About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Hacking the vax - commands & default pws


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% What's Hacking? %%
%% A series by David Lightman %%
%% %%
%%%%%%%%%%%%%%%%%%%%%%-SPECIAL ISSUE-%%%%%%%%%%%%%%%%%%%%%%%
%% %%
%% VAX COMPUTER SYSTEMS %%
%% %%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Ths is a requested discussion from Jolly Bardsman's Pub &
Tavern at (214) 690-4634. If you have any requests, send me mail
at any address listed below:

USENE: [email protected]
... or ...
{texsun..texbell..}!attctc!bdunn

TELEMAIL csupport/a755.cc3556/tech.services/credit.data/isg/trw

BBS's:
Elm Street Jolly Bardsman's Pub & Tavern
Channel Z Spyder's Web
Dead Zone Abyssal Plane
Oblivion (if AO gets the damn thing off the ground)
By 03/06/90, you may connect to a beta Twilight Zone at 214-
60-1413. You may also reach me voice at 214-660-6054. Limit
th calls to an EXTREME minimum!
If I get multiple requests about a topic (as I did with VAX),
I ill put something online the WHAT'S HACKING? subboards and the
beta system Twilight Zone ]I[.

----------------------------------------------------------------

VAX: The AX acronym is derived from Virtual Address eXtension.
The VAX computer is designed to use memory addresses beyond
the hardware's actual limits, enabling it to handle pro-
grams that are too large to fit into physical memory. The
VAX computer system is a member of the Digital Equipment
Corporation (DEC) computer family. Currently the VAX
series includes models spanning the desktop VAX station to
mainframe class multi-CPU VAX processors. These vary from
the superminis, like MicroVAX, to the older, moderate sized
11/7XX series, to the newer 6000 series. These computer
systems commonly use an operating system known as VMS.

VMS: The MS acronym is for Virtual Memory System. The operands
of VMS are very similar to other operating systems. Back
in the days of stand-alone computer systems, DEC had the
idea for streamlining the operation of their computers for
business and engineering. It conceived VMS as a way of
allowing the basic computer management to be done by a user
familiar with any of the multiple systems it made.
DCL: The DCL acronym is for Digital Command Language. It is the
fundamental language of the VMS. Those of you who have an
IBM system, you can think of a DCL program like a batch
file. You can do a lot with it (much more than a PC-DOS or
MS-DOS batch) but it work basically the same way. One
difference is that when you want to execute anything as if
you were typing it in at the command prompt, you first must
put a "$" in front of the command in the DCL program. DCL
programs are commonly called COM files as well. When you
are not executing a COM or DCL program file, you are almost
always typing things into the DCL processor.

WHAT DS A VALOOK E: (quickly)
========================

Wen you log into a VAX, you will see something similar to the
following:

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
WELCOME

TO THE

AT&T MICROVAX II SYSTEM

Usernam: (username here)
Password: (password here... does not echo)

$ (<--his is your prompt)
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

You ll know if you have a VAX type system if you get the
"Username:" and "Password:" prompts. Anything is just extra that
helps you guess passwords.

GETTINGN A VAX BY ERROR:
=========================

I wil only tell you one thing here. VMS 4.X and especially
VMS4.4 are goldmines. I am not going to go into this at all,
because it is a lengthy explanation that doesn't fit in the scope
of this message. You can find this discussion on ARPANET and
UENET. You can also get this information on CompuServe
Information Service, BYTE Information Exchange, and Digital
Eectronics Corporation's VAX BBS. There is also a big problem
with VMS 5.1, but that doesn't involve getting in. If there are
enough requests, I will cover this information in another mes-
age.

GTTING IN VAX BY DEFAULT:
===========================

Thereare several default accounts that were put in by DEC
when testing and installing the VAX. These accounts have pass-
words which don't change from system to system. The SYSOP should
have removed these accounts or changed the passwords, but it is
not done a lot of times. Below, I have listed several defaults:

USERNAME PASSWORD
-------- --------
DECNET DECNET
* SYSTEST UETP
SYSTEST
SYSTEM SYSTEM
DEFAULT DEFAULT
* FIELD FIELD
OPERATIONS OPERATIONS
* SUPPORT SUPPORT
DEC
SYSTEST_CLIG CLIG
SYSTEST
TEST

Where I have listed several passwords, I have found the re-
spective usernames passworded that way as much as the default
pasword. The accounts with asterisks beside them are powerful
acounts by default.

VAX VS COMMANDS:
=============
Once you get your "$" prompt, you will be able to type in
hundreds of commands of course. I will go over a few basic ones
here:

@ - Execute procedure. When you want to run any
DCL batch or *.COM;* file, you must include
this "@" before the filename.
EX: @LOGIN.COM;3

ACCOUNTI - This will run the accounting program. If you
log out of a system and you see charges put
on your account for the amount of time you
are on, the system is using account. Actual-
ly every system uses accounting somewhat, but
it can be made virtually invisible. If you
are desperate, or you are having troubles
with the system operators of the VAX (SYSOPS
from now on), you can use this program to
your advantage.

CRETE - This will create just about anything. If you
have a program that you have written on your
PC's Pascal interpreter, you can Ascii upload
the file to the VAX using the CREATE command.
EX: CREATE program.pas;1

CREATE/DIR - This will simply create a SUB directory for
you. I will explain how to get around a VAX
in a minute. See the SET command.
EX: CREATE/DIR NameOfDir
DELETE - Just used to delete a file or EMPTY, UNPRO-
TECTED DIRECTORY. To delete a file, just
type "DEL filename.ext;x." To delete a sub
directory, first delete all of the files in
the directory: "DEL/LOG *.*;*" Next, you
will need to SET PROTECTION: "SET
PROTECTION=OWNER:D dirname.DIR" Next, delete
the directory: "DEL dirname.DIR"
EX: DEL DAVID.TXT;4

DIRECTORY - This will show you what files are contained
in the current directory. Adding "/BRIEF"
will give you a short listing and adding
"/FULL" will give you a full listing includ-
ing security information on each file. You
can shorten the command to DIR and you may
use wildcards. The "*" means anything of any
length. The "%" means anything one character
length.
EX: DIR/FULL DAVID-%%.*;%
EDIT - This command will bring up the editor. Some
VAX systems use a type of editor similar to
MS-DOS/PC-DOS's EDLIN. HOWEVER, some VAX
systems use EDT/EVE editing which is a full
screen editor (usually). With this editor,
you can do a lot quickly, but only if your
terminal will support cursor control. VT-100
is very clumsy. Try getting VT-220 when you
use the EDT/EVE editor.

HELP - This command will bring up the HELP program.
This is just a clumsy imitation of what you
are reading. (heh heh)

LIBRAR - Used for archive purposes. You will proba-
bly not use this command much if you are new.
I am mentioning it now because I will type up
a more in depth discussion of VAX later on
the "What's Hacking?" sub boards.

LOGOUT - Logs you out.

MAIL - Loads the mail program. Used to send mail to
others users and CAN (YES, IT CAN) be used to
send mail (or other) to (OR FROM) the network
if the VAX is connected to a network. It CAN
(YES, CAN) also send data to (OR FROM) the
computers on the DECNET (if used).

