| Title: | -={ H A C K E R S }=- |
| Notice: | Write locked - see NOTED::HACKERS |
| Moderator: | DIEHRD::MORRIS |
| Created: | Thu Feb 20 1986 |
| Last Modified: | Mon Aug 03 1992 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 680 |
| Total number of notes: | 5456 |
Unix is a nice system for hacking, as it has a few interesting security features. One such is the fact that all the devices on the system appear on the filing system in a special directory, usually called /dev. A disk might be referred to as /dev/dra0. Now the interesting bit... As the devices are on the filing system, they have protections and owners. On the system I used to use, the disks were owned by 'bin', but were world readable (in order to allow things like ps -x to work for non-priviliged users). Therefore, you could write a program that read the whole disk at the i-node and block level, and could thereby subvert the entire protection system. The program we had would list directories that were protected against us, and copy files that were protected against us. The only reason the program was originally developed was to copy rogue out of the games area ! However, it did also prove very useful for monitoring the progress of another hacker who had managed to find a way of creating himself a super-user shell from an ordinary account without knowing any passwords (never did find out how he did it though). trev
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 73.1 | the ultimate rogue .... | VOGON::CABLE | Wed Jul 02 1986 05:38 | 23 | |
Hi Trev,
I agree Unix is just great for "hacking" ....... I would really
like to know how that guy got su priv's on his shell without
being su to start with !!!!! Since I see you are interested
in rogue I wonder if you have seen/played the "new" advanced
rogue (5.3) that appears in the AT&T programmers toolchest.
Well if you have'nt you should ... it blows hack and all the
other rogue's I have played right out of the water!!! there
are 4 character classes that you can play ... fighter, thief,
magician, and cleric .... the latter 2 can cast spells/prayers
to do all sorts of interesting things ... and there are some
really interesting (some unique) monsters that can really waste
you 100 hit points at a time, its really great !!! I recommend
that you try and get a copy .... I dont see it mentioned in
the conference though, shame!
Regards
Larry Cable (IPG/Ultrix Reading)
| |||||
| 73.2 | HACKING 101 - Break a UNIX system | JON::MORONEY | Madman | Wed Jul 02 1986 11:39 | 18 |
Naaah, hacking Unix is too easy... The system is set up in such a way that it is too easy for a system manager to leave security holes all over the place. (.0 is one example) I also got a root shell by accident once when I was in college, it seems the system manager was hacking the shell to give it "setuid" privileges so it could execute a shellscript with the "setuid" bit on with the setuid privilege of the script, (kind of like being able to install a .COM file on VMS with special privileges) but he forgot to turn off privileges so, for a while, everyone was root! I spent most of that time playing ROGUE since I didn't notice anything was funny, until a "ls" showed root owning my save game! I made my own copy of the shell, gave it privileges and hid it away. That didn't last long, since they went looking for privileged programs shortly after. As to rogue, MORIA blows all rogues I've seen out of the water, and it runs on VMS, too. Look in the MORIA conference on JON for more info. (JON::MORIA) KP7, SELECT, etc. as usual. -Mike | |||||
| 73.3 | Hacking Moria | MDVAX3::COAR | And your little dog, 2! | Sat Oct 17 1987 12:38 | 6 |
One of the more entertaining hacks I made involved winkling the
Wizard's Password out of Moria. Considering that it is built at
run-time using a really obscure (at least at instruction-level)
algorithm, it was a piece of work I was reasonably proud of.
#ken :-)}
| |||||