💾 Archived View for spam.works › mirrors › textfiles › hacking › wanghack.hac captured on 2023-06-14 at 16:59:01.

View Raw

More Information

-=-=-=-=-=-=-

Unauthorised Access UK  0636-708063  10pm-7am  12oo/24oo

%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
%+%                           GAINING ENTRY                            +%+
%+%                                 -                                  +%+
%+%                        HACKING THE WANG O/S                        +%+
%+%                                 -                                  +%+
%+%                                 BY                                 +%+
%+%                          THE DARK KNIGHT                           +%+
%+%                                 -                                  +%+
%+%                              14/4/90                               +%+
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+


DISCLAIMER:

The author takes no responsiblity for, nor does he assume any liability for,
damages resulting from the use of information in this document.  This
document is for informational purposes only.


INTRODUCTION:

In the world as we know it WANG mainframes are in general use with many of
the largest companies trading today.

WANG has long boasted that their mainframes are one of the most secure
systems availible and in a bid to make this fact more valid they decided to
create what they thought was the most advanced and secure operating systems
availible for their machines.

WANG set out to make the operating system uncrackable by the hacker as we
know it.  They decided that if the hacker could not get past the user id
and password he would be foiled, so the clever systems programers decided
that they would create the most elaberate encrypting routines possible for
the user ids and passwords, and this is exactly what they did! 


CRACKING THE PASSWORD:

Say for example you wished to modify a wardialer program to find the
password for you... Taking the password to be six characters long, mixed
uper and lower case and no numeric characters.  The wardialer makes a call
every 18 seconds on average and taking 10 seconds for three tries at the
password, running 24 hours a day, 7 days a week, 365 days a year, the
wardialer would take a maximum of 112 years to find a correct password!
This is assuming you have a valid user id to begin with!  This is not
really what the hacker wants to hear, is it?!

Unfortunately there is also no guest or visitor id's availible on the
system so you can't drop into the operating system and take a look around!


GETTING IN:

It looks like WANG did a good job then doesn't it!  Well not quite!  A few
bugs have managed to creap through, aiding the hacker.  For example some
nice systems programmer left a back door in the operating system!!

With the relevant user id and password the hacker has access to the system,
but at this level you can't really do much, certainly not play with the
hardware or jump to other systems, or can you?  You can only run a few
applications, not much to write home about you may think, things like
documents and the odd file display program!  Rooting about in a directory
called SYS or SYSTEM you may come across a file called USERLIST or
something similar (The file names are always eight characters long)  Every
system has a log of its users, id's and passwords.  Not much use you may 
think as the id's and passwords have been encrypted by the system.  This
was the major cockup on the part of WANG.  The only thing they did not
encrypt was the user list!!!

Logging on under the user id of CSG (Computer Services Group) and using the
password SESAME takes you into the system, via the back door!  At this
level you can run a program called DISPLAY to print up the userlist, non
encrypted!  Capturing the user id's and passwords as they flood up the
screen you can enjoy them in the comfort of your own home!  Every user on
the system will be in the list, including the system managers and
engineers!!


O/S USERS:

So now you know how to gain full access to the system you may want to know
who uses it!

There are hundreds of user worldwide and these include: FORD, VIKING
INTERNATIONAL (Travel Company), and the worlds largest DRUG MANUFACTURING
COMPANY (Have a guess!! - Not ICI -)  There are many more, more details
availble from me on request.

Many governments use the system, but have had the back door erradicated
during security checks, so don't expect to gain access to those machines!




%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+
% This document was written by The Dark Knight.+
% Contact me on ANGEL BBS - 0772 795476 24hrs. +
% or on     EQUALISER BBS - 0923 662127 24hrs. +
%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+


+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+Sysops: Feel free to place this on your download section, but please ensure+
+that this document and credits remain intact and unchanged. Thank you.     +
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Downloaded From P-80 International Information Systems 304-744-2253