Strona główna
  017

017, programy na windowsa, hack komputer, Anarchist Cookbook 2004, Additions

[ Pobierz całość w formacie PDF ]
*** A List Of Some OF The Most Useful UNIX ***** Hacking Commands, and Some Hints On Their Usage ***---------------------------------------------------------------It is fun and often usefull to create a file that is ownedby someone else. On most systems with slack security ie 99% ofall UNIX systems, this is quite easily done. The chown commandwill change any of your files to make someone else the owner.Format is as follows:chown ownername filelistWhere ownername is the new owner, and filelist is the list offiles to change. You must own the file which your are goin tochange, unless you are a superuser....then u can change ANYTHING!chgrp is a similar command which will change the groupownership on a file. If you are going to do both a chown and achgrp on a file, then make sure you do the chgrp first! Once thefile is owned by someone else, you cant change nything about it!---------------------------------------------------------------Sometimes just seeing who is on the system is a challenge initself. The best way is to write your own version of who in C,but if you can't do that then this may be of some help to you:who followed by on or more of the following flags:-b Displays time sys as last booted.-H Precedes output with header.-l Lists lines waiting for users to logon.-q displays number of users logged on.-t displays time sys clock was last changed.-T displays the state field (a + indicates it ispossible to send to terminal, a - means u cannot)-u Give a complete listing of those logged on.**who -HTu is about the best choice for the average user**##by the way, the list of users logged on is kept in the file/etc/utmp. If you want to write your own personalised version ofwho in C, you now know where to look!###---------------------------------------------------------------When a users state field (see -T flag option for whocommand) says that a user has their message function on, thisactually means that it is possible to get stuff onto theirscreen.Basically, every terminal on the system has a filecorresponding to it. These files can be found in the /devdirectory. You can to anything to these files, so long as youhave access -eg you can read them, and write to them, but youwill notice that they never change in size. They are calledcharacter specific files, and are really the link between thesystem and the terminals. Whatever you put in these files willgo staright to the terminal it corresponds to.Unfortunately, on most systems, when the user logs in, the"mesg n" command is issued which turns off write access to thatterminal, BUT- if you can start cating to that terminal beforesystem issues the mesg n command, then you will continue to beable to get stuff up on that terminal! This has many varied uses.Check out the terminal, or terminal software being used.Often you will be able to remotely program another usersterminal, simply by 'cating' a string to a users screen. Youmight be able to set up a buffer, capturing all that is typed, oryou may be able to send the terminal into a frenzy- (sometimes auser will walk away without realizing that they are silleffectively logged on, leaving you with access to theiraccount!). Some terminal types also have this great commandcalled transmit screen. It transmits everything on the screen,just as if the user had typed it !So just say I wanted to log off a user, then I would send aclear screen command (usually ctrl l), followed by "exit"followed by a carriage return, followed by the transmit screencode. Using ths technique you can wipe peoples directories oranything. My favourite is to set open access on all their filesand directories so I can peruse them for deletion etc at my ownleisure).---------------------------------------------------------------If you ever briefly get access to another persons accounteg. they leave the room to go to toilet or whatever, then simplytype the following:chmod 777 $HOMEchmod 777 $MAILThen clear the screen so they dont see what you just typed.Now you can go look at their directory, and their mail, andyou can even put mail in their mail file. (just use the sameformat as any mail that is already there!). Next time they log inthe system will automatically inform them they have new mail!---------------------------------------------------------------Another way to send fake mail to people is to use the mailserver. This method produces mail that is slightly different tonormal, so anyone who uses UNIX a bit may be suspiscious whenthey receive it, but it will fool the average user!type telnetthe following prompt will appear:telnet>now type :open localhost 25some crap will come up about the mail server..now type:mail from: xxxxxx Put any name you want.some more bullshit will come up. Now type:rcpt to: xxxxxx Put the name of the person to receive mail here.now type:datanow you can type the letter...end it with a "."type quit to exit once you are done.-------------------------------------------------------------Heres one for any experimenters out there...It is possible to create files which simply cannot be deletedfrom the standard shell. To do this you will have to physicallyCREATE THE FILE USING A C PROGRAM or SCRIPT FILE, and you willhave to use a sequence of control characters which cannot betyped from the shell. Try things like Ctrl-h (this is thecode for the delete key). Just a file with the name Ctrl-h wouldnot be deleteable from the shell, unless you used wildcards. So,make it a nice long series of characters, so that to delete thefile, the user has no choice but to individually copy all hisfiles elsewhere, then delete everything in his directory, andthen copy all his files back.....this is one of myfavourites..gets em every time!The following script file is an example which will create afile with the name Ctrl-h. You MUST tyoe this file in using thevi editor or similar.*****If you are not very good with vi, type "man vi" and print thehelp file...it even contains stuff that I find useful now andthen.*****type the following in vi...echo'' > 'a^h'***NOTE...to get the ^h (this really means ctrl-h) from vi type:Ctrl vCtrl hThe Ctrl v instrcts vi to take the next character as a asciicharacter, and not to interpret it.change the access on the file you just created and nowexecute it. It will create a file which looks like it is calleda, but try to delete it !..use wildcards if you really want todelete it.*> Title: Tutorial on hacking through a UNIX system**In the following file, all references made to the name Unix, may also besubstituted to the Xenix operating system.Brief history: Back in the early sixties, during the development ofthird generation computers at MIT, a group of programmers studying thepotential of computers, discovered their ability of performing two ormore tasks simultaneously. Bell Labs, taking notice of this discovery,provided funds for their developmental scientists to investigate into thisnew frontier. After about 2 years of developmental research, they producedan operating system they called "Unix".Sixties to Current: During this time Bell Systems installed the Unix systemto provide their computer operators with the ability to multitask so thatthey could become more productive, and efficient. One of the systems theyput on the Unix system was called "Elmos". Through Elmos many tasks (i.e.billing,and installation records) could be done by many people using the samemainframe.Note: Cosmos is accessed through the Elmos system.Current: Today, with the development of micro computers, such multitaskingcan be achieved by a scaled down version of Unix (but just aspowerful). Microsoft,seeing this development, opted to develop their ownUnix like system for the IBM line of PC/XT's. Their result they calledXenix (pronounced zee-nicks). Both Unix and Xenix can be easily installedon IBM PC's and offer the same function (just 2 different vendors).Note: Due to the many different versions of Unix (Berkley Unix,Bell System III, and System V the most popular) many commandsfollowing may/may not work. I have written them in System V routines.Unix/Xenix operating systems will be considered identical systems below.How to tell if/if not you are on a Unix system: Unix systems are quitecommon systems across the country. Their security appears as such:Login; (or login;)password:When hacking on a Unix system it is best to use lowercase because the Unixsystem commands are all done in lower- case. Login; is a 1-8 character field. It isusually the name (i.e. joe or fred) of the user, or initials (i.e. j.jonesor f.wilson). Hints for login names can be found trashing the location ofthe dial-up (use your CN/A to find where the computer is). Password: is a 1-8 character password assigned by the sysop or chosen by the user.Common default logins--------------------------login; Password:root root,system,etc..sys sys,systemdaemon daemonuucp uucptty ttytest testunix unixbin binadm admwho wholearn learnuuhost uuhostnuucp nuucpIf you guess a login name and... [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • smichy-chichy.xlx.pl


