A BEGINNERS GUIDE TO: * * H A C K I N G FROM Sudohackers.
A BEGINNERS GUIDE
A BEGINNERS GUIDE TO: * * H A C K I N G FROM Sudohackers-
************************************** * A BEGINNERS GUIDE TO: * * H A C K I N G * * * * U N I X * * * * BY JESTER SLUGGO * * (NOTE: THIS IS WRITTEN IN 40 COL.) * * WRITTEN 10/08/85 * ************************************** IN THE FOLLOWING FILE, ALL REFERENCES MADE TO THE NAME UNIX, MAY ALSO BE SUBSTITUTED TO THE XENIX OPERATING SYSTEM. BRIEF HISTORY: BACK IN THE EARLY SIXTIES, DURING THE DEVELOPMENT OF THIRD-GENERATION COMPUTERS AT MIT, A GROUP OF PROGRAMMERS STUDYING THE POTENTIAL OF COMPUTERS, DISCOVERED THEIR ABILITY TO PERFORM TWO OR MORE TASKS SIMULTANEOUSLY.
BELL LABS, TAKING NOTICE OF THIS DISCOVERY, PROVIDED FUNDS FOR THEIR DEVELOPMENTAL SCIENTISTS TO INVESTIGATE INTO THIS NEW FRONTIER. AFTER ABOUT 2 YEARS OF DEVELOPMENTAL RESEARCH, THEY PRODUCED AN OPERATING SYSTEM THEY CALLED “UNIX”. THE SIXTIES TO CURRENT: DURING THIS TIME BELL SYSTEMS INSTALLED THE UNIX SYSTEM TO PROVIDE THEIR COMPUTER OPERATORS WITH THE ABILITY TO MULTITASK SO THAT THEY COULD BECOME MORE PRODUCTIVE, AND EFFICIENT. ONE OF THE SYSTEMS THEY PUT ON THE UNIX SYSTEM WAS CALLED “ELMOS”.
THROUGH ELMOS MANY TASKS (I.E. BILLING, AND INSTALLATION RECORDS) COULD BE DONE BY MANY PEOPLE USING THE SAME MAINFRAME. NOTE: COSMOS IS ACCESSED THROUGH THE ELMOS SYSTEM. CURRENT: TODAY, WITH THE DEVELOPMENT OF MICROCOMPUTERS, SUCH MULTITASKING CAN BE ACHIEVED BY A SCALED-DOWN VERSION OF UNIX (BUT JUST AS POWERFUL).
MICROSOFT, SEEING THIS DEVELOPMENT, OPTED TO DEVELOP THEIR OWN UNIX-LIKE SYSTEM FOR THE IBM LINE OF PC/XT’S. THEIR RESULT THEY CALLED XENIX (PRONOUNCED ZEE-NICKS). BOTH UNIX AND XENIX CAN BE EASILY INSTALLED ON IBM PCS AND OFFER THE SAME FUNCTION (JUST 2 DIFFERENT VENDORS).
NOTE: DUE TO THE MANY DIFFERENT VERSIONS OF UNIX (BERKLEY UNIX, BELL SYSTEM III, AND SYSTEM V THE MOST POPULAR) MANY COMMANDS FOLLOWING MAY/MAY NOT WORK. I HAVE WRITTEN THEM IN SYSTEM V ROUTINES. UNIX/XENIX OPERATING SYSTEMS WILL BE CONSIDERED IDENTICAL SYSTEMS BELOW.
HOW TO TELL IF/IF NOT YOU ARE ON A UNIX SYSTEM:
UNIX SYSTEMS ARE QUITE COMMON SYSTEMS ACROSS THE COUNTRY. THEIR SECURITY APPEARS AS SUCH:
LOGIN; (OR LOGIN
PASSWORD:
WHEN HACKING ON A UNIX SYSTEM IT IS BEST TO USE LOWERCASE BECAUSE THE UNIX SYSTEM COMMANDS ARE ALL DONE IN LOWER CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS USUALLY THE NAME (I.E. JOE OR FRED) OF THE USER, OR INITIALS (I.E. J.JONES OR F.WILSON). HINTS FOR LOGIN NAMES CAN BE FOUND TRASHING THE LOCATION OF THE DIAL-UP (USE YOUR CN/A TO FIND WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD ASSIGNED BY THE SYSOP OR CHOSEN BY THE USER.
COMMON DEFAULT LOGINS
————————–
LOGIN; PASSWORD:
ROOT ROOT, SYSTEM, ETC..
