[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

122.0. "TOP SECRET HACK [ help ]" by MILVAX::ROSE () Fri May 24 1985 11:00

Hi:

	I'm Harry, and I'm trying to get even with the person who ran a "seek 
and destroy" program on my account. It killed my MAIL.MAI and my DND.SAV 
files. SO, I would like to encode or encrypt his UFD, but I don't know how to
do it.

		#3 HELP
		#4 HELP
#5


Thank you 
Harry
T.RTitleUserPersonal
Name
DateLines
122.1XENON::MUNYANFri May 24 1985 13:1212
You really don't want to screw around with his directory file.  Messing up
directories causes directory pointers to get messed up and consequently requires
that the system manager fix the problem.  I'll gaurentee you that the system
manager wouldn't be pleased (especially if the pack is an RP07 or an RA series
disk.)

Steve

I suggest something more subtle.  By the way... Why did you have W or D set for
any protection classes other than owner?  You were asking for it and deserve 
what you got.

122.2R2ME2::GILBERTFri May 24 1985 22:179
Re: 122.1

	WRONG  WRONG  WRONG

Just because someone has something that is vulnerable, it doesn't
mean that person deserves to have it destroyed.

P.S.  Thanks for the Van Houton chocolate, Steve.  And the kids
      love the stuffed dragon souvenir from Walt Disney World.
122.3LATOUR::AMARTINFri May 24 1985 22:2034
Here's a little programming exercise that you might like to try.  Write
a program which scans a directory and renames the files to a systematic
pattern of O's and 0's.  Or 1's and l's.  Or :'s and ;'s.  So that when
you get a directory listing, you see this:

OOOOOO.OOO
OOOOOO.OO0
OOOOOO.O0O
OOOOOO.O00
OOOOOO.0OO
. . .

You might want to use a longer pattern if he has more than 512 files in
the directory.

Another choice would be to make the filenames ascending integers, and have
the extensions spell out a comment on his parentage when viewed sideways
(use different characters like space and atsign to blank and fill in
character wide "pixels" in the extension, like "BANNER.BAS" produces (or
the moving lights on the sides of the Allied Chemical tower in Times Square).
You need the filenames sorted that way to keep the message in order.

Be prepared to be fired when this person's manager takes exception
to your causing this loser run around and get tape restores of his areas
during working hours.

The former hack was perpetrated by and on users of the BOCES/LIRICS
DECsystem-10 in Deer Park, NY.  At least half a dozen graduates from
Long Island high schools served by that company work for DEC today.

I just thought of the second hack at this moment.  Since few of us
are using ASR33's on our systems, the true pain of the first hack is
really not what it used to be.
				/AHM
122.4MARCIA::GSCOTTFri May 24 1985 23:5410
re: .-1

A nasty thing done to unsuspecting types on DECsystem-10 shops like 
BOCES/LIRICS was to make a file named "*.*" from DDT in someone's
directory who left themselves logged in.  When they got in again,
they would see this file and DELETE *.*, which did the expected
(nasty) thing.  If you were smart you did a OPEN/LOOKUP/RENAME in
DDT.

GAS
122.5NY1MM::SWEENEYMon May 27 1985 23:266
When will BOCES/LIRICS get the recognition in the folklore of hacking that it
deserves?  Never had so many, so young hacked so many systems. 

It was 15 years ahead of its time. 

Pat Sweeney 
122.6LATOUR::AMARTINTue May 28 1985 04:084
And I just ran into Rich Rupp at DECUS today.  I never met him before, but
I recognized his name from LIRICS . . .
				/AHM

122.7ACE::BREWERTue May 28 1985 13:418
	If you have write access to the perpertrator's dir enter
a Login.com;32768 containing one line:

	$logout

	(are you on VMS?)

	-John
122.8MARCIA::GSCOTTWed May 29 1985 00:4810
re: .5, .6

Many of the B/L types later went to WPI and hacked there.. such as Rich
Rupp.  Dear old system 215 at WPI was sold by the pound when their 2060
was delivered, and all of the fine TOPS-10 hacks put in there (including
many of my own, Greg Walsh, etc.) went to that big PDP-10 in the sky.

Sob

Greg
122.9VAXUUM::DYERThu May 30 1985 03:337
	Some of the B/L types went on from WPI to DEC.  Dave Bilkis (no longer
with DEC) and Mike Rosenblum come to mind.
	I think.
#6	[1000,35155]\

(I only played ADVENT and DOCTOR on the -10.  I didn't start gweeping until the
-20 arrived.  Ahh memories.)
122.12XENON::MUNYANSun Jun 02 1985 15:469
Re: .11

The least you could have done was written it as:

<ESC>[154q

so people reading the note wouldn't get upset... Maybe we should hack you.

Steve
122.13CTOAVX::BAYSun Jun 02 1985 18:198
That's what's nice about Rainbows - they are impervious to a lot of VT100
hacks.

In fact, I just got a brilliant idea for an enhancement to KERMIT!

Gotta go find another note!  Later!

Jim /v\
122.14APACHE::LAWLERMon Jun 03 1985 11:418
re: .12
  Sorry about that, I edited my comment into the file and 
posted it without thinking.  Doesn't do anything on my
vt241...  Anyway, hope it comes in as handy for you guys
as it did for me...

                                       al
122.15GLIVET::DIAMONDMon Jun 03 1985 12:114
Lucky for you, I don't think your terminal will do it.  It's a bug, not
a feature.

Dave
122.16SHRMAX::HARLEYMon Jun 03 1985 17:323
re .8

Those certainly were the days...
122.17ACE::BREWERTue Jun 04 1985 15:005
	I think that  (oops) ESC[155q , on the vt100 will "speed up your typing speed"!
(ie: hit an E and you get 7 of them etc...) until you do a power cycle
on the vt100.

	-John
122.18VAXUUM::DYERTue Jun 04 1985 18:013
	We already have a note on this.  "Dangerous Escape Sequences," started
by yours truly.
#6	<_Jym_>\
122.19EAYV01::THOMSONWed Jun 05 1985 09:0211
If he has a vt100 and you can access it...

set his answer back to:-   f/no a.com<ret>e<ret>@a<ret>

and send him mail starting with ^E and anything else you
want...

^E
$ delete/command=(logout) (or whatever)
$ delete a.com;*
					Alan Thomson
122.20MILVAX::ROSEWed Jun 05 1985 17:0316
Hi:


	#3 Thank you one and all.
	#4 Thank you one and all.

#5

	I was mad then, bit you are all right encoding  his directory is
TOO drastic. I do like some of the other thoughts on how to avenge my MAIL
file. Now I'm back from vacation it's time to set the wheels in motion.



ThanX much
Harry
122.21APACHE::LAWLERThu Jun 06 1985 12:142
Do tell us what finally happens to the poor sucker...
122.22COMET::LECOMPTEFri Jun 07 1985 19:345
       Is there a way to remove a file from your account if it is owned
by another UIC and the protection on it is such that when you do a
directory that you get "NO PRIVILEDGE FOR ATTEMPTED OPERATION"

elh
122.23PARVAX::PFAUFri Jun 07 1985 22:594
Yes.  Talk to your system manager or someone else with suitable file 
access privileges.

tom_p
122.24ORPHAN::BRETTFri Jun 07 1985 23:334
SET FILE/REMOVE will remove the pointer from your directory to the file,
which will continue to occupy disk space.

/Bevin
122.25SPRITE::MCVAYSat Jun 08 1985 22:152
 Alternately, if you have access to the owner's account (or some other account),
the RENAME command will move the file.
122.26VAXUUM::DYERSun Jun 09 1985 01:018
	[RE .19]:  You must be on an old system.  The new MAIL doesn't let
^E get through.  You have to do that by hacking the MAIL or PHONE protocols.
	What does the "f/no" command do?  It doesn't work for me . . .

	[RE Strange File In Your Directory]:  SET FILE/ENTER and SET FILE/REMOVE
are still undocumented, aren't they?  Perhaps they merit their own note . . .

#6	<_Jym_>\
122.27LEHIGH::CANTORTue Jun 11 1985 11:257
re .26

SET FILE/ENTER and SET FILE/REMOVE are both documented in SYS$HELP:HELPLIB.HLB
on VMS V4.1.  The descriptions of both these commands contain the admonition
that use of the qualifier is "discouraged."

Dave C.
122.28VAXUUM::DYERTue Jun 11 1985 20:082
	I'm still waiting for an explanation of what the "f/no" command does.
#6	<_Jym_>\
122.29WEBSTR::NELSONWed Jun 12 1985 01:453
It's the FILE command in V3 Mail.

				JENelson
122.30VAXUUM::DYERThu Jun 13 1985 16:512
	But DELETE/COMMAND doesn't work in V3!
#6	<_Jym_>\
122.31WEBSTR::NELSONThu Jun 13 1985 16:575
RE .-1

No, but SET COMMAND/DELETE=LOGOUT does.  It even works on V4.

				JENelson
122.32WHOARU::WONGSun Mar 23 1986 22:1615
    The best counter-attack I've seen happened in APO.
    
    There were these two roommates who were having CPU wars: who could
    get each the other through the system in the most innovative way.
    
    One guy cheated; he went to one of the systems people and got him
    to send his roomate to another disk/directory upon logging in. However,
    the transfer was disguised so that typing in "DIRECTORY" would identify
    the directory as the proper location but with NO files.
    
    We spent a hell of a time figuring out what happened. This clustering
    stuff opens up alot of ways to get someone.
    
    B>
    
122.33clear screen promptCANYON::HESTERMANScott HestermanThu Jul 03 1986 18:344
I kind of liked it when I hacked SYLOGIN.COM to check for a given
username and set his prompt to clear the screen!

SLH
122.34I set one guy to frenchSUBSYS::LAWLERN9910QMon Jul 07 1986 17:568
    I did one better than that.  We had a new employee
    start here, and I hacked sylogin to change the vax
    messages to french every time he logged in...
    (He is french.)  It took him 3 weeks to summon
    up the courage to say something!
    
    				al