  •  Podobne
     : Strona Główna
     : 00 index, Classic - Komputery lat '80, Classic 8 bit, Amstrad, gry, adventur, text
     : 004. Białe róże (tekst), PIEŚNI PATRIOTYCZNE - CAŁOŚĆ (TEKST+NUTY), nuty i teksty pieśni patriotycznych
     : [HorribleSubs] Rokka no Yuusha - 10 [720p], Polskie napisy z translatora
     : 001 002 Biaśâ€šy Miśâ€ş, nuty w łatwym układzie
     : ć†wiczenia po endoprotezie(1), Veroniczka001Fizjoterapia
     : Ćwiczenia rozwijajÂące wyobraÄ˝nię, fiszki i cwiczenia (Poukladane alfabetycznie) OK 2000
     : #0300 – Arriving for an Appointment, - Ang, mater, ESL Podcast McQuillan Jeff mp3+PDF
     : 008.Podstawowe materiały stosowane do produkcji rękojeści, Noże
     : 003. A gdy na wojenkę (tekst), PIEŚNI PATRIOTYCZNE - CAŁOŚĆ (TEKST+NUTY), nuty i teksty pieśni patriotycznych
     : Świat dawcy 1, HDK
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • kubawasala.prv.pl
  •  . : : .
    Copyright (c) 2008 póki będą na świecie książki, moje szczęście jest zabezpieczone. | Designed by Elegant WPT