Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- **************************************
- * A beginners guide to: *
- * H A C K I N G *
- * *
- * U N I X *
- * *
- * By Jester Sluggo *
- * Written 10/08/85 *
- **************************************
- In the following file, all references made to the name Unix, may also be
- substituted to the Xenix operating system.
- Brief history: Back in the early sixties, during the development of third
- generation computers at MIT, a group of programmers studying the potential of
- computers, discovered their ability of performing two or more tasks
- simultaneously. Bell Labs, taking notice of this discovery, provided funds for
- their developmental scientists to investigate into this new frontier. After
- about 2 years of developmental research, they produced an operating system they
- called "Unix".
- Sixties to Current: During this time Bell Systems installed the Unix system
- to provide their computer operators with the ability to multitask so that they
- could become more productive, and efficient. One of the systems they put on the
- Unix system was called "Elmos". Through Elmos many tasks (i.e. billing,and
- installation records) could be done by many people using the same mainframe.
- Note: Cosmos is accessed through the Elmos system.
- Current: Today, with the development of micro computers, such multitasking
- can be achieved by a scaled down version of Unix (but just as powerful).
- Microsoft,seeing this development, opted to develop their own Unix like system
- for the IBM line of PC/XT's. Their result they called Xenix (pronounced
- zee-nicks). Both Unix and Xenix can be easily installed on IBM PC's and offer
- the same functions (just 2 different vendors).
- Note: Due to the many different versions of Unix (Berkley Unix, Bell System
- III, and System V the most popular) many commands following may/may not work. I
- have written them in System V routines. Unix/Xenix operating systems will be
- considered identical systems below.
- How to tell if/if not you are on a Unix system: Unix systems are quite common
- systems across the country. Their security appears as such:
- Login; (or login;)
- password:
- When hacking on a Unix system it is best to use lowercase because the Unix
- system commands are all done in lower- case.
- Login; is a 1-8 character field. It is usually the name (i.e. joe or fred)
- of the user, or initials (i.e. j.jones or f.wilson). Hints for login names can
- be found trashing the location of the dial-up (use your CN/A to find where the
- computer is).
- Password: is a 1-8 character password assigned by the sysop or chosen by the
- user.
- Common default logins
- --------------------------
- login; Password:
- root root,system,etc..
- sys sys,system
- daemon daemon
- uucp uucp
- tty tty
- test test
- unix unix
- bin bin
- adm adm
- who who
- learn learn
- uuhost uuhost
- nuucp nuucp
- If you guess a login name and you are not asked for a password, and have
- accessed to the system, then you have what is known as a non-gifted account. If
- you guess a correct login and pass- word, then you have a user account. And,
- if you guess the root password, then you have a "super-user" account. All Unix
- systems have the following installed to their system: root, sys, bin, daemon,
- uucp, adm
- Once you are in the system, you will get a prompt. Common prompts are:
- $
- %
- #
- But can be just about anything the sysop or user wants it to be.
- Things to do when you are in: Some of the commands that you may want to try
- follow below:
- who is on (shows who is currently logged on the system.)
- write name (name is the person you wish to chat with)
- To exit chat mode try ctrl-D.
- EOT=End of Transfer.
- ls -a (list all files in current directory.)
- du -a (checks amount of memory your files use;disk usage)
- cd\name (name is the name of the sub-directory you choose)
- cd\ (brings your home directory to current use)
- cat name (name is a filename either a program or documentation your username
- has written)
- Most Unix programs are written in the C language or Pascal since Unix is a
- programmers' environment.
- One of the first things done on the system is print up or capture (in a
- buffer) the file containing all user names and accounts. This can be done by
- doing the following command:
- cat /etc/passwd
- If you are successful you will a list of all accounts on the system. It
- should look like this:
- root:hvnsdcf:0:0:root dir:/:
- joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe
- hal::1:2:Hal Smith:/bin:/bin/hal
- The "root" line tells the following info :
- login name=root
- hvnsdcf = encrypted password
- 0 = user group number
- 0 = user number
- root dir = name of user
- / = root directory
- In the Joe login, the last part "/bin/joe " tells us which directory is his
- home directory (joe) is.
- In the "hal" example the login name is followed by 2 colons, that means that
- there is no password needed to get in using his name.
- Conclusion: I hope that this file will help other novice Unix hackers obtain
- access to the Unix/Xenix systems that they may find. There is still wide growth
- in the future of Unix, so I hope users will not abuse any systems (Unix or any
- others) that they may happen across on their journey across the electronic
- highways of America. There is much more to be learned about the Unix system
- that I have not covered. They may be found by buying a book on the Unix System
- (how I learned) or in the future I may write a part II to this........
Add Comment
Please, Sign In to add comment