About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Hacking UNIX - Jester Sluggo


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From: _ _ _______ | \/ | / _____/ |_||_|etal/ /hop _________/ / /__/ (314)432-0756 24 hours a day, 300 baud, Elite BBS
************************************** * A beginners guide to: * * H A C K I N * * * * U N I X * * * * By Jester Sluggo * * (Note: this is written in 4 cl. ** Witten 10/08/85 * **************************************
In the following file, all references made to the name Unix, may also be substituted to the Xenix opsystem.
Brief history: Back in the early sixties, during the development of third generation computers at Moup of programmers studying the potential of computers, discovered their ability of performin w rmr asks simultaneously. Bell Labs, taking notice of this discovery, provided funds for tei dveopenalscentists to investigate into this new frontier. After about 2 years of developmnta reearh, heyprouce an operating system they called "Unix".
Sixties to Current: During this time Bell Systems installed the Unix system to provide their computtors with the ability to multitask so that they could become more productive, and efficient. Oeo h ytems they put on the Unix system was called "Elmos". Through Elmos many tasks (i.e. bilig,ndintalaio records) could be done by many people using the same mainframe.
Note: Cosmos is accessed through the Elmos system.
Current: Today, with the development of micro computers, such multitasking can be achieved by a sca version of Unix (but just as powerful). Microsoft,seeing this development, opted to developteronUi like system for the IBM line of PC/XT's. Their result they called Xenix (pronounced eeniks. Boh ni and Xenix can be easily installed on IBM PC's and offer the same functions (jut 2diferet vndos).
Note: Due to the many different versions of Unix (Berkley Unix, Bell System III, and System V the moar) many commands following may/may not work. I have written them in System V routines. Unix/ei prtn systems will be considered identical systems below.
How to tell if/if not you are on a Unix system: Unix systems are quite common systems across the coheir security appears as such:
Login; (or login;) password:
When hacking on a Unix system it is best to use lowercase because the Unix system commands are all dower- case. Login; is a 1-8 character field. It is usually the name (i.e. joe or fred) of theue,o ntals (i.e. j.jones or f.wilson). Hints for login names can be found trashing the locatonofth dalup(ue your CN/A to find where the computer is). Password: is a 1-8 character passwod asiged y te ssopor hosen by the user. Common default logins ------------------------- loin; Passord: rot root,system,etc.. sys sys,system daemon daemo ucp ucp tty tty test test unix unix bn bi ad adm who who learn learn uuhost uuhost nuucp uucp
If you guess a login name and you are not asked for a password, and have accessed to the system, theve what is known as a non-gifted account. If you guess a correct login and pass- word, then yuhv sraccount. And, if you guess the root password, then you have a "super-user" account. Al Uixsytes av te following installed to their system: root, sys, bin, daemon, uucp, adm Once yu ae i th sytem yo wil get a prompt. Common prompts are:
$ % #
But can be just about anything the sysop or user wants it to be.
Things to do when you are in: Some of the commands that you may want to try follow below:
who is on (shows who is currently logged on the system.) write name (name is the person wish to chat with) To exit chat mode try ctrl-D. EOT=End of Transfer. ls- (itall files in current directory.) du -a (checks amount of memory yor ils sedisk usage) cd\name (name is the name of the sub-directory you coos) c\ (bing yor home directory to current use) cat name (name is a filenme ether a rogrm ordocumentation your username has written) Most Uix prgramsare witten in th C laguage or Pascal since Unix is a programmers' evironmnt. On of th firstthingsdone o the sstem is print up or capture (in a buffer) the file ontainig all uer name and acounts. his canbe doneby doing the following command:
cat /etc/passwd
If you are successful you will a list of all accounts on the system. It should look like this:
root:hvnsdcf:0:0:root dir:/: joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe hal::1:2:Hal Smith:/bin:/bin/halroot" line tells the following info : login name=root hvnsdcf = encrypted password 0 srgopnumber 0 = user number root dir = name of user / = root directory
In the Joe login, the last part "/bin/joe " tells us which directory is his home directory (joe) is.e "hal" example the login name is followed by 2 colons, that means that there is no password nedt e n using his name.
Conclusion: I hope that this file will help other novice Unix hackers obtain access to the Unix/Xenms that they may find. There is still wide growth in the future of Unix, so I hope users willntaueaysystems (Unix or any others) that they may happen across on their journey across the eecroichihwysofAmerica. There is much more to be learned about the Unix system that I have no coere. heymaybe oun by buying a book on the Unix System (how I learned) or in the future I ay wite par II o ths.......
/ \ / luggo !! "Only the Fool fears none."

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS