💾 Archived View for spam.works › mirrors › textfiles › phreak › rsts1.txt captured on 2023-06-16 at 19:49:01.
-=-=-=-=-=-=-
ShadowSpawn BBS Presents... \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ \\\ \\\ \\\ HACKING THE RSTS/E SYSTEM \\\ \\\ \\\ \\\ >>> VOLUME I <<< \\\ \\\ \\\ \\\ BY THE WHITE GUARDIAN \\\ \\\ \\\ \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ PREFACE ------- SO, ALL OF YOU PEOPLE WHO HAVE GROWN USED TO USEING THE DEC PDP-11 COMPUTER IN YOUR SCHOOL OR OFFICE, HERE IS AN INDEPTH LOOK AT THE SYSTEM AND WHAT CAN BE DONE WITH IT. THE AUTHOR OF THIS ARTICLE TAKES NO RESPONSABILATY FOR ANY OF THE ACTS THAT MAY FOLLOW TE READING OF THESE ARTICLES. THEY ARE STRICTLY WRITTEN IN A INFORMITVE MODE TO TEACH THE DEC USER MORE ABUT THE SYSTEM HE IS ON. ACCOUNTS ------------ TO START THIS ARTICLE BASICLY, WE WILL BEGIN BY DISCUSSING ACCOUNT. THERE ARE TWO BASIC TYPES OF ACCOUNTS THAT ARE ACTIVE ON THE SYSTEM. THERE IS THE USER ACCOUNTS AND THE SYSTEM MANAGER ACCOUNTS. [1,*] ----- THESE ARE THE SPECIAL ACCOUNTS THAT HAVE ALL OF THE OFFICIAL POWER ON THE SYSTEM. THEY ARE ABLE TO GET ONTO ANY ACCOUNT, GET AT ANY FILES, AND DO ANYTHING THEY WANT TO. THESE ACCOUNTS ARE LIMITED TO THE SYSTEM OPERATERS. MORE ON THESE POWERS WILL BE DISCUSSED LATER. [0,1] ----- THIS IS THE ACCOUNT THAT IS WERE MANY MAJOR SYSTEM FILES ARE STORED. YOU CAN FIND THE ERRORS STORED HERE AND THE DCL PROGRAM. THERE ARE ALSO A FEW OTHER FILES THAT HOLD LITTLE VALUE TO THE SERIOUS SYSTEM HACKER. ALL OTHERS ---------- THESE ARE JUST BORING ACCOUNTS ON THE SYSTEM THAT CONTAIN NO POWER AND CANNOT BE GIVEN POWER UNLESS BY WAY OF SOFTWARE THAT YOU CAN WRITE. I WILL ALSO DISCUSS THAT LATER. PROGRAM EXAMINATION #1 - $LOGIN.BAC LOGIN.BAC WAS A PROGRAM WRITTEN BY DIGITAL EQUIPTMENT CORPORATION. IT IS USED TO LOG A USER ON TO THE SYSTEM AND WATCH FOR SECURITY VIOLATIONS. WHEN YOU FIRST GET ONTO THE SYSTEM YOU WILL SEE SOMETHING LIKE THIS: RSTS/E VERSION 8.1 [SCHOOL NAME] LOCAL JOB X [DATE] [TIME] ENTER USER #: AT THIS PROMPT THE LOGIN PROGRAM IS EXPECTING TWO NUMBERS DIVIDED BY A COMMA. IT MAY BE INTERESTING TO NOTE THAT THESE NUMBERS ARE NOT REALLY TWO NUMBERS BUT A STRING. ANYWAY, THE NUMBERS RANGE FROM 0 TO 255 ON BOTH SIDES OF THE COMMA. THE COMMA CAN ALSO BE REPLACED BY A SLASH. NEXT, AFTER YOU HAVE ENTERED YOUR ACCOUNT NUMBER, YOU WILL COME APON A PROMPT SAYING: PASSWORD : A PASSWORD CAN BE BETWEEN 1 TO 6 CHARACTORS AND THESE CHARACTORS MAY BE ONLY LETTERS OR NUMBERS. THAT MEANS THAT THERE IS A TOTAL OF 36 DIFFERENT CHARACTORS THAT COULD BE IN EACH POSSITION OF THE PASSWORD. PASSWORDS DO NOT HAVE TO BEGIN WITH A CHARACTOR. BY THE WAY, ANY ACCOUNT THAT HAS A PASSWORD OF ?????? IN UNACCESSABLE TO ANYONE ON THE SYSTEM BUT A SYSTEM OPERATOR. FOR THOSE OF YOU DARING PEOPLE WHO WOULD LIKE TO GET INTO A 1 ACCOUNT, YOU WILL RECIEVE A FURTHER PROMPT. YOU WILL SEE: AUXILARARY PASSWORD : THIS IS A FUNNY PASSWORD. THEIR IS ONLY ONE AUX PASWRD FOR ALL OF THE ONE ACCOUNTS. IT IS WRITTEN INTO THE MAIN PROGRAM AND ASSUMES THE VARIABLE NAME