| Title: | -={ H A C K E R S }=- |
| Notice: | Write locked - see NOTED::HACKERS |
| Moderator: | DIEHRD::MORRIS |
| Created: | Thu Feb 20 1986 |
| Last Modified: | Mon Aug 03 1992 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 680 |
| Total number of notes: | 5456 |
I have an account on a remote TOPS-20 system somewhere in Texas(?)
which bills time used to my credit card. Just from my first quick use
of the system, it doesn't look too secure (would you believe a password
of 'welcome'?), and my account ID (no other password to distinguish me
from any other user) looks to me to be an acronym of my bank and credit
card number. As soon as I log into the system at the @ prompt, I am
asked for my "Account ID:", and then the menus start coming up. This
has me wondering about these people...
Supposedly I am trapped in a command procedure or program (I'd rant
about the quality of the program, but it's probably not important) with
no way to escape. However, I am a bit concerned about security. If
there were a way to escape to 'command level' (or whatever the
equivalent is on TOPS-20), I imagine I could find a list of all other
(active?) account IDs. That would be bad...
Anyway, I'd like to know what commonly known ways there are to break
out of programs/command_procedures on a TOPS-20 machine. If any of them
work, I'll yank my account, if not, I may keep it. Kind of like the
various things that people try on "impenetrable in-use procedures".
Any ideas? I'm not trying to hack the machine, just checking the
security of it. The connect prompt says TOPS-20 Monitor 5.1(15117).
Many thanks in advance,
Willie
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 335.1 | GALLO::RASPUZZI | Michael Raspuzzi | Fri Oct 17 1986 11:24 | 32 | |
Just because the machine runs TOPS-20, I too would worry about
security. Then again, since I work with the code for the monitor
all the time, I know what is weak.
Generally speaking, if the machine is running a "funny" EXEC (TOPS-20
equivalent of DCL) then you really can't do anything outside of
this funny EXEC. The EXEC can be hacked to turn off commands and
to restrict access to certain things. Also, most sites that are
security conscience are running some type of ACJ to limit what you
can and can't do.
If you don't have access to privs, then you won't be able to do
anything outside of the command environment you are put in. My concern
would be how secure are the privved accounts? I know OPERATOR is
one of them. If I knew who the system programmers were I probably
could try to bust into their accounts. Once your in with privs,
there is nothing you can't do. One of the fundamental assumptions
of the monitor is you can't defend against a WHEEL (TOPS-20 style
SETPRV) or someone with OPERATOR privs. Once a WHEEL is in, he could
shut off the ACJ and start his fun.
I see they are running the latest and greatest 5.1 monitor, however,
TOPS-20's current release is 6.1 and I think customers are getting
autopatch tape 14 soon (edit 16230).
Mike
TOPS-20 developer
By the way, if this program/command procedure or whatever you are
put in when you login ever breaks or halts due to a bug, you could
be put in an intersting situation. Maybe not have privs, but I bet
you could findout more than you could before.
| |||||
| 335.2 | I almost forgot | GALLO::RASPUZZI | Michael Raspuzzi | Fri Oct 17 1986 11:26 | 4 |
There is a notes conference on TOPS-20 for anyone interested. It
is LATOUR::TOPS. Press KP 7 to add it to your notebook.
Mike
| |||||
| 335.3 | No such thing as "CAPTIVE" on TOPS-20 | LA780::LONGO | Bob Longo | Sun Oct 19 1986 12:14 | 6 |
Unless they have EXEC sources and a good system-programmer, there
is no way to prevent a user from breaking out of a "captive" command
procedure on TOPS-20. All you need to do is pound on ^C several
times IMMEDIATELY after you type the return after your password.
-Bob "had_a_4_bit_lobotomy_and_almost_forgot_TOPS-20" Longo
| |||||
| 335.4 | CRATE::COBB | Danny Cobb, DSS Eng, LKG | Mon Oct 20 1986 12:24 | 6 | |
...and you can also try to get into DDT once you've gotten to the
EXEC, and probably patch the most recently run program (the "menu"?)
to do lots of interesting things (provided you're able to SAVE it
back from whence it came...)
Danny
| |||||
| 335.5 | a new login.com anyone? | NRLABS::VENKI | William P.N. (Wookie::) Smith | Tue Oct 21 1986 12:24 | 13 |
Yup, control-C after the password worked just fine, I spent about
5 minutes getting directories and poking around, listed out the
billing file, and logged out. I was very good, I didn't touch
_anything_ at all, and tho I didn't get billed for the time, (at
$0.99 per minute), I don't feel I ripped them off. Called the guy
up this morning and told him to close down my account and remove
all traces of my credit card number from the system. He asked why
and sounded really surprised when I told him he had no security
at all. AAAARRRRGGGGHHHH!!!! Oh, well, it's been instructive
anyway. Many thanks for everyone's assistance.
Willie
| |||||