Saturday 16 June 2012

First step to hack UNIX





This informative article is for individuals that are begineers to hack UNIX.  Within the following file, all references created to the name Unix, could also besubstituted for the Xenix operating-system.


  Brief history:  Back in early sixties, during the introduction of third generation computers at MIT, a group of programmers staring at the potential of computers, discovered their ability of performing several tasks simultaneously.  Bell Labs, taking notice on this discovery, provided funds fortheir developmental scientists to investigate into this new frontier.  After about 24 months of developmental research, they produced an operating system they called "Unix".
  Sixties to Current:  During now Bell Systems installed the Unix system to provide their computer operators having the ability to multitask in order that they could be a little more productive, and efficient.  One from the systems they put on the Unix system was called "Elmos".  Through Elmos many tasks (i.e.  billing, and installation records) could be carried out by many people utilizing the same mainframe.
  


Note:  Cosmos is accessed through the Elmos system.
  Current:  Today, with the introduction of micro computers, such multitasking can be performed by way of a scaled down version of Unix (but just as powerful).Microsoft,seeing this development, opted to develop their own Unix like systemfor the IBM distinct PC/XT's.  Their result they called Xenix (pronouncedzee-nicks).  Both Unix and Xenix can easily be placed on IBM PC's and offerthe same functions (just 2 different vendors).
  


Note:  Due to the many different versions of Unix (Berkley Unix, Bell System
III, and System V the most popular) many commands following may/may not work.  I
have written them in System V routines.  Unix/Xenix operating systems will be
considered identical systems below.

  How to tell if/if not you are on a Unix system:  Unix systems are quite common
systems across the country.  Their security appears as such:

Login;     (or login;)
password:

  When hacking on a Unix system it is best to use lowercase because the Unix
system commands are all done in lower- case.

  Login; is a 1-8 character field.  It is usually the name (i.e.  joe or fred)
of the user, or initials (i.e.  j.jones or f.wilson).  Hints for login names can
be found trashing the location of the dial-up (use your CN/A to find where the
computer is).

  Password:  is a 1-8 character password assigned by the sysop or chosen by the
user.

      Common default logins
   --------------------------

   login;       Password:

   root         root,system,etc..
   sys          sys,system
   daemon       daemon
   uucp         uucp
   tty          tty
   test         test
   unix         unix
   bin          bin
   adm          adm
   who          who
   learn        learn
   uuhost       uuhost
   nuucp        nuucp

  If you guess a login name and you are not asked for a password, and have
accessed to the system, then you have what is known as a non-gifted account.  If
you guess a correct login and pass- word, then you have a user account.  And,
if you guess the root password, then you have a "super-user" account.  All Unix
systems have the following installed to their system:  root, sys, bin, daemon,
uucp, adm

  Once you are in the system, you will get a prompt.  Common prompts are:


$

%

#


  But can be just about anything the sysop or user wants it to be.

  Things to do when you are in:  Some of the commands that you may want to try
follow below:

  who is on (shows who is currently logged on the system.)
  write name (name is the person you wish to chat with)
  To exit chat mode try ctrl-D.
  EOT=End of Transfer.
  ls -a (list all files in current directory.)
  du -a (checks amount of memory your files use;disk usage)
  cd\name (name is the name of the sub-directory you choose)
  cd\ (brings your home directory to current use)
  cat name (name is a filename either a program or documentation your username
has written)

  Most Unix programs are written in the C language or Pascal since Unix is a
programmers' environment.

  One of the first things done on the system is print up or capture (in a
buffer) the file containing all user names and accounts.  This can be done by
doing the following command:



cat /etc/passwd



  If you are successful you will a list of all accounts on the system.  It
should look like this:

root:hvnsdcf:0:0:root dir:/:
joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe
hal::1:2:Hal Smith:/bin:/bin/hal

  The "root" line tells the following info :

login name=root
hvnsdcf   = encrypted password
0         = user group number
0         = user number
root dir  = name of user
/         = root directory

  In the Joe login, the last part "/bin/joe " tells us which directory is his
home directory (joe) is.

  In the "hal" example the login name is followed by 2 colons, that means that
there is no password needed to get in using his name.

  Conclusion:  I hope until this file might help other novice Unix hackers obtain access for the Unix/Xenix systems that they will find.  There remains to be wide grow thin the way forward for Unix, i really hope users will not abuse any systems (Unix or any others) that they will happen across on the journey through the electronic highways of the usa.  There is a bit more to be learned about the Unix systemthat I have not covered.  They might be discovered by investing in a book about the Unix System(generate income learned) or down the road I may write a part II to this particular........

No comments:

Post a Comment