repeat anything said in VaxBuster's article so if you haven't read it go do it now or just be confused. Manual TTY spoofing is made out to look SOOO easy by VaxBuster, but when I recieved my issue of Phrack-41 I (of course) immediately tried some TTY spoofing of my own. Well needless to say I figured it out, but it wasn't quite as simple as cating the TTYs and waiting. One of the most immediate problems is finding out what TTY's are used for what purposes. Many machines, especially larger machines, can have HUNDREDS of TTYs. Some are obviously for devices such as printers and modems, while others are set aside for "scum" student users, and still others might be for "special" users. My advise is to take a tour of your /dev direcotry. Get to know it, because even beyond TTY spoofing there are many things that can be done in the /dev directory. When you look at all the TTYs in the /dev directory look for ones whose owner isn't "root" and don't just check it once, check it at different times of the day and keep a log of patterns, such as where maybe the modem users are and where the CIS lab terminal TTYs are. Not all computers have different TTYs for different groups of users, but if you keep your eyes open you may notice things that will be to your advantage later. Now once you figure out what TTYs the bulk of users you might want to spoof are on, then you can start cating terminals and wham, bam, thank you ma'm you magically get accounts, right? Wrong. Even after you know the best TTY areas for spoofing, there are still some problems. One of the biggest problems I had when spoofing was this: once I catted an unused TTY, that TTY was skipped over by the login process. If I catted a whole area of TTYs that whole area of TTY was skipped over and it looks pretty obvious something is up when you look at a "who" and there is a gap of TTYs about 30 long that don't have users. The obvious solution to this problem is, of course to cat ALL the TTYs. I have a slight problem with that though. There are just TOO many TTYs to spoof. The normal use TTYs on my machine go from ttyx1 to ttyx255. That's right 255 TTYs! And don't tell me cats don't show up in a ps -aux because they do. It would look pretty suspicous if your name were on the process list with 255 cats running. Needless to say I needed to find out more about how the TTYs worked. I found that every once in while when I did cat a large area of TTYs I could snag a user, but then I would just end up killing all the other process after five minutes because I noticed that the TTYs I still had catted started to get skipped. After a while of playing I figured out that the users I would snag were through PURE LUCK. While catted TTYs are skipped over, what happens is you can actually cat someones terminal as they are logging in! This is what happens most of the time. I came up with a process to better my chances of "snagging" some poor schmuck as he is logging in. Now as most people know, (or maybe not so I'm telling you anyway) TTYs are distributed numerically. ttyx1 (or whatever your first tty?? happens to be) is given out before ttyx2 and so on down the line. Now if ttyx1 through ttyx10 are used and the person using ttyx2 logs off, then ttyx2 is the next tty to be given out to the next user who logs in. This I believe generally holds true on most machines (although I am not positive). Now in order to optimize getting ttys here is what you can do. First you log in (to whichever hacked account you prefer, although with this method I genereally don't fear using my own) during busy hours and find which tty you are on by doing a ps. Now most of the time, especially during VERY busy hours you will tend to slip into the middle of the used ttys. This is because someone has dropped out of the middle and you have gotten that tty. Now what you want to do is try to identify a LOW numbered unused tty. You COULD keep doing whos to see who drops off of a low numbered tty, but here is what I do to maximize efficiency. Just Telnet to your own machine and log in again. This guarantees that you will find out the lowest number open tty on your machine, plus since you are logged in no one else will be able to take. This TTY is the one you will spoof. It is very important that the tty number be as low as possible. You will see why later. Now say you originally logged on to ttyx55 and then when you Telneted to your own machine you managed to get ttyx7. What you want to do now is logout off of ttyx7 putting you back to ttyx55. Now right away cat that sucker! cat < /dev/ttyx7 & Alright. Now if you don't get a "permission denied" error you got it. If you do get "permission denied" try the whole process again. Once you get a low tty cated you are in good shape. Now unless, as I said before, someone is logging in at the same time as you cat the terminal then nothing will happen. The tty you catted will be skipped over. Now you want to typ% the cgmlAndq fg2 the "<?j@O!<?s??s?L'? ?? ???? 8@? '??? xxD?'? g?@? l have to go through the proccess again and heaven forbid you should actually have to work for anything.