The Anarchist Cookbook (37 page)

Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

BOOK: The Anarchist Cookbook
11.82Mb size Format: txt, pdf, ePub

a computer on the network called "UMCVMB", you would issue the following subcommand:

FTP UMCVMB.MISSOURI.EDU

Host "UMCVMB" will prompt you for an account name and password. If your login is

correct, FTP will tell you so, otherwise it will say "login incorrect." Try again or abort the

FTP program. (This is usually done by typing a special control character such as

CONTROL-C. The "program abort" character varies from system to system.)

Next you will see the FTP prompt, which is:

Ftp>

There are a number of subcommands of FTP. The subcommand "?" will list these

commands and a brief description of each one.

You can initiate a file transfer in either direction with FTP, either from the remote host

or to the remote host. The "get" subcommand initiates a file transfer from the remote

host (i.e. Tells the remote computer to send the file to the local computer [the one on

which you issued the "ftp" command]). Simply enter "get" and FTP will prompt you for the

remote host's file name and the (new) local host's file name. Example:

Ftp> get

Remote file name?

theirfile

local file name?

myfile

You can abbreviate this by typing both file names on the same line as the "get"

subcommand. If you do not specify a local file name, the new local file will be called the

same thing as the remote file. Valid FTP subcommands to get a file include the following:

get theirfile myfile

get doc.x25

The "put" subcommand works in a similar fashion and is used to send a file from the local

computer to the remote computer. Enter the command "put" and FTP will prompt you for

the local file name and then the remote file name. If the transfer cannot be done because

the file doesn't exist or for some other reason, FTP will print an error message.

There are a number of other subcommands in FTP that allow you to do many more things.

Not all of these are standard so consult your local documentation or type a question mark

at the FTP prompt. Some functions often built into FTP include the ability to look at files

before getting or putting them, the ability to change directories, the ability to delete files

on the remote computer, and the ability to list the directory on the remote host.

An intriguing capability of many FTP implementations is "third party transfers." For

example, if you are logged on computer A and you want to cause computer B to send a file

to computer C, you can use FTP to connect to computer B and use the "rmtsend" command.

Of course, you have to know usernames and passwords on all three computers, since FTP

never allows you to peek into someone's directory and files unless you know their username

and password.

The "cd" subcommand changes your working directory on the remote host. The "lcd"

subcommand changes the directory on the local host. For UNIX systems, the meaning of

these subcommands is obvious. Other systems, especially those that do not have directory-

structured file system, may not implement these commands or may implement them in a

different manner.

The "dir" and "ls" subcommands do the same thing, namely list the files in the working

directory of the remote host.

The "list" subcommand shows the contents of a file without actually putting it into a file

on the local computer. This would be helpful if you just wanted to inspect a file. You could

interrupt it before it reached the end of the file by typing CONTROL-C or some other

special character. This is dependent on your FTP implementation.

The "delete" command can delete files on the remote host. You can also make and remove

directories on the remote host with "mkdir" and "rmdir". The "status" subcommand will

tell you if you are connected and with whom and what the state of all your options are.

If you are transferring binary files or files with any non-printable characters, turn binary

mode on by entering the "binary" subcommand:

binary

To resume non-binary transfers, enter the "ascii" subcommand.

Transferring a number of files can be done easily by using "mput" (multiple put) and "mget"

(multiple get). For example, to get every file in a particular directory, first issue a "cd"

command to change to that directory and then a "mget" command with an asterisk to

indicate every file:

cd somedirectory

mget *

When you are done, use the "close" subcommand to break the communications link. You will

still be in FTP, so you must use the "bye" subcommand to exit FTP and return to the

command level. The "quit" subcommand will close the connection and exit from FTP at the

same time.

Mail

Mail is the simplest network facility to use in many ways. All you have to do is to create

your message, which can be done with a file editor or on the spur of the moment, and then

send it. Unlike FTP and Telnet, you do not need to know the password of the username on

the remote computer. This is so because you cannot change or access the files of the

remote user nor can you use their account to run programs. All you can do is to send a

message.

There is probably a program on your local computer which does mail between users on that

computer. Such a program is called a mailer. This may or may not be the way to send or

receive mail from other computers on the network, although integrated mailers are more

and more common. UNIX mailers will be used as an example in this discussion.

Note that the protocol which is used to send and receive mail over a TCP/IP network is

called SMTP, the "Simple Mail Transfer Protocol." Typically, you will not use any program

called SMTP, but rather your local mail program.

UNIX mailers are usually used by invoking a program named "mail". To receive new mail,

simply type "mail". There are several varieties of UNIX mailers in existence. Consult your

local documentation for details. For example, the command "man mail" prints out the

manual pages for the mail program on your computer.

To send mail, you usually specify the address of the recipient on the mail command. For

example: "mail [email protected]" will send the following message to username

"knight" on host "umcvmb".

You can usually type in your message one line at a time, pressing RETURN after each line

and typing CONTROL-D to end the message. Other facilities to include already-existing

files sometimes exist. For example, Berkeley UNIX's allow you to enter commands similar

to the following to include a file in your current mail message:

r myfile

In this example, the contents of "myfile" are inserted into the message at this point.

Most UNIX systems allow you to send a file through the mail by using input redirection.

For example:

mail [email protected] < myfile

In this example, the contents of "myfile" are sent as a message to "knight" on "umcvmb."

