dec-serv.txt 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. Global OutDials on DECservers - Italy - May 1996
  2. by Zhart/THC
  3. þ Finding a DECserver
  4. The DECserver is a terminal server, it connects its terminals to
  5. hosts available on an Ethernet Local Area Network.
  6. DecServers are usually reachable via telnet and sometimes via dialup.
  7. Via telnet you need to scan/search for them in the internet,
  8. Via dialups use a good Carrier Scanner like ToneLoc or THC-Scan.
  9. Telnet:
  10. About telnet connection decservers have normal ip addresses,
  11. but what we are interested in is the alpha address, 'cause almost always
  12. it starts with "DS"; just something like:
  13. DS7001.fuck.you.asshole
  14. and if the owners are very very lame it can even contain the
  15. string "MODEM" or "DIAL" (wow!) in its alpha address.
  16. So what I suggest is to combine a brute force scanning with an intelligent
  17. (smart) behaviour...
  18. You should first find a route ip address of a university or of a science
  19. research network or whatelse you (and, after some scanning, your experience)
  20. think could have such a beautiful device.
  21. It should be a network big enough to have several vaxes and other machines...
  22. Note that not always an alpha address starting with "DS"
  23. leads to a DECserver , i.e. sometimes ultrix machines have an address
  24. like that.
  25. [I personally made a script to scan subnets from XXX.XXX.0.0 to
  26. XXX.XXX.255.255 or from XXX.XXX.XXX.0 to XXX.XXX.XXX.255
  27. and to save only interesting alpha addresses,
  28. but i don't suggest to use it automatically, in other words
  29. take it always under control and use your brain!]
  30. þ Warning: usually scripts like this do a lot of noise;
  31. think about "lastcomm" "ps" and things like that ...
  32. þ Warning: to do subnet scanning you need an host with a very fast connection
  33. þ Warning: CERT SUX !!!!!! ;)
  34. NOTE:
  35. instead of a script it's wiser to do a zone transfer (for example with
  36. nslookup or dig) to get all the alpha names in a domain. But this needs
  37. a) an skilled unix user and b) the target DNS server must allow zone
  38. transfers. (There are other methods but this article isn't about unix
  39. hacking ;-) So I only present this better possiblity which not many can
  40. do reading this article.
  41. Dialup:
  42. Nothing much to say about scanning these ... just do a fast carrier scan
  43. of an area overnight and hope you get a dec-server. If you know that a
  44. company has got dialups and a big computer network, then try to scan
  45. those local numbers. There aren't much on toll free numbers and those
  46. are usually more protected.
  47. If you connect via dialup, you have no problem to recognize it:
  48. _______________________________________________________________________________
  49. DECserver 700-08 Communications Server V1.1 (BL44G-11A) - LAT V5.1
  50. DPS502-DS700
  51. (c) Copyright 1992, Digital Equipment Corporation - All Rights Reserved
  52. Please type HELP if you need assistance
  53. Enter username> THC
  54. Local>
  55. ------------------------------------------------[FROM alt.2600/#hack.FAQ]------
  56. But if you connect via telnet it will not appear anything on your screen:
  57. -------------------------[Start Capture]---------------------------------------
  58. telnet> open ds7001.fuck.you.asshole
  59. Trying 123.45.678.910 ...
  60. Connected to ds7001.fuck.you.asshole
  61. Escape character is '^]'.
  62. ---------------------------[End Capture]--------------------------------------
  63. All you have to do is just press enter (it's easy uh?), and it will
  64. appear a "#" prompt (at this time you are quite sure it's a DECserver),
  65. echo gets off and ...
  66. now comes the time to type the password to enter the DEC ...
  67. I won't tell you the default pwd (which in 99% of my times was the good one)
  68. 'cause .... 'cause shit ! Do I have to tell you everything??? (scan!)
  69. It's a very very lame password usually one of the firsts that you could think
  70. of. You have 3 tries, after that it disconnects you. I don't know if there are
  71. warnings or logs of wrong attempts made, but can tell that IF the password is
  72. not the default one, then the system administrators take care about security
  73. very very much, so be careful.
  74. Typing the right password appears the same screen of the first capture
  75. (look up!), you are asked a username but it isn't of any importance, just
  76. type something unsuspicious like just one letter.
  77. þ Once in ... let's find out if there's a modem !
  78. The "Local> " prompt is the DECserver prompt , I strongly suggest to give a
  79. "help" command 'cause the dec help is very kind and it will tell you
  80. more interesting things you can imagine... and you should learn from practice,
  81. not reading shitty articles like this one from zines <g> !
  82. Ok, to have an idea of where you are , there are two commands :
  83. "show users"
  84. "show services"
  85. The second one will tell you all the possible connections:
  86. ---------------------[Start Capture]-------------------------------------------
  87. Local> show services
  88. Service Name Status Identification
  89. AXPXXS Available DEC OSF/1 Version V3.2 LAT SERVICE
  90. AXPXX1 Available @sys$manager:XXXXXXXX_axp.txt
  91. AXPXX2 Unknown DEC OSF/1 Version V3.0 LAT SERVICE
  92. AXPXX3 Available ALPHA 3000/400 - XXXXXX IV - XXX
  93. AXPXX5 Available ALPHA 3000/400 - XXXXXX II - XXX
  94. AXPXX6 Available ALPHA 3000/300 - XXXXXX IV/XXXXX - XXX
  95. AXPXX7 Available ALPHA 3000/300 - C.S. - XXX
  96. AXPXX8 Available DEC 200 4/166 - XXXXXX III - XXX
  97. AXPXX9 Available DEC 200 4/166 - VETOR_1 - XXX
  98. AXPXXA Available DEC 200 4/166 - VETOR_2 - XXX
  99. AXPXXB Available DEC 400 4/233 - G. XXXXXX
  100. AXPXXC Unknown DEC 200 4/166 - AXX - XXX
  101. AXPXXD Available DEC 200 4/166 - AXX - XXX
  102. XXXXXXX Available ULTRIX 4.3 (RISC)
  103. XXXXXXXX Available MV3100-M76 XXXX-XXX XXXX2
  104. XXXXXX Available VS3100-M76 - C. XXXXXXX
  105. XXXXXX Available XXXXserver 310 XXXXXXXXXXXXXXXXX
  106. MVCB0 Unknown VS 2100 - XXXXX
  107. MVCBCT Available XXXX cluster - VAX/VMS V5.5
  108. MXXXX2 Available VS3100 - XXX Server Decnet-XXX
  109. MXXXX7 Available MV3100-M76 - XXXXXXXXXXXXXXXXX
  110. MVXXX8 Available Welcome to VAX/VMS V5.5-2
  111. MVXXX4 Available VS3100-M76 - Disk server-
  112. MX31CS Available Welcome to VAX/VMS V5.5-2
  113. SATCS3 Available MV3100-M76 - X.X.
  114. XXXXXE Unknown DEC OSF/1 Version V3.0 LAT SERVICE
  115. VAXXXX Available @SYS$MANAGER:XXXXXXX.TXT
  116. VS31C1 Unknown Welcome to VAX/VMS V5.5-2
  117. VS40C6 Available Welcome to VAX/VMS V5.5-2
  118. VSXX12 Unknown VS3100 - X. XXXXXX
  119. VSXX11 Available VS2000 - S. XXXXXXXXXXXX
  120. VXXX12 Available VS 2000/50 - XXXXXXS
  121. VX31CS Available Welcome to VAX/VMS V5.5-2
  122. ----------------------------------[End Capture]-------------------------------
  123. Reading the description or the service name it's easy to find out a modem.
  124. If you find it, let's say its name is "DS1MODEM" , you just have to use
  125. the "connect" command:
  126. -------------------------[Start Capture]---------------------------------------
  127. Local> connect DS1MODEM
  128. Local -010- Session 1 to DS1MODEM on node DS7001 established
  129. atz
  130. OK
  131. atdt004969823282
  132. CONNECT 14400/REL
  133. Press [ENTER] to access L.o.r.E. BBS
  134. -------------------------[End Capture]-----------------------------------------
  135. þ ... A little bit difficult
  136. If from the "show services" doesn't seem to be any modem (try also strange
  137. services and services without description) don't lose any hope 'cause often
  138. devices such as modems are used only by sys-administrators, they create the
  139. service when they need it and then "CLEAR" it.
  140. What you have to do is look all the PORTS of the DECserver for modems ...
  141. Here you use the "SHOW PORT" command:
  142. --------------------------[Start Capture]--------------------------------------
  143. Local> show port 8
  144. Port 8: Server: DSLE8
  145. Character Size: 8 Input Speed: 9600
  146. Flow Control: XON Output Speed: 9600
  147. Parity: None Signal Control: Disabled
  148. Stop Bits: Dynamic Signal Select: CTS-DSR-RTS-DTR
  149. Access: Local Local Switch: None
  150. Backwards Switch: None Name: PORT_8
  151. Break: Local Session Limit: 4
  152. Forwards Switch: None Type: Ansi
  153. Default Protocol: LAT
  154. Preferred Service: VAXXX
  155. Authorized Groups: 0
  156. (Current) Groups: 0
  157. Enabled Characteristics:
  158. Autobaud, Autoprompt, Broadcast, Input Flow Control, Lock,
  159. Loss Notification, Message Codes, Output Flow Control, Verification
  160. -------------------------------[End Capture]-----------------------------------
  161. All of these informations are interesting but the one which usually tells
  162. if a modem is connected to the port is:
  163. Enabled Characteristics:
  164. Dialup, etc..., etc..., etc,...
  165. So give a look at all ports, if there's nothing interesting throw that DEC
  166. in the trash ,otherwise you NEED PRIVELEGES to use the modem ...
  167. In 50% of cases the password to become privileged user is the default one,
  168. in 85% of cases it's a lame one ...
  169. Once again I won't tell you the privileged user default password (which is
  170. different from the first password) but once again I say it's an absolutely
  171. lame pwd!
  172. To become Privileged user do:
  173. Local> set priv
  174. Password>
  175. Once again have 3 tries ,but this time I'm sure that an invalid attempt
  176. is logged with a certain warning value!
  177. If after you've typed the pwd it answers with the "Local>" prompt it
  178. means you're a privileged user , and finally you can do :
  179. Local> set port 1 service FUCKYOU
  180. Local> connect FUCKYOU
  181. And enjoy your dialout ;)
  182. þ Epilogue
  183. There's a lot to learn about DECservers, about all the settings and options
  184. you can switch, so experiment ... they are useful to penetrate systems
  185. and can tell you very much about a network ... lot of DECs have also
  186. an active telnet command ...
  187. And you can often find valid telnet targets with the command "show domain".
  188. So these DECservers can also be useful to pass a Firewall (!) and to enter
  189. internal networks which would normally not available (not connected to
  190. the internet) ! But this once again goes to far into unix hacking ...
  191. But be careful do not abuse too much, use your brain ...
  192. Think that sooner or later a phone bill arrives to someone and ....
  193. Use modem outdials only in hours when you know offices and machines' rooms
  194. are closed ...
  195. Greets and Have Fun!
  196. ANARCHY ALL OVER THE WORLD !!!!!!!!
  197. To All Italian H/P scene doods: We need to be united !
  198. Leave me a message on
  199. LorE BBS +49-69-823282
  200. Login: THC Pwd: THC
  201. Zhart/THC
  202.