total descendants::1 total children::1 15 ❤️ |
dnes som sa zrovna stretol s ivanom kopáčikom, aka váňa, aka stalker a napadlo ma, že on má taký prím, že mu vyšiel kus textu vo Phracku ešte dávno pred tým ako bol Prielom, tak som ho poprosil, nech mi ho pošle, lebo som ho nevedel nájsť a je to taká milá vyše tridsaťročná folkórna perla vo Phracku č. 41 z r. 1992. tento text pôsobí tiež samozrejme naivne, lebo veď doba a vek, ale neskôr bol váňa jeden z priekopníkov počítačovej bezpečnosti, prvý nositeľ certifikátu CISA u nás, dodnes pomáha s bezpečnosťou v štátnej správe. toto je možno preto aj krajší a určite starší príbeh ako hysterka, že mladého človeka priláka kyberpunková kultúra k hackingu a po nejakých malých vilomeninách na univerzite sa ihneď začne o bezpečnosť zaujímať profesionálne a eticky a je z neho uznávaný odborník, aj učil na univerzite, atď., toto je príbeh s totálnym happyendom no a takto to začalo: From: Stalker Date: October 14, 1992 Subject: Hacking In Czecho-Slovakia Hi there! I'm student from Czecho-Slovakia (for some stupid person who doesn't know, it's in middle Europe). Call me Stalker (if there is other guy with this name, call me what you want). If you think that computers, networks, hacking and other interesting things are not in Eastern Europe, you're WRONG. I won't talk about politicians. They really make me (and other men from computers) sick! I'll tell you what is interesting here right now. Our university campus is based on two main systems, VMS and ULTRIX. There's VAX 6000, VAX 4000, MicroVAX, VAXStation and some oldtimer machines which run under VMS. As for hacking, there's nothing interesting. You can't do some tricks with /etc/passwd, there's no main bug in utilities and commands. But, as I know, VMS doesn't crypt the packets across the network so you can take some PC and Netwatch (or any other useful software ) and try to see what is interesting on the cable. You can grab anything that you want (usernames, passwords, etc.). Generally, students hate VMS and love UNIX-like systems. Other machines are based on ULTRIX. We have DECstations (some 3100, some 5000) and one SM 52-12 which is something on VAX-11 :-(. It is a really slow machine, but it has Internet access! There's many users so you can relatively easily run Crack (excellent program) since passwd is not shadowed. Another useful thing is tftp (see some other Crack issues). There was a machine with enabled tftp, but after one incident, it was disabled. I would like to tell you more about this incident but sysadmins are still suspecting (they probably read my mail). Maybe after some months in other articles. Now I can tell you that I'm not a real UNIX-GURU-HACKER, but the sysadmins thought that I was. Someone (man or girl, who knows) has hacked one (or two) machines on our campus. Administrators thought that I was this mysterious hacker but I am not! He/she is much better than I and my friends. Today no one knows who the hacker is. The administrator had talked to him/her and after some weeks, gave him/her an account. He/she probably had root privileges for some time and maybe has these today. He/she uses a modem to connect. His/her login name is nemo (Jules Verne is a popular hero). I will try to send mail to him/her about Phrack and maybe he/she will write interesting articles about himself. And some tips. Phrack is very interesting, but there's other interesting official files on cert.org (192.88.209.9) available via anonymous FTP. This is the Computer Emergency Response Team (CERT) FTP server. You can find interesting information here about bugs in actual software, but you will see only which command or utility has the bug, not how to exploit it. If you are smart enough, there's nothing to say. If you are not, you must read Phrack! :-) Bye, Stalker |
| |||||||||||||||||||||||