015, programy na windowsa, hack komputer, Anarchist Cookbook 2004, Additions
[ Pobierz całość w formacie PDF ] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ UNIX : A Hacking Tutorial ++ By: Sir Hackalot ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------------------o Intent of this file:----------------------This phile is geared as an UNIX tutorial at first, to let you get morefamiliar with the operating system. UNIX is just an operating system, asis MS-DOS, AppleDOS, AmigaDOS, and others. UNIX happens to be a multi-user-multi-tasking system, thus bringing a need for security not found on MSDOS,AppleDOS, etc. This phile will hopefully teach the beginners who do not havea clue about how to use UNIX a good start, and may hopefully teach old prossomething they didn't know before. This file deals with UNIX SYSTEM V andits variants. When I talk about unix, its usually about SYSTEM V (rel 3.2).Where Can I be found? I have no Idea. The Boards today are going Up'n'Downso fast, 3 days after you read this file, if I put a BBS in it where you couldreach me, it may be down! Just look for me.I can be reached on DarkWood Castle [If it goes back up], but that boardis hard to get access on, but I decided to mention it anyway.I *COULD* Have been reached on jolnet, but......This file may have some bad spelling, etc, or discrepencies since it wasspread out over a long time of writing, because of school, work, Girl friend,etc. Please, no flames. If you don't like this file, don't keep it.This is distributed under PHAZE Inc. Here are the members (and ex ones)The Dark PawnThe Data WizardSir Hackalot (Me)Taxi (ummm.. Busted)Lancia (Busted)The British Knight (Busted)The Living Pharoah (Busted)_____________________________________________________________________________-------------o Dedication:-------------This phile is dedicated to the members of LOD that were raided inAtlanta. The members that got busted were very good hackers, especiallyThe Prophet. Good luck to you guys, and I hope you show up again somewhere._____________________________________________________________________________------------------------o A little History, etc:------------------------UNIX, of course, was invented By AT&T in the 60's somewhere, to be"a programmer's operating system." While that goal was probably not reachedwhen they first invented UNIX, it seems that now, UNIX is a programmer's OS.UNIX, as I have said before, is a multi-tasking/multi-user OS. It is alsowritten in C, or at least large parts of it are, thus making it a portableoperating system. We know that MSDOS corresponds to IBM/clone machines,right? Well, this is not the case with UNIX. We do not associate it withany one computer since it has been adapted for many, and there are manyUNIX variants [that is, UNIX modified by a vendor, or such]. Some AT&Tcomputers run it, and also some run MSDOS [AT&T 6300]. The SUN workstationsrun SunOS, a UNIX variant, and some VAX computers run Ultrix, a VAX versionof UNIX. Remember, no matter what the name of the operating system is [BSD,UNIX,SunOS,Ultrix,Xenix, etc.], they still have a lot in common, such as thecommands the operating system uses. Some variants may have features othersdo not, but they are basically similar in that they have a lot of the samecommands/datafiles. When someone tries to tell you that UNIX goes along witha certain type of computer, they may be right, but remember, some computershave more than one Operating system. For instance, one person may tell youthat UNIX is to a VAX as MSDOS is to IBM/clones. That is untrue, and theonly reason I stated that, was because I have seen many messages with info/comparisons in it like that, which confuse users when they see a VAX runningVMS.____________________________________________________________________________-------------------------------o Identifying a Unix/Logging in-------------------------------From now on, I will be referring to all the UNIX variants/etc asUNIX, so when I say something about UNIX, it generally means all the variants(Unix System V variants that is: BSD, SunOS, Ultrix, Xenix, etc.), unlessI state a variant in particular.Okay. Now its time for me to tell you how a unix USUALLY greets you.First, when you call up a UNIX, or connect to one however you do, you willusually get this prompt:login:Ok. Thats all fine and dandy. That means that this is PROBABLY a Unix,although there are BBS's that can mimic the login procedure of an OS(Operating System), thus making some people believe its a Unix. [Hah!].Some Unixes will tell you what they are or give you a message before alogin: prompt, as such:Welcome to SHUnix. Please log in.login:Or something like that. Public access Unixes [like Public BBSs] willtell you how to logon if you are a new users. Unfortunatly, this phile isnot about public access Unixes, but I will talk about them briefly later, asa UUCP/UseNet/Bitnet address for mail.OK. You've gotten to the login prompt! Now, what you need to dohere is enter in a valid account. An Account usually consists of 8 charactersor less. After you enter in an account, you will probably get a passwordprompt of some sort. The prompts may vary, as the source code to the loginprogram is usually supplied with UNIX, or is readily available for free.Well, The easiest thing I can say to do to login is basically this:Get an account, or try the defaults. The defaults are ones that came withthe operating system, in standard form. The list of some of the Defaultsare as follows:ACCOUNT PASSWORD------- --------root root - Rarely open to hackerssys sys / system / binbin sys / binmountfsys mountfsysadm admuucp uucpnuucp anonanon anonuser usergames gamesinstall installreboot * See Belowdemo demoumountfsys umountfsyssync syncadmin adminguest guestdaemon daemonThe accounts root, mountfsys, umountfsys, install, and sometimes sync areroot level accounts, meaning they have sysop power, or total power. Otherlogins are just "user level" logins meaning they only have power over whatfiles/processes they own. I'll get into that later, in the file permissionssection. The REBOOT login is what as known as a command login, which justsimply doesn't let you into the operating system, but executes a programassigned to it. It usually does just what it says, reboot the system. Itmay not be standard on all UNIX systems, but I have seen it on UNISYS unixesand also HP/UX systems [Hewlett Packard Unixes]. So far, these accounts havenot been passworded [reboot], which is real stupid, if you ask me.COMMAND LOGINS:---------------There are "command logins", which, like reboot, execute a command then logyou off instead of letting you use the command interpreter. BSD is notoriousfor having these, and concequently, so does MIT's computers. Here are some:rwho - show who is onlinefinger - samewho - sameThese are the most useful, since they will give the account names that areonline, thus showing you several accounts that actually exist.Errors:-------When you get an invalid Account name / invalid password, or both, you willget some kind of error. Usually it is the "login incorrect" message. Whenthe computer tells you that, you have done something wrong by either enterringan invalid account name, or a valid account name, but invalid password. Itdoes not tell you which mistake you made, for obvious reasons. Also,when you login incorrectly, the error log on the system gets updated, lettingthe sysops(s) know something is amiss.Another error is "Cannot change to home directory" or "Cannot ChangeDirectory." This means that no "home directory" which is essentially the'root' directory for an account, which is the directory you start off in.On DOS, you start in A:\ or C:\ or whatever, but in UNIX you start in/homedirectory. [Note: The / is used in directories on UNIX, not a \ ].Most systems will log you off after this, but some tell you that they willput you in the root directory [ '/'].Another error is "No Shell". This means that no "shell" was definedfor that particular account. The "shell" will be explained later. Somesystems will log you off after this message. Others will tell you that theywill use the regular shell, by saying "Using the bourne shell", or "Using sh"-----------------------------Accounts In General :-----------------------------This section is to hopefully describe to you the user structurein the UNIX environment.Ok, think of UNIX having two levels of security: absolute power,or just a regular user. The ones that have absolute power are those usersat the root level. Ok, now is the time to think in numbers. Unix associatesnumbers with account names. each account will have a number. Some will havethe same number. That number is the UID [user-id] of the account. the rootuser id is 0. Any account that has a user id of 0 will have root access.Unix does not deal with account names ...
[ Pobierz całość w formacie PDF ] zanotowane.pldoc.pisz.plpdf.pisz.plsmichy-chichy.xlx.pl
|
|
Podobne |
: Strona Główna | : 00 index, Classic - Komputery lat '80, Classic 8 bit, Amstrad, gry, adventur, text | : 01 Dumna guwernantka, Akademia Guwernantek - Christina Dodd | : Śmieszne dźwięki, ZABAWY FUNDAMENTALNEWiek 18m-2l | : #0755 â Rejecting Newer Technology, - Ang, mater, ESL Podcast McQuillan Jeff mp3+PDF | : [Polish] Duch W. - Fizyka Umyslu, - Różne - | : #0498 â Joking and Making Fun of People, - Ang, mater, ESL Podcast McQuillan Jeff mp3+PDF | : #0467 â Buying Men's Shirts, - Ang, mater, ESL Podcast McQuillan Jeff mp3+PDF | : 0017 Kurier Szachowy, Kurier szachowy, 2015 | : #0624 â Advantages and Disadvantages in Life, - Ang, mater, ESL Podcast McQuillan Jeff mp3+PDF | : (ENG) Beading - Jewelry Making & Beading for Dummies-robienie bizuterii dla idiotow, DIY, Biżuteria
zanotowane.pldoc.pisz.plpdf.pisz.plkubawasala.prv.pl
| . : : . |
|