📄 025.txt
字号:
bin bin
adm adm
adm admin
admin adm
admin admin
sysman sysman
sysman sys
sysman system
sysadmin sysadmin
sysadmin sys
sysadmin system
sysadmin admin
sysadmin adm
who who
learn learn
uuhost uuhost
guest guest
host host
nuucp nuucp
rje rje
games games
games player
sysop sysop
root sysop
demo demo
Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:
/etc/passwd
or
cat /etc/passwd
The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:
john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john
Broken down, this is what the above password file states:
Username: john
Encrypted Password: 234abc56
User Number: 9999
Group Number: 13
Other Information: John Johnson
Home Directory: /home/dir/john
Shell: /bin/john
If the password file does not show up under one of the above two commands, then it is probably shadowed.
The following definition of password shadowing was taken from the alt.2600 hack faq:
"Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:
UNIX System Type: Path: Token:
AIX 3 /etc/security/passwd !
or /tcb/auth/files/(first letter of
username)/(username) #
A/UX 3.Os /tcb/files/auth/ *
BSD4.3-Reno /etc/master.passwd *
ConvexOS 10 /etc/shadpw *
Convex0S 11 /etc/shadow *
DG/UX /etc/tcb/aa/user *
EP/IX /etc/shadow x
HP-UX /.secure/etc/passwd *
IRIX 5 /etc/shadow x
Linux 1.1 /etc/shadow *
OSF/1 /etc/passwd[.dir|.pag] *
SCO UNIX #.2.x /tcb/auth/files/(first letter of *
username)/(username)
SunOS 4.1+c2 /etc/security/passwd.adjunct #
SunOS 5.0 /etc/shadow #
System V 4.0 /etc/shadow x
System V 4.2 /etc/security/database *
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb *
Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:
bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob
The characters in the password aging data stand for the following:
1. Maximum number of weeks a password can be used without changing.
2. Minimum number of weeks a password must be used before being changed.
3&4. Last time password was changed, in number of weeks since 1970.
The password aging data can be decoded using the chart below:
Character: Number:
. 0
/ 1
0 2
1 3
2 4
3 5
4 6
5 7
6 8
7 9
8 10
9 11
A 12
B 13
C 14
D 15
E 16
F 17
G 18
H 19
I 20
J 21
K 22
L 23
M 24
N 25
O 26
P 27
Q 28
R 29
S 30
T 31
U 32
V 33
W 34
X 35
Y 36
Z 37
a 38
b 39
c 40
d 41
e 42
f 43
g 44
h 45
i 46
j 47
k 48
l 49
m 50
n 51
o 52
p 53
q 54
r 55
s 56
t 57
u 58
v 59
w 60
x 61
y 62
z 63
Now, explore the system freely, be careful, and have fun!
K. Basic VAX/VMS hacking
The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:
Username: Password:
SYSTEM OPERATOR
SYSTEM MANAGER
SYSTEM SYSTEM
SYSTEM SYSLIB
OPERATOR OPERATOR
SYSTEST UETP
SYSTEST SYSTEST
SYSTEST TEST
SYSMAINT SYSMAINT
SYSMAINT SERVICE
SYSMAINT DIGITAL
FIELD FIELD
FIELD SERVICE
GUEST GUEST
GUEST unpassworded
DEMO DEMO
DEMO unpassworded
TEST TEST
DECNET DECNET
Here are some of the VAX/VMS commands:
Command: Function:
HELP (H) Gives help and list of commands.
TYPE (T) View contents of a file.
RENAME (REN) Change name of a file.
PURGE (PU) Deletes old versions of a file.
PRINT (PR) Prints a file.
DIRECTORY (DIR) Shows list of files.
DIFFERENCES (DIF) Shows differences between files.
CREATE (CR) Creates a file.
DELETE (DEL) Deletes a file.
COPY (COP) Copy a file to another.
CONTINUE (C) Continues session.
The password file on VAX's are available when you type in the command:
SYS$SYSTEM:SYSUAF.DAT
The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.
L. Basic PRIME hacking
PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN ". It should then ask you for your username and password. The default usernames and passwords are listed below:
Username: Password:
PRIME PRIME
PRIME PRIMOS
PRIMOS PRIMOS
PRIMOS PRIME
PRIMOS_CS PRIME
PRIMOS_CS PRIMOS
PRIMENET PRIMENET
SYSTEM SYSTEM
SYSTEM PRIME
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -