Search In Site

15 June, 2013

Guide to hack Unix For Beginners

In the following file, all references  made to the name unix, may also be  substituted to the xenix operating  system.

Brief history: Back in the early  sixties, during the development of  third generation computers at mit,  a group of programmers studying the  potential of computers, discovered  their ability of performing two or  more tasks simultaneously.  Bell  labs, taking notice of this discovery,  provided funds for their developmental  scientists to investigate into this  new frontier.  After about 2 years of  developmental research, they produced  an operating system they canlmd "unix".Sixties to current:  during this time  bell systems installed the unix system  to provide their computer operators  with the ability to multitask so that  they could become more productive,  and efficient.One of the systems they put on the unix system was called  "elmos". Through elmos many tasks (i.e. billing,and installation records) could  be done by many people using the same mainframe.Note: cosmos is accessed through the elmos system.Current:today, with the development  of micro computers, such multitasking  can be achieved by a scaled down  version of unix (but just as powerful).Microsoft,seeing this  development, opted to develop their own  unix like system for the ibm line of  pc/xt's.Their result they called  xenix (pronounced zee-nicks).Both  unix and xenix can be easily installed 
On ibm pc's and offer the same function 
(just 2 different vendors). 
 Note: due to the many different Versions of unix (berkley unix, Bell system iii, and system v The most popular) many commands Following may/may not work. I have Written them in system v routines. Unix/xenix operating systems will Be considered identical systems below.  How to tell if/if not you are on a Unix system:  unix systems are quite Common systems across the country. Their security appears as such: 
 Login;     (or login;) 
Password: 
 When hacking on a unix system it is Best to use lowercase because the unix System commands are all done in lower-Case. 
Login; is a 1-8 character field. It is Usually the name (i.e. joe or fred) Of the user, or initials (i.e. j.jones Or f.wilson).  Hints for login names Can be found trashing the location of the dial-up (use your cn/a to find Where the computer is). Password: is a 1-8 character password Assigned by the sysop or chosen by the 
User. 
Common default logins 
login;       password: 
root         root,system,etc.. 
sys          sys,system 
daemon       daemon 
uucp         uucp 
tty          tty 
test         test 
unix         unix 
bin          bin 
adm          adm 
who          who 
learn        learn 
uuhost       uuhost 
nuucp        nuucp 
If you guess a lgin name and you are Not asked for a password, and have Accessed to the system, then you have What is known as a non-gifted account. If you guess a correct login and pass-Word, then you have a user account. And, if you guess the root password, Then you have a "super-user" account. All unix systems have the following Installed to their system: Root, sys, bin, daemon, uucp, adm Once you are in the system, you will Get a prompt. Common prompts are: 
 


But can be just about anything the Sysop or user wants it to be. 
 Things to do when you are in: some Of the commands that you may want to Try follow below: 
 Who is on  (shows who is currently logged on the system.) Write name (name is the person you             wish to chat with) to exit chat mode try ctrl-d. eot=end of transfer. Ls -a(list all files in current             directory.) 
Du -a (checks amount of memory your files use;disk usage) 
Cd\name    (name is the name of the sub-directory you choose) 
Cd\        (brings your home directory to current use) 
Cat name   (name is a filename either a program or documentation your username has written) 
most unix programs are writte in the c language or pascal since unix is a programmers' environment.one of the first things done on the System is print up or capture (in a Buffer) the file containing all user Names and accounts. This can be done By doing the following command: 
 Cat /etc/passwd 
 If you are successful you will a list Of all accounts on the system.It Should look like this: 
 Root:hvnsdcf:0:0:root dir:/: 
Joe:majdnfd:1:1:joe cool:/bin:/bin/joe 
Hal::1:2:hal smith:/bin:/bin/hal 
 The "root" line tells the following Info : 
Login name=root 
Hvnsdcf   = encrypted password 
0         = user group number 
0         = user number 
Root dir  = name of user 
/         = root directory 
 In the joe login, the last part "/bin/joe " tells us which directory Is his home directory (joe) is. 
 In the "hal" example the login name is Followed by 2 colons, that means that There is no password needed to get in Using his name.                                                                                               

0 comments:

Post a Comment

Dear Visitors All The Tricks And Hacks Posted Here Are Only For Knowledge Purpose.Don't Use These for Illegal Operations.

 
Twitter Bird Gadget