Tuesday, August 11, 2015

BEGINNERS GUIDE TO:

   **************************************  
*    A BEGINNERS GUIDE TO:        
*  *   H A C K I N G             *  *                                    *  *                U N I X             *  *                                    *  
*          BY JESTER SLUGGO          *  
* (NOTE: THIS IS WRITTEN IN 40 COL.) *  
*         WRITTEN 10/08/85           *  **************************************    


IN THE FOLLOWING FILE, ALL REFERENCES  MADE TO THE NAME UNIX, MAY ALSO BE  SUBSTITUTED TO THE XENIX OPERATING  SYSTEM.    BRIEF HISTORY:  BACK IN THE EARLY  SIXTIES, DURING THE DEVELOPMENT OF  THIRD GENERATION COMPUTERS AT MIT,  A GROUP OF PROGRAMMERS STUDYING THE  POTENTIAL OF COMPUTERS, DISCOVERED  THEIR ABILITY OF PERFORMING TWO OR  MORE TASKS SIMULTANEOUSLY.  BELL  LABS, TAKING NOTICE OF THIS DISCOVERY,  PROVIDED FUNDS FOR THEIR DEVELOPMENTAL  SCIENTISTS TO INVESTIGATE INTO THIS  NEW FRONTIER.  AFTER ABOUT 2 YEARS OF  DEVELOPMENTAL RESEARCH, THEY PRODUCED  AN OPERATING SYSTEM THEY CANLMD "UNIX".    SIXTIES TO CURRENT:  DURING THIS TIME  BELL SYSTEMS INSTALLED THE UNIX SYSTEM  TO PROVIDE THEIR COMPUTER OPERATORS  WITH THE ABILITY TO MULTITASK SO THAT  THEY COULD BECOME MORE PRODUCTIVE,  AND EFFICIENT.  ONE OF THE SYSTEMS THEY PUT ON THE UNIX SYSTEM WAS CALLED  "ELMOS". THROUGH ELMOS MANY TASKS (I.E. BILLING,AND INSTALLATION RECORDS) COULD  BE DONE BY MANY PEOPLE USING THE SAME  MAINFRAME.    NOTE: COSMOS IS ACCESSED THROUGH THE  ELMOS SYSTEM.    CURRENT:  TODAY, WITH THE DEVELOPMENT  OF MICRO COMPUTERS, SUCH MULTITASKING  CAN BE ACHIEVED BY A SCALED DOWN  VERSION OF UNIX (BUT JUST AS  POWERFUL).  MICROSOFT,SEEING THIS  DEVELOPMENT, OPTED TO DEVELOP THEIR OWN  UNIX LIKE SYSTEM FOR THE IBM LINE OF  PC/XT'S.  THEIR RESULT THEY CALLED  XENIX (PRONOUNCED ZEE-NICKS).  BOTH  UNIX AND XENIX CAN BE EASILY INSTALLED
ON IBM PC'S AND OFFER THE SAME FUNCTION
(JUST 2 DIFFERENT VENDORS).

NOTE: DUE TO THE MANY DIFFERENT
VERSIONS OF UNIX (BERKLEY UNIX,
BELL SYSTEM III, AND SYSTEM V
THE MOST POPULAR) MANY COMMANDS
FOLLOWING MAY/MAY NOT WORK. I HAVE
WRITTEN THEM IN SYSTEM V ROUTINES.
UNIX/XENIX OPERATING SYSTEMS WILL
BE CONSIDERED IDENTICAL SYSTEMS BELOW.


