Essay On Hacking Essay, Research Paper
In the undermentioned file, all mentions made to the name Unix, may besides be
substituted to the Xenix operating system.
Brief history: Back in the early 1960ss, during the development of 3rd
coevals computing machines at MIT, a group of coders analyzing the potency of
computing machines, discovered their ability of executing two or more undertakings
at the same time. Bell Labs, taking notice of this find, provided financess for
their developmental scientists to look into into this new frontier. After
about 2 old ages of developmental research, they produced an operating system they
called & # 8220 ; Unix & # 8221 ; .
Sixtiess to Current: During this clip Bell Systems installed the Unix system
to supply their computing machine operators with the ability to multitask so that they
could go more productive, and efficient. One of the systems they put on the
Unix system was called & # 8220 ; Elmos & # 8221 ; . Through Elmos many undertakings ( i.e. charge, and
installing records ) could be done by many people utilizing the same mainframe.
Note: Cosmos is accessed through the Elmos system.
Current: Today, with the development of micro computing machines, such multitasking
can be achieved by a scaled down version of Unix ( but merely as powerful ) .
Microsoft, seeing this development, opted to develop their ain Unix like system
for the IBM line of PC/XT & # 8217 ; s. Their consequence they called Xenix ( pronounced
zee-nicks ) . Both Unix and Xenix can be easy installed on IBM PC & # 8217 ; s and offer
the same maps ( merely 2 different sellers ) .
Note: Due to the many different versions of Unix ( Berkley Unix, Bell System
III, and System V the most popular ) many bids following may/may non work. I
have written them in System V modus operandis. Unix/Xenix runing systems will be
considered indistinguishable systems below.
How to state if/if non you are on a Unix system: Unix systems are quite common
systems across the state. Their security appears as such:
Login ; ( or login ; )
watchword:
When choping on a Unix system it is best to utilize small letter because the Unix
system bids are all done in lower- instance.
Login ; is a 1-8 character field. It is normally the name ( i.e. joe or fred )
of the user, or initials ( i.e. j.jones or f.wilson ) . Hints for login names can
be found junking the location of the dial-up ( utilize your CN/A to happen where the
computing machine is ) .
Password: is a 1-8 character watchword assigned by the sysop or chosen by the
user.
Common default logins
& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;
login ; Password:
root root, system, etc..
sys sys, system
devil devil
uucp uucp
tty tty
trial trial
unix UNIX
bin bin
adm adm
who who
learn learn
uuhost uuhost
nuucp nuucp
If you guess a login name and you are non asked for a pas
blade, and have
accessed to the system, so you have what is known as a non-gifted history. If
you guess a right login and pass- word, so you have a user history. And,
if you guess the root watchword, so you have a & # 8220 ; super-user & # 8221 ; history. All Unix
systems have the following installed to their system: root, sys, bin, devil,
uucp, adm
Once you are in the system, you will acquire a prompt. Common prompts are:
$
%
#
But can be merely about anything the sysop or user wants it to be.
Thingss to make when you are in: Some of the bids that you may desire to seek
follow below:
who is on ( shows who is presently logged on the system. )
write name ( name is the individual you wish to chew the fat with )
To go out chat mode attempt ctrl-D.
EOT=End of Transfer.
cubic decimeter -a ( list all files in current directory. )
du -a ( checks sum of memory your files use ; disk use )
cdname ( name is the name of the sub-directory you choose )
cadmium ( brings your place directory to current usage )
cat name ( name is a file name either a plan or documentation your username
has written )
Most Unix plans are written in the C linguistic communication or Pascal since Unix is a
coders & # 8217 ; environment.
One of the first things done on the system is print up or gaining control ( in a
buffer ) the file incorporating all user names and histories. This can be done by
making the undermentioned bid:
cat /etc/passwd
If you are successful you will a list of all histories on the system. It
should look like this:
root: hvnsdcf:0:0: root dir: / :
joe: majdnfd:1:1: Joe Cool: /bin: /bin/joe
hal: :1:2: Hal Smith: /bin: /bin/hal
The & # 8220 ; root & # 8221 ; line tells the undermentioned info:
login name=root
hvnsdcf = encrypted watchword
0 = user group figure
0 = user figure
root dir = name of user
/ = root directory
In the Joe login, the last portion & # 8220 ; /bin/joe & # 8221 ; Tells us which directory is his
place directory ( joe ) is.
In the & # 8220 ; hal & # 8221 ; illustration the login name is followed by 2 colons, that means that
there is no watchword needed to acquire in utilizing his name.
Decision: I hope that this file will assist other novice Unix hackers obtain
entree to the Unix/Xenix systems that they may happen. There is still broad growing
in the hereafter of Unix, so I hope users will non mistreat any systems ( Unix or any
others ) that they may go on across on their journey across the electronic
main roads of America. There is much more to be learned about the Unix system
that I have non covered. They may be found by purchasing a book on the Unix System
( how I learned ) or in the hereafter I may compose a portion II to this & # 8230 ; & # 8230 ; ..
Bibliography
* Essay On *
* H A C K I N G *
* *
* U N I X *
* *
* By Jester Sluggo *
* Written 10/08/85