$PASSWORD - Changes your password.
EX: $PASSWORD mynewpass

PHON - Used to talk to another user. This command
is pretty nice compared to other means. Your
"$" prompt will be replaced with a "%" prompt
once phone is executed. If you want to talk
to someone, type his username. If you want
to talk to someone on a different node, type
his nodename, two colons, and then his user-
name. A lot of times you will find this one
disabled (especially on University
computers), but there are alternate ways to
communication online other than MAIL and
PHONE. See below.
EX: PHONE
% node13::dlight
HOTO - Records session.
RUN - Executes executables. (simple?)
ET - Wow... this is a lot. See below.
HOW - This involves a lot too, but not as much as
SET. With SHOW, you can look at a lot. I am
just going to list a lot of things you can
view and what it will show you.
EX: SHOW USERS DAV

CLUSTER - VAX cluster if any
DEFAULT - Directory path and device
DEVICES - The system devices (drives,
etc.)
INTRUSION - If any accounts are being
hacked
MEMORY - Memory of course
NETWORK - Network and the VAX's location
within
PROCESS - PROCESS ProcessName shows
status
PROTECTION - Protection on files
QUOTA - Shows disk space allowed for
your account
SYSTEM - Miscellaneous system info
DAY - Day & date
TIME - Time
USERS - Users online all systems



TYPE Shows tontents of a file by sending it to
the terminal.
EX: TYPE DAVID.TXT;3
THE SET COMMAND:
===============

The ET command is one of the most widely used and versatile
commands on the VMS 5 series DCL.
SET FILE/PROTECTION:
===================

I supose the most frequent use of SET involved the PROTECTION
otion. These protections, known as SOGW or UIC protections, can
be put on any file or directory that you have WRITE & EXECUTE
privileges on. Setting the protection involves allowing differ-
ent users on the VAX to read, write, execute, or delete your file
or directory. The FILE /PROTECTION option of SET is used to
acomplish this. An example is:

SET FILE/PROTECTION=OWNER:E david.exe;4

If you typed this command in the DCL for a program called
AVID.EXE;4 (4 is the version number), then the owner (or crea-
tor) of the file can do nothing to the file but execute it.
owever, in another example:
SET FILE/PROTECTION=OWNER:RWED david.exe;4

you ar going to be able to "R"ead, "W"rite, "E"xecute, and
"D"elete the program. The same applies to a directory. Just
substitute the directory name for the filename above. When
creating a directory, the SET is set so that you may not delete
i. As discussed previously, you will have to issue a "SET
PROTECTION OWNER:D dirname.dir;1" and "DEL dirname.dir;1" to
elete the directory.

Other thathe owner, UIC file protection can be placed on any
of the following:

WORLD - y user on the system.
GROUP - Any user in your group.
OWNER - Only your account or matching UIC.
SSTEM - Anyone that has SYSPRV privileges or the octal UIC
groups.

SET TERMNAL:
===========
This is VERY important to all of us who call into the VAX
system. If you have a VT100 (not just ANSI), you can use:
SET TERMINAL/DEVICE_TYPE=VT100

Aditional terminal settings are possible, for example:
SET TERMINAL/WIDTH=80 - Sets width to 80 columns
SE TERMINAL/ADVANCED_VIDEO = Sets 124 X 24 lines
SE TERMINAL/ANSI_CRT = ANSI escape sequences
SE TERMINAL/AUTOBAUD = Possibly gets higher baud rate
SE TERMINAL/BROADCAST = Enable messages from SEND, MAIL & PHONE
ST TERMINAL/DEVICE_TYPE=VT220 - Sets terminal type to VT220
SET TERMINAL/ECHO = Enables echoing from DCL command line
SE TERMINAL/FULLDUP = Enables full duplex
SET TERMINAL/HANGUP = Causes account to log off if no carrier
SET TERMINAL/INQUIRE - Shows device_type of terminal
SET TERMINAL/PAGE=43 - Sets display length to 43 lines
SET TERMINAL/TYPE_AHEAD = Sets type ahead function on
SET TERMINAL/UNKNOWN - Used for ASCII device types
SET TERMINAL/WRAP = Used to set wrap around feature

All of the above denoted with a "=" rather than a "-" can be
changed to the opposite setting by placing a "NO" directly in
font of the qualifiers. EX: SET TERMINAL/NOECHO

SET DFAULT (r... MOVING AROUND A VAX):
=======================================
To move around the VAX DCL, in and out of directories, I need
t tell you about the SET DEFAULT command. It is just like the
CD command on UNIX and MS-DOS/PC-DOS, except it follows a format.
The format is "SET DEFAULT [.subdir]" to go down to a sub direc-
tory and "SET DEFAULT [-]" to go to the parent directory. I will
explain more involved uses like changing disks, if asked, to keep
yu out of trouble for now. First, I will show by example and
then explain my example to those out there who lack a brain.