HOW TO TELL IF/IF NOT YOU ARE ON A
UNIX SYSTEM:  UNIX SYSTEMS ARE QUITE
COMMON SYSTEMS ACROSS THE COUNTRY.
THEIR SECURITY APPEARS AS SUCH:

LOGIN;     (OR LOGIN;)
PASSWORD:

WHEN HACKING ON A UNIX SYSTEM IT IS
BEST TO USE LOWERCASE BECAUSE THE UNIX
SYSTEM COMMANDS ARE ALL DONE IN LOWER-
CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS
USUALLY THE NAME (I.E. JOE OR FRED)
OF THE USER, OR INITIALS (I.E. J.JONES
OR F.WILSON).  HINTS FOR LOGIN NAMES
CAN BE FOUND TRASHING THE LOCATION OF
THE DIAL-UP (USE YOUR CN/A TO FIND
WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD
ASSIGNED BY THE SYSOP OR CHOSEN BY THE
USER.
      COMMON DEFAULT LOGINS
   --------------------------
   LOGIN;       PASSWORD:
   ROOT         ROOT,SYSTEM,ETC..
   SYS            SYS,SYSTEM
   DAEMON       DAEMON
   UUCP         UUCP
   TTY            TTY
   TEST          TEST
   UNIX          UNIX
   BIN                  BIN
   ADM               ADM
   WHO              WHO
   LEARN          LEARN
   UUHOST       UUHOST
   NUUCP          NUUCP


IF YOU GUESS A LGIN NAME AND YOU ARE
NOT ASKED FOR A PASSWORD, AND HAVE
ACCESSED TO THE SYSTEM, THEN YOU HAVE
WHAT IS KNOWN AS A NON-GIFTED ACCOUNT.
IF YOU GUESS A CORRECT LOGIN AND PASS-
WORD, THEN YOU HAVE A USER ACCOUNT.
AND, IF YOU GUESS THE ROOT PASSWORD,
THEN YOU HAVE A "SUPER-USER" ACCOUNT.
ALL UNIX SYSTEMS HAVE THE FOLLOWING
INSTALLED TO THEIR SYSTEM:
ROOT, SYS, BIN, DAEMON, UUCP, ADM
ONCE YOU ARE IN THE SYSTEM, YOU WILL
GET A PROMPT. COMMON PROMPTS ARE:

$
%
#

BUT CAN BE JUST ABOUT ANYTHING THE
SYSOP OR USER WANTS IT TO BE.

THINGS TO DO WHEN YOU ARE IN: SOME OF THE COMMANDS THAT YOU MAY WANT TO TRY FOLLOW BELOW:

WHO IS ON  (SHOWS WHO IS CURRENTLY LOGGED ON THE SYSTEM.) 


WRITE NAME (NAME IS THE PERSON YOU WISH TO CHAT WITH) 


      TO EXIT CHAT MODE TRY CTRL-D.
      EOT=END OF TRANSFER.
LS -A      (LIST ALL FILES IN CURRENT DIRECTORY.)
DU -A      (CHECKS AMOUNT OF MEMORY YOUR FILES USE;DISK USAGE) 


CD\NAME    

(NAME IS THE NAME OF THE    SUB-DIRECTORY YOU CHOOSE)
CD\    

(BRINGS YOUR HOME DIRECTORY TO CURRENT USE) 

CAT NAME  (NAME IS A FILENAME EITHER   A PROGRAM OR DOCUMENTATION YOUR USERNAME HAS WRITTEN)
      MOST UNIX PROGRAMS ARE WRITTEN
      IN THE C LANGUAGE OR PASCAL
      SINCE UNIX IS A PROGRAMMERS'
      ENVIRONMENT.
ONE OF THE FIRST THINGS DONE ON THE
SYSTEM IS PRINT UP OR CAPTURE (IN A
BUFFER) THE FILE CONTAINING ALL USER
NAMES AND ACCOUNTS. THIS CAN BE DONE
BY DOING THE FOLLOWING COMMAND:

CAT /ETC/PASSWD

IF YOU ARE SUCCESSFUL YOU WILL A LIST
OF ALL ACCOUNTS ON THE SYSTEM.  IT
SHOULD LOOK LIKE THIS:

ROOT:HVNSDCF:0:0:ROOT DIR:/:
JOE:MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOE
HAL::1:2:HAL SMITH:/BIN:/BIN/HAL

THE "ROOT" LINE TELLS THE FOLLOWING INFO :
LOGIN NAME=ROOT
HVNSDCF   = ENCRYPTED PASSWORD
0         = USER GROUP NUMBER
0         = USER NUMBER 


ROOT DIR  = NAME OF USER
/         = ROOT DIRECTORY

IN THE JOE LOGIN, THE LAST PART 

"/BIN/JOE " TELLS US WHICH DIRECTORY
IS HIS HOME DIRECTORY (JOE) IS.

