💾 Archived View for spam.works › mirrors › textfiles › hacking › shahewl.txt captured on 2023-11-04 at 13:26:26.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-


-------------------------------------------------------------------------------
                         Swedish Hacking Association                      

                                 presents

                 Hacking Hewlett Packard series 3000 computers
                                 Part one

Written by Mr Big
Copyright (c) 1990 by Swedish Hacking Association

-------------------------------------------------------------------------------

This file will help you understand the basic's of hacking onto HP 3000.

And remember that you use this on your own risk and we shall not be hold 
responsible for any missuse of the information, which are supplied for
educational use only.

Hewlett Packard series 3000 computers have a good defence against hacking 
if you don't know so much about the computer.

First of all when you get connected to a HP3000 computer, press <Return> until
you get a ':' which indicates that you have established a contact with the
remote computer. Now the computer waits for you to sign on, and you do that 
with; HELLO Username.Aaccount or HELLO username.Account,Group

The group that usually exists are the PUB group in every account.
One user and account that must exist are MANAGER.SYS. You could try hacking
the password for this user, but every wrong password will notify the system 
operator about your misstakes.

Another way are to try out some of Hewlett Packard standard accounts and
password. Try the following

HELLO MGR.TELESUP          Account password:HPONLY    User password:MGR
HELLO FIELD.SUPPORT        Account password:<None>    User password:<None>

also try HELLO OPERATOR.SYS, sometimes they don't have a password here.

Well, if you manage to logon to the computer and just have limited
capabilites, you may easy raise your privs and/or look for other
accounts and user. Try RUN LISTDIR5.PUB.SYS, it might also be LISTDIR2 
depending on the version of MPE operating system.
Here you can type LISTACCT @;PASS and if you have the right capabilities
you will have all accounts listed with capabilites and password.
Also type LISTUSER @.@;PASS and here you will get information about
all users on the system.

Some userful feature under MPE are that you can type HELP and get full
description over all MPE commands.

Well exit LISTDIR5 if it didn't do you any good, and try this one instead.
LISTF @.PUB.SYS,2
This command will show the directory of the system group on system account,
where all files are accessible through any user.
Check all files that have FA under type.. ie.
NIGHTJOB         128W FA    1024   1024   .....
                      ^^

To view the file type:
FCOPY FROM=filename.PUB.SYS;TO=
and sometimes it is a batchjob laying there and you can identify it with that
the first line looks something like this
!JOB NIGHTJOB,user/passwrd.account/password;OUTCLASS=LP
and just try these out and see if they work.

If you run a program and it's requesting a password, you can also use FCOPY
on the program file as well and see if you can locate the password.
Usually it will be displayed without beeing encrypted.

Well. one more thing... to logoff just type BYE
and thats for me to, until next time.... 


Part two will soon be released covering more standard accounts and
small programs that will help you raise your capabilities.



Watch out for more information from Swedish Hacking Association

-------------------------------------------------------------------------------
Dial the following bulletin board systems:

  Interpol BBS!          +46-758-73838          
-------------------------------------------------------------------------------