L.PASS. IF YOU ARE TO GET AHOLD OF A LISTING OF THE LOGIN PROGRAM YOU WILL FIND IT SOME WHERE NEAR THE END OF THE PROGRAM. THE REASON FOR THIS PASWRD IS NOT ONLY BECAUSE OF THE ADDED SECURITY IN HACKERS, BUT BECAUSE WHEN A SYSOP RUNS A PROGRAM CALLED MONEY(TO BE DISCUSSED LATER) HE CAN PRINT OUT A LIST OF TH PASSWORDS. THIS SHEET WILL HAVE THE ACCOUNTS,AND ALL OF THE OTHER INFORMATION ABOUT THESE ACCOUNTS INCLUDING THE PASWRDS. THE AUX PASWRD IS NEVER ON THESE LISTINGS. POINTS ABOUT LOGIN ------------------ IT IS POSSABLE TO PUT SECURITY INTO THIS PROGRAM WITH ONLY SMALL AMOUNTS OF MODIFCATIONS. THE LOGIN PROGRAM HAS A PART OF IT THAT WILL SEND A PACKAGE OF DATA TO ANOTHER PROGRAM FOR PROCESSING. IT SENDS STUFF LIKE TIME, ACCOUNT LAST ON,ACCOUNT THE PERSON WAS TRYING TO LOG ONTO, PASWRD USED AND A WHOLE BUNCH OF OTHER STUFF. NEVER LOG ONTO TO ANOTHER ACCOUNT DIRECTLY FROM YOUR OWN. I KNOW A GUY WHO WAS BUSTED BECAUSE HE LOGGED DIRECTLY FROM HIS ACCOUNT TO A TEACHERS ACCOUNT, AND THEN BACK TO HIS ACCOUNT AGAIN. THE SYS-OP CAME UP TO HIM AND SHOWED HIM HOW THERE WAS A COMPLETE RECORD OF ALL ACTIVITY ON THE SYSTEM. MOST PEOPLE DO NOT HAVE TOWORRY ABOUT THIS SITUATION... IT IS ONLY THE ONES WITH PARANIOD SYS-MANG THAT HAVE TO WATCH OUT. A PROGRAM YOU SHOULD ALL WATCH OUT FOR IS LOGLOG. IT IS FOUND IN THE MESSAGE RECIEVERS OF THE SYSTAT LISTING. MORE ON SYSTAT AND WHAT XOU CAN DO WITH IT LATER. ANYWAY, ALWAYS MAKE A POINT OF CHECKING THE SYSTAT BEFORE YOU LOG ON EACH TIME. IF ANY OPRS ARE PRESENT AND THEY ARE ACTIVE, DON'T LOG ON. OTHER LOGIN COMMANDS -------------------- HERE ARE A FEW OTHER THING THAT CAN BE DONE WITHOUT LOGGING ONTO A SYSTEM SYSTAT - ON MOST SYSTEMS, IT IS POSSABLE TO TYPE THIS AND GET A LISTING OF WHO IS ON THE SYSTEM. IT WILL GIVE YOU HINTS ABOUT ACCOUNTS THAT ARE ACTIVE AND OTHER NOTABLE DATA ABOUT THE SYSTEM I<PROJ,PROG) - ANOTHER WAY TO LOG IN HELLO,LOGIN, LOG - WAYS TO START HELP - THIS COULD DO ANYTHING... CONCLUSION ---------- WELL, THATS ALL FOR THIS VOLUME OF HACKING THE RSTS/E SYSTEM. IF ANY BODY IS INTERESTED, I GOT MOST OF MY DATA BY ENTERING THE SCHOOL COMPUTER AND PRINTING OUT CERTAIN FILES AND SUCH. IT WAS AN INTRESTING EXPERIENCE. NEXT MONTHS ISSUE WILL DISCUSS THE LOGOFF PROGRAM AND THE SYSTAT PROGRAM. SOONER OR LATER I WILL TELL YOU HOW TO GO ABOUT GETTING SYSTEM PASSWORDS AND SUCH..... FUN HINT #1 ----------- EACH VOLUME I WILL GIVE YOU A CUTE LITTLE TRICK THAT YOU CAN TRY ON YOUR SYTEM TO GET IT TO DO SOMETHING WIERD. TRY THIS ONE. GET ON YOUR ACCOUNT AND THEN TYPE THE FOLLOWING: PIP *.*/RTS:FUCKUP<RETURN> TYPE DIR/S OR PIP/DI:S LOOK AT YOUR RUN TIME SYSTEM.... \\\\\\\\\\\\\\\\\\\\\\\\\\\8\\\\\\\\ \\\ \\\ \\\ UNTIL NEXT TIME... \\\ \\\ \\\ \\\ IT WAS THE BEST OF TIMES, \\\ \\\ IT WAS THE WORST OF TIMES... \\\ \\\ \\\ \\\ THE WHITE GUARDIAN \\\ \\\ H. O. T. K. \\\ \\\ \\\ \\\ TO CONTACT: CATS DEN I,II,IV\\\ \\\ 4TH REICH,POISON \\\ \\\ DAGGER, AND MANY \\\ \\\ OTHERS.......... \\\ \\\ \\\ \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ DOWNLOADED FROM P-80 SYSTEMS.....