IN THE "HAL" EXAMPLE THE LOGIN NAME IS
FOLLOWED BY 2 COLONS, THAT MEANS THAT
THERE IS NO PASSWORD NEEDED TO GET IN
USING HIS NAME.

CONCLUSION:  I HOPE THAT THIS FILE
WILL HELP OTHER NOVICE UNIX HACKERS
OBTAIN ACCESS TO THE UNIX/XENIX
SYSTEMS THAT THEY MAY FIND. THERE IS
STILL WIDE GROWTH IN THE FUTURE OF
UNIX, SO I HOPE USERS WILL NOT ABUSE
ANY SYSTEMS (UNIX OR ANY OTHERS) THAT
THEY MAY HAPPEN ACROSS ON THEIR
JOURNEY ACROSS THE ELECTRONIC HIGHWAYS  OF AMERICA.  THERE IS MUCH MORE TO BE  LEARNED ABOUT THE UNIX SYSTEM THAT I  HAVE NOT COVERED.  THEY MAY BE FOUND  BY BUYING A BOOK ON THE UNIX SYSTEM  (HOW I LEARNED) OR IN THE FUTURE  I MAY WRITE A PART II TO THIS........   Downloaded from P-80 Systems......                                                                                                       a            

MAXIT INTERNET

BLOGGER

CD DVD RW

DELL

DOWNLOAD

FTP Server Linux

HACK

HARD DRIVE

HOW TO WORKIN

HARDWAER

INTERNET

INTERNET CAFE

LAPTOP

LENOVO

LINUX

Additional configuration for Samba Server (Part 2)  

BSNL/Airtel/Idea using Huawei E156G 3g Wireless USB Linux 5   

Basic File Extensions    CHANGING AN ACCOUNT EXPIRATION DATE   

Configure Linux as a Router   

Configure SAMBA Server (Part-1)   

Configure VNC server   

Configure Yum Server (Part-1)   

Configure yum server for Client machine (Part 3)   

Configuring Samba as a Standalone Server (Part 3)  

Connecting ftp Server with Anonymous User Part 5  

Create ftp account with Shared directory Part 3  

DHCP Server Configuration Part 2  

DHCP Server Configuration Part-1  

DHCP Server Configuration Part-3  

Enabling FTP Services in Yum Server (Part 5)  

FTP Server Configuration Part 1  

FTP Server How to Change In Primary DNS Server Part 2  

HTTP Client side configuration (Part 4)  

How to Vsftpd conf files Parameter Part 6   

LINUX FILE SYSTEM STRUCTURE  

Linux User Administrtion  

Linux as a Router configuration for Client Machine   

Linux client machine FileZilla FTP Client Part 4  

Local Yum Server (Part 2)  

Modifying Existing User Information  

Primary DNS Server Configuration Part-1  

Primary DNS Server Configuration Part-2    

Primary DNS Server Configuration Part-3  

Remove Linux From Your Pc Safely and restoring your MBR  

Sharing & Accessing Samba Share (Part 4)   

Speeding up your internet connection under Linux and Windows   

THE ROOT FILE SYSTEM   

VNC Server Configuration

LINUX LAB

Linux as a Router

MOTHERBOARD

Mobile

NETWORKING

REDHAT 5

REGISTRY EDTOR

RESET BIOS PASSWORD

SAMBA Server Linux

SERVER

SERVER CONFIG

SOFTWAER

VNC server Linux

Window 10

Window XP