Note that in many UNIX systems the only distinction between mail bound for another user

on the same computer and another user on a remote computer is simply the address

specified. That is, there is no hostname for local recipients. Otherwise, mail functions in

exactly the same way. This is common for integrated mail packages. The system knows

whether to send the mail locally or through the network based on the address and the user

is shielded from any other details.

"The Quest For Knowledge Is Without End..."

123.Phrack Magazine - Vol. 3, Issue 27 by Knight Lightning

Prologue For None VMS Users

DECnet is the network for DEC machines, in most cases you can say VAX's. DECnet allows

you to do:


e-mail


file transfer


remote login


remote command


remote job entry


PHONE

PHONE is an interactive communication between users and is equal to TALK on UNIX or a

"deluxe"-CHAT on VM/CMS.

BELWUE, the university network of the state Baden-Wuerttemberg in West Germany

contains (besides other networks) a DECnet with about 400 VAX's. On every VAX there is

standard-account called DECNET with pw:= DECNET, which is not reachable via remote

login. This account is provided for several DECnet-Utilities and as a pseudo-guest-account.

The DECNET-account has very restricted privileges: You cannot edit a file or make

another remote login.

The HELP is equipped by the system and is similar to the MAN command on UNIX.

More information on DECnet can be found in "Looking Around In DECnet" by Deep Thought

in this very issue of Phrack Inc.

Here, at the University of Ulm, we have an *incredibly* ignorant computer center staff,

with an even bigger lack of system-literature (besides the 80kg of VAX/VMS-manuals).

The active may search for information by himself, which is over the level of "run,"

"FORTRAN," or "logout." My good luck that I have other accounts in the BELWUE-

DECnet, where more information is offered for the users. I am a regular student in Ulm

and all my accounts are completely legal and corresponding to the German laws. I don't

call myself a "hacker," I feel more like a "user" (. .it's more a defining-problem).

In the HELP-menu in a host in Tuebingen I found the file netdcl.com and the corresponding

explanation, which sends commands to the DECNET-Account of other VAX's and executes

them there (remote command). The explanation in the HELP-menu was idiot-proof --

therefore for me, too :-)

With the command "$ mcr ncp show known nodes" you can obtain a list of all netwide

active VAX's, as is generally known, and so I pinged all these VAX's to look for more

information for a knowledge-thirsty user. With "help", "dir" and other similar commands I

look around on those DECnet accounts, always watching for topics related to the BELWUE-

network. It's a pity, that 2/3 of all VAX's have locked the DECNET-Account for

NETDCL.COM. Their system managers are probably afraid of unauthorized access, but I

cannot imagine how there could be such an unauthorized access, because you cannot log on

this account -- no chance for trojan horses, etc.

Some system managers called me back after I visited their VAX to chat with me about the

network and asked me if they could help me in any way. One sysop from Stuttgart even

sent me a version of NETDCL.COM for the ULTRIX operation system.

Then, after a month, the HORROR came over me in shape of a the following mail:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

From: TUEBINGEN::SYSTEM 31-MAY-1989 15:31:11.38

To: FRAMSTAG

CC:

Subj: don't make any crap, or you'll be kicked out!

From: ITTGPX::SYSTEM 29-MAY-1989 16:46

To: TUEBINGEN::SYSTEM

Subj: System-breaking-in 01-May-1989

To the system manager of the Computer TUEBINGEN,

On May 1st 1989 we had a System-breaking-in in our DECNET-account, which started from

your machine. By help of our accounting we ascertained your user FRAMSTAG to have

emulated an interactive log-on on our backbone-node and on every machine of our VAX-

cluster with the "trojan horse" NETDCL.COM. Give us this user's name and address and

dear up the occurrence completely. We point out that the user is punishable. In case of

repetition we would be forced to take corresponding measures. We will check whether our

system got injured. If not, this time we will disregard any measure. Inform us via DECnet

about your investigation results -- we are attainable by the nodenumber 1084::system

Dipl.-Ing. Michael Hager

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

My system manager threatened me with the deleting of my account, if I would not

immediately enlighten the affair. *Gulp*! I was conscious about my innocence, but how to

tell it to the others? I explained, step by step, everything to my system manager. He then

understood after a while, but the criminal procedure still hovered over me... so, I took

quickly to my keyboard, to compose file of explanations and to send it to that angry

system manager in Stuttgart (node 1084 is an institute there). But no way out: He had run

out of disk quota and my explanation-mail sailed into the nirwana:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

$ mail explanation

To: 1084::system

%MAIL-E, error sending to user SYSTEM at 1084

%MAIL-E-OPENOUT, error opening

SYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;

as output

-RMS-E-CRE, ACP file create failed

-SYSTEM-F-EXDISKQUOTA, disk quota exceeded

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

Also the attempt of a connection with the PHONE-facility failed: In his borderless

hacker-paranoia, he cut off his PHONE... and nowhere is a list with the REAL-addresses of

the virtual DECnet-addresses available (to prevent hacking). Now I stood there with the

Other books

Begging to be Bred by Livia Bloom
2nd Earth 2: Emplacement by Edward Vought
Living Violet by Jaime Reed
CRUISE TO ROMANCE by Poznanski, Toby
Scary Rednecks & Other Inbred Horrors by Ochse, Weston, Whitman, David, Macomber, William
The Right Hand by Derek Haas
The Aguero Sisters by Cristina Garcia
Old Lover's Ghost by Joan Smith
Cinderella in the Surf by Syms, Carly