💾 Archived View for spam.works › mirrors › textfiles › hacking › wanghack.hac captured on 2023-11-04 at 13:28:34.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ %+% GAINING ENTRY +%+ %+% - +%+ %+% HACKING THE WANG O/S +%+ %+% - +%+ %+% BY +%+ %+% THE DARK KNIGHT +%+ %+% - +%+ %+% 14/4/90 +%+ %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ DISCLAIMER: The author takes no responsiblity for, nor does he assume any liability for, damages resulting from the use of information in this document. This document is for informational purposes only. INTRODUCTION: In the world as we know it WANG mainframes are in general use with many of the largest companies trading today. WANG has long boasted that their mainframes are one of the most secure systems availible and in a bid to make this fact more valid they decided to create what they thought was the most advanced and secure operating systems availible for their machines. WANG set out to make the operating system uncrackable by the hacker as we know it. They decided that if the hacker could not get past the user id and password he would be foiled, so the clever systems programers decided that they would create the most elaberate encrypting routines possible for the user ids and passwords, and this is exactly what they did! CRACKING THE PASSWORD: Say for example you wished to modify a wardialer program to find the password for you... Taking the password to be six characters long, mixed uper and lower case and no numeric characters. The wardialer makes a call every 18 seconds on average and taking 10 seconds for three tries at the password, running 24 hours a day, 7 days a week, 365 days a year, the wardialer would take a maximum of 112 years to find a correct password! This is assuming you have a valid user id to begin with! This is not really what the hacker wants to hear, is it?! Unfortunately there is also no guest or visitor id's availible on the system so you can't drop into the operating system and take a look around! GETTING IN: It looks like WANG did a good job then doesn't it! Well not quite! A few bugs have managed to creap through, aiding the hacker. For example some nice systems programmer left a back door in the operating system!! With the relevant user id and password the hacker has access to the system, but at this level you can't really do much, certainly not play with the hardware or jump to other systems, or can you? You can only run a few applications, not much to write home about you may think, things like documents and the odd file display program! Rooting about in a directory called SYS or SYSTEM you may come across a file called USERLIST or something similar (The file names are always eight characters long) Every system has a log of its users, id's and passwords. Not much use you may think as the id's and passwords have been encrypted by the system. This was the major cockup on the part of WANG. The only thing they did not encrypt was the user list!!! Logging on under the user id of CSG (Computer Services Group) and using the password SESAME takes you into the system, via the back door! At this level you can run a program called DISPLAY to print up the userlist, non encrypted! Capturing the user id's and passwords as they flood up the screen you can enjoy them in the comfort of your own home! Every user on the system will be in the list, including the system managers and engineers!! O/S USERS: So now you know how to gain full access to the system you may want to know who uses it! There are hundreds of user worldwide and these include: FORD, VIKING INTERNATIONAL (Travel Company), and the worlds largest DRUG MANUFACTURING COMPANY (Have a guess!! - Not ICI -) There are many more, more details availble from me on request. Many governments use the system, but have had the back door erradicated during security checks, so don't expect to gain access to those machines! %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ % This document was written by The Dark Knight.+ % Contact me on ANGEL BBS - 0772 795476 24hrs. + % or on EQUALISER BBS - 0923 662127 24hrs. + %+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+%+ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +Sysops: Feel free to place this on your download section, but please ensure+ +that this document and credits remain intact and unchanged. Thank you. + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Downloaded From P-80 International Information Systems 304-744-2253