SYS SYS, SYSTEM
DAEMON DAEMON
UUCP UUCP
TTY TTY
TEST TEST
UNIX UNIX
BIN BIN
ADM ADM
WHO WHO
LEARN LEARN
UUHOST UUHOST
NUUCP NUUCP
IF YOU GUESS A LOGIN NAME AND YOU ARE NOT ASKED FOR A PASSWORD AND HAVE ACCESS TO THE SYSTEM, THEN YOU HAVE WHAT IS KNOWN AS A NON-GIFTED ACCOUNT. IF YOU GUESS THE CORRECT LOGIN AND PASSWORD, THEN YOU HAVE A USER ACCOUNT. AND, IF YOU GUESS THE ROOT PASSWORD,
THEN YOU HAVE A “SUPER-USER” ACCOUNT. ALL UNIX SYSTEMS HAVE THE FOLLOWING
INSTALLED TO THEIR SYSTEM: ROOT, SYS, BIN, DAEMON, UUCP, ADM. ONCE YOU ARE IN THE SYSTEM, YOU WILL GET A PROMPT. COMMON PROMPTS ARE:
$
%
#
BUT CAN BE JUST ABOUT ANYTHING THE SYSOP OR USER WANTS IT TO BE.
THINGS TO DO WHEN YOU ARE IN: SOME OF THE COMMANDS THAT YOU MAY WANT TO
TRY TO FOLLOW BELOW:
WHO IS ON (SHOWS WHO IS CURRENTLY LOGGED ON THE SYSTEM.) WRITE NAME (NAME IS THE PERSON YOU WISH TO CHAT WITH) TO EXIT CHAT MODE TRY CTRL-D. EOT=END OF TRANSFER.
LS -A (LIST ALL FILES IN THE CURRENT DIRECTORY.)
DU -A (CHECKS AMOUNT OF MEMORY YOUR FILES USE; DISK USAGE)
CD\NAME (NAME IS THE NAME OF THE SUB-DIRECTORY YOU CHOOSE)
CD\ (BRINGS YOUR HOME DIRECTORY TO CURRENT USE)
CAT NAME (NAME IS A FILENAME EITHER A PROGRAM OR DOCUMENTATION YOUR USERNAME HAS WRITTEN)
MOST UNIX PROGRAMS ARE WRITTEN IN THE C LANGUAGE OR PASCAL SINCE UNIX IS A PROGRAMMER’S ENVIRONMENT. ONE OF THE FIRST THINGS DONE ON THE SYSTEM IS TO PRINT UP OR CAPTURED (IN A BUFFER) THE FILE CONTAINING ALL USER NAMES AND ACCOUNTS. THIS CAN BE DONE BY DOING THE FOLLOWING COMMAND:
CAT /ETC/PASSWD
IF YOU ARE SUCCESSFUL YOU WILL HAVE A LIST OF ALL ACCOUNTS ON THE SYSTEM. IT SHOULD LOOK LIKE THIS:
ROOT: HVNSDCF:0:0:ROOT DIR:/:
JOE: MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOE
HAL::1:2:HAL SMITH:/BIN:/BIN/HAL
THE “ROOT” LINE TELLS THE FOLLOWING INFO :
LOGIN NAME=ROOT
HVNSDCF = ENCRYPTED PASSWORD
0 = USER GROUP NUMBER
0 = USER NUMBER
ROOT DIR = NAME OF USER
/ = ROOT DIRECTORY
IN THE JOE LOGIN, THE LAST PART “/BIN/JOE ” TELLS US WHICH DIRECTORY IS HIS HOME DIRECTORY (JOE).
IN THE “HAL” EXAMPLE THE LOGIN NAME IS FOLLOWED BY 2 COLONS, WHICH MEANS THAT
THERE IS NO PASSWORD NEEDED TO GET IN USING HIS NAME.
CONCLUSION: I HOPE THAT THIS FILE WILL HELP OTHER NOVICE UNIX HACKERS OBTAIN ACCESS TO THE UNIX/XENIX SYSTEMS THAT THEY MAY FIND. THERE IS STILL WIDE GROWTH IN THE FUTURE OF UNIX, SO I HOPE USERS WILL NOT ABUSE ANY SYSTEMS (UNIX OR ANY OTHERS) THAT THEY MAY HAPPEN ACROSS ON THEIR JOURNEY ACROSS THE ELECTRONIC HIGHWAYS OF AMERICA. THERE IS MUCH MORE TO BE LEARNED ABOUT THE UNIX SYSTEM THAT I HAVE NOT COVERED. THEY MAY BE FOUND BY BUYING A BOOK ON THE UNIX SYSTEM (HOW I LEARNED) OR IN THE FUTURE I MAY WRITE A PART II TO THIS…….. Downloaded from P-80 Systems……
That’s all on A BEGINNERS GUIDE TO: * * H A C K I N G FROM Sudohackers.
WE ARE HERE FOR SERIOUS BUSINESS, WE DO NOT TOLERATE TIME WASTERS AND BEGGARS TRYING TO BEG OR SCAM US OF OUR PRODUCTS. Payment is Upfront, Our services are not free
Contact us for support. We sell fresh ATM Hacking, Paypal/Cashapp accounts & Transfers, Dumps with Pin, Western Union Transfers, ATM Skimmers, Bank logins, and lots more.