$ DIR (step 1)
PROGRAM.EXE;2 PROGRAM.EXE;1
$ CREATE/DIR example (step 2)
$ DIR (step 3)
EAMPLE.DIR;1 PROGRAM.EXE;2 PROGRAM.EXE;1
$ SET DEFAULT [.example] (step 4)
$ DIR (step 5)
nofiles, animals, vegetables, nor minerals error
$ SET DEF [-] (step 6)
COPY PROGRAM.EXE;2 [.example] (step 7)
$ SET DEF [.example] (step 8)
DIR (step 9)
POGRAM.EXE;2
$
Hre's what I did...
STEP 1: I asked to see the contents of the current directory.
I found that I have the program PROGRAM.EXE is the
1st and 2st versions in the directory.
STEP 2: I created a directory called "EXAMPLE." This name
can be anything of course.
STEP 3: I again asked for the contents of the directory. It
now shows me that I have a "file" called
"EXAMPLE.DIR;1." That is just the directory. Any-
thing with an extension of "DIR" will be a directory.
For more on extensions, see below.
STEP 4: I changed directories by use of the SET DEFAULT
command. You must always follow this format to
change into a SUB directory.
STEP 5: I AGAIN (!) looked into the directory. This time, my
directory was EXAMPLE so I of course saw nothing.
You will get an error I believe when you try to DIR
an empty directory.
STEP 6: This command is used to rise up to the parent direc-
tory. The parent directory contains the filename
"EXAMPLE.DIR;1," remember? The DEFAULT option can be
shortened to DEF.

STEP 7: Here I am illustrating how to move programs around a
little. I just copied the program PROGRAM.EXE;2 into
the subdirectory EXAMPLE.
STEP 8: See step 3. (a lazy, tired Dave)
STEP 9: I >ONCE MORE< issued the DIR command to reveal the
contents of the directory. I now find the program
PROGRAM.EXE;2 in my directory listing of my sub
directory EXAMPLE.
If you don't understand the basics of moving around a VAX by
now, push "OFF".

LENAME EXNSIONS:
==================
Occasionally you will run across a BIG directory. This will
hpefully not happen until you read more on VAX on my WHAT'S
HACKING sub boards, but if it does, this list will hopefully help
ou avoid making too big a mistake or wasting a lot of time.

ADA Ada compiler source code file
AS BASIC compiler source code file
B2 BLISS-32 compiler source code file
C C compiler source code file
CB COBAL compiler source code file
OR FORTRAN compiler source code file
MR MACRO compiler source code file
PAS Pascal compiler source code file
LI PL/I compiler source code file
CLD DCL command description file
CO DCL batch or command procedure file
DT Data file
DS Distribution file (as in mail)
IR Directory file (as in a subdirectory)
DT Command file for the EDT editing program
XE Executable program
HLP Text for help libraries
OU EDT editor journal when problems occur
LS System listing file (as in TYPE, PRINT, & PHOTO)
LOG Batch job output file
MAI Mail message file
ME DSR output file
OBJ Object code created by compiler before LINKing
NO Source file for DSR
SXEL Files for Sixel graphics
SYS System image file
TJL Journal created when the unusual occurs (DECNET a lot)
TP Temporary file (sometimes valuable)
TPU Editor command file
TX Text library input file (also MAIL output file)
UAF USER AUTHORIZATION FILE

I will comment extensively on UAF files if I decide to type up
aother VAX tutorial.


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS