|
*************************************** Hacking ARPANET -- Part VI by The Source *************************************** This last part of the Hacking ARPANET series provides some more iformation on the types of things that you can learn from the EXEC, and concludes by explaining how to log onto the system and how passwords are structured. Once you are onto the EXEC, as explained in Part I, you should get into the QUERY function which is also explained earlier. QUERY will tell you just about all you need to know about anyone, including their business phone numbers and the locations of certain military employees. @N TOP NIC/Query is a database system containing information about the Defense Data Network (DDN)... 1. INTERNET PROTOCOLS -- Describes Internet protocols 2. PROGRAMS -- Describes programs available on DDN hosts 3. PERSONNEL -- Directory of DDN users 4. HOSTS -- Describes DDN hosts 5. RFCS -- Requests For Comments technical notes 6. IENS -- Internet Experiment Notes 7. NIC DOCUMENTS -- Documents available from the NIC _ for back, ^ for up, + for top, or menu # (1-7): 4 HOSTS ----- We have selected menu item 4, "HOSTS". HOSTS -- Describes DDN hosts 1. BY NAME -- Description of hosts by DDN hostname 2. BY CPU -- List of hosts by CPU type 3. BY OS -- List of hosts by Operating System _ for back, ^ for up, + for top, or menu # (1-3): 1 If we were especially interested in working on one or another computer, a CRAE, for example, we would select menu item 2. Or, if we wanted to learn a new operating system, we could select menu item 3. But let's see what's available under menu item 1: HOSTS BY NAME -- Description of hosts by DDN hostname To show the entry for a host, type its official name or nickname. To get a menu of hostnames, select the appropriate choice below. 1. ARPANET HOSTS-A-G 2. ARPANET HOSTS-H-R 3. ARPANET HOSTS-S-Z 4. MILNET HOSTS-A-F 5. MILNET HOSTS-G-M 6. MILNET HOSTS N 7. MILNET HOSTS-O-Z 8. ARPANET TACS 9. MILNET TACS 10. GATEWAYS _ for back, ^ for up, + for top, or menu # (1-10): 10 <let's take a look> GATEWAYS 1. AERONET-GW 2. AMES-NAS-GW 3. ARPA-MILNET-GW 4. BBN-CRONUS-GW 5. BBN-FIBERA-GW 6. BBN-MILNET-GW 7. BBN-MINET-A-GW 8. BBN-NET-GATEWAY 9. BBN-PR-GW 10. BBN-VAN-GW 11. BBN-X25-GW 12. BRAGG-PR-GW1 13. BRAGG-PR-GW2 14. BRL-GATEWAY 15. BRL-GATEWAY2 16. CIT-CS-GW 17. CMU-GATEWAY 18. COLUMBIA-GW 19. CORNELL-GW 20. CSNET-PDN-GW 21. CSS-GATEWAY 22. CSS-RING-GW 23. DARPA-GW 24. DCEC-GATEWAY 25. DCEC-MILNET-GW 26. DCEC-PSAT-IG 27. DCN-GATEWAY 28. DTNSRDC-GW 29. HARVARD-GW 30. HUEY-GW 31. IPTO-GW 32. ISI-GATEWAY 33. ISI-MCON-GW 34. ISI-MILNET-GW 35. ISI-PSAT-IG 36. LBL-MILNET-GW 37. LL-GW 38. LL-PSAT-IG 39. LOUIE-GW 40. MARYLAND-GW 41. MIT-GW 42. NLM-GW 43. NOSC-GW 44 NRL-CSS-GW 45. NSRDCOA-GW 4.. NYU-GW 47. PURDUE-CS-GW 48. RAD-PSAT-IG 49. RIACS-GW 50. S1-B-GW 51. SAC-GATEWAY 52. SAC-GW-2 53. SAC-MILNET-GW 54. SRI-C3ETHER-GW 55. SRI-MILNET-GW 56. SRI-PR-GW1 57. SRI-PR-GW2 58. SRI-PR-GW3 59. STANFORD-GATEWAY 60. TACTNET-GW 61. UDEL-GW -- University of Delaware 62. UR-CS-GW -- University of Rochester 63. UTAH-GATEWAY -- University of Utah 64. UW-VLSI-GW -- University of Washington 65. WISC-GATEWAY -- University of Wisconsin 66. WSMR-NET-GW -- White Sands Missile Range 67. YALE-GW -- Yale University 68. YUMA-GW -- Army Yuma Proving Ground <menu item 9> MILNET TACS 1. ACCAT-TAC 2. AFGL-TAC 3. AFSC-AD-TAC 4. AFSC-HQ-TAC 5. AFSC-SD-TAC 6. AFWL-TAC 7. AMES-TAC 8. ANNIS-MIL-TAC 9. ARDC-TAC 10. ARPA1-MIL-TAC 11. ARPA2-MIL-TAC 12. BBN-MIL-TAC 13. BRL-TAC 14. BROOKS-AFB-TAC 15. CINCPAC-TAC 16. CORADCOM-TAC 17. CORADCOM2-TAC 18. DARCOM-TAC 19. DAVID-TAC 20. DCEC-MIL-TAC 21. DCEC-TAC 22. DDN-PMO-MIL-TAC 23. DUGWAY-MIL-TAC 24. FRANKFURT-MIL-TAC 25. GUNTER-TAC 26. KOREA-TAC 27. MICOM-TAC 28. MINET-BRM-TAC 29. MINET-CPO-TAC 30. MINET-HDL-TAC 31. MINET-HLH-TAC 32. MINET-LON-TAC 33. MINET-OBL-TAC 34. MINET-RAM-TAC 35. MINET-RDM-TAC 36. MINET-SIG-TAC 37. MINET-VHN-TAC 38. MITRE-TAC 39. NCAD-MIL-TAC 40. NORL-MIL-TAC 41. NPS-TAC -- Naval Postgraduate School 42. NSWC-TAC -- Naval Surface Weapons Center 43. NWC-TAC -- Naval Weapons Center 44. PAX-RV-TAC -- Naval Electronics Systems Command 45. PENTAGON-TAC -- Air Force Data Services Center/SFA 46. RADC-TAC -- Rome Air Development Center 47. RAND2-MIL-TAC -- The Rand Corporation 48. ROBINS-TAC -- Warner-Robins ALC/MMECDM 49. SAC1-MIL-TAC -- Strategic Air Command/ADXCC Headquarters 50. SAC2-MIL-TAC -- Headquarters, Strategic Air Command 51. SCOTT-TAC -- Air Force Communications Command 52. SCOTT2-MIL-TAC -- Air Force Communications Command 53. SRI-MIL-TAC -- SRI International 54. STLA-TAC -- Army Information Systems Command - St. Louis 55. TINKER-MIL-TAC -- Tinker Air Force Base 56. USGS2-TAC -- U.S. Geological Survey 57. USGS3-TAC -- U.S. Geological Survey 58. WPAFB-TAC -- Aeronautical Systems Division/ADOS 59. WSMR-TAC -- White Sands Missile Range 60. YUMA-TAC -- Army Yuma Proving Ground <If you're interested in more information about the system, simply enter its menu number as in the examples below:> 43. NWC-TAC -- Naval Weapons Center SRI-MIL-TAC SRI International (SRI-MIL-TAC) Telecommunications Sciences Center Network Information Center 333 Ravenswood Avenue Menlo Park, California 94025 NetNumber: 26.3.0.73 Configuration: C/30 Protocols: TCP/TELNET,ICMP Liaison: Roode, R. David ROODE@SRI-NIC (RAND2-MIL-TAC) Room 145 1700 Main Street Santa Monica, California 90406 NetNumber: 10.0.0.7 Configuration: C/30 Protocols: TCP/TELNET,ICMP Liaison: Collins, Colleen S. Colleen@RAND-UNIX (213) 393-0411 <note that the data always includes the system's network number, NetNumber, this is a useful feature if you want to use your local node to dial up the remote system> PROGRAMS -------- The EXEC also stores a list of programs and you can find out where to look for them on various network nodes. The programs are organized by menu as in the examples below: PROGRAMS 1. BY NAME 2. PROGRAM LIST 2 PROGRAM LIST 1. 11COPY 2. 2LABEL 3. @ 4. PROGRAMS-A 5. PROGRAMS-B 6. PROGRAMS-C 7. PROGRAMS-D 8. PROGRAMS-E 9. PROGRAMS-F 10. PROGRAMS-G 11. PROGRAMS-H 12. PROGRAMS-I 13. PROGRAMS-J 14. PROGRAMS-K 15. PROGRAMS-L 16. PROGRAMS-M 17. PROGRAMS-N 18. PROGRAMS-O 19. PROGRAMS-P 20. PROGRAMS-Q 21. PROGRAMS-R 22. PROGRAMS-S 23. PROGRAMS-T 24. PROGRAMS-U 25. PROGRAMS-V 26. PROGRAMS-W 27. PROGRAMS-X 28. PROGRAMS-Y 29. PROGRAMS-Z menu # (1-29): <note there are 29 flavors, but we're choosing flavor 3> @ Examines a file and creates a checksum of each page. Upon subsequent runs it will detect which pages have changed and print only the altered pages, so that they can be added to the existing listing in place of the old pages. Has special features for updating cross-reference listings from compilers. CMU hosts (called AT) MIT-AI MIT-ML MIT-MC SRI-KL <it wasn't very thriling, but the hosts that offer the feature are listed in case we want to use it. Let's try another menu selection, #4> 4 PROGRAMS-A 1. A6502 2. ACCTS 3. ACT 4. ACTFRK 5. ADA 6. ADUMP 7. AGE-1 8. AGII 9. AI-HANDBOOK 10. AID 11. AIQUIZ 12. ALG606 13. ALGOL 14. ALGOL-W 15. ALIAS 16. ALLPRT 17. ALTER 18. ALTER.SNO 19. ALTRAN 20. ANALYSIS 21. ANALYZ 22. APEX-III 23. APL 24. APL.GST 25. APL25.KST 26. APLCOM 27. APLED 28. APT-III 29. ARCBITS 30. ARCHIVE-LOOKUP 31. ASSEMBLER-F 32. ASSEMBLER-G 33. ASSEMBLER-HONEYWELL 34. ASSEMBLER-IBM 35. ASSIST 36. AT 37. AUG3 38. AUGMEN 39. AUGMENT <again, for more information, type your selection> 9 AI-HANDBOOK The AI Handbook is aimed at making the results of AI research accessible to the large, multi-disciplinary community of scientists who want to build AI systems in their own problem areas. Students and researchers at Stanford and other AI laboratories have prepared over 300 short articles describing the fundamental ideas, useful thechniques, and exemplary programs developed in the field over the last 20 years. These articles have been written for computer- literate scienists and engineers in other fields who are unfamiliar with AI reserch and jargon. The Handbook will provide a scientist who, for instnce, might want to knoge" front end, with information about all of the relevant AI techniques and existing systems, as well as abundant pointers into the field's literature. SUMEX-AIM menu # (1-39): 15 ALIAS Allows a dummy name to be set up for a program. CMU hosts SUMEX-AIM SRI-KL menu # (1-39): 35 ASSIST ASSIST is a compiler fo a large subset of the IBM Assembler Language instruction set. ASSIST is oriented toward instructional use but is also useful for program checkout. ASSIST features simplified I/O statements and detailed assembly and execution error messages. ASSIST was developed at Pennsylvania State University and the University of Tennessee. UCLA-CCN menu # (1-39): 3 ACT Acquisition of Cognitive Procedures, combines a semantic network data-base with a production system to simulate human cognition. ACT possesses a number of learning mechanisms which have been used to model the learning of procedural skills such as language comprehension and geometry theorem proving. It can also model human limitations. SUMEX-AIM menu # (1-39): PERSONNEL To view information about an individual when you know his or her LAST NAME Type: LASTNAME <CR> (where 'LASTNAME' is the person's last name; e.g., Smith) PARTIAL NAME Type: LASTN... <CR> (where 'LASTN...' is a partial spelling of the person's last name followed by three periods, e.g., Sm...) FULL NAME Type: FULLNAME <CR> (where 'FULLNAME' is the person's last name followed by a comma and his or her first name; e.g., Smith, Mary) IDENT Type: XYZ <CR> (where 'XYZ' is the ident) <so let's try one...> MA... There are 631 matching entries. <oops, for the purpose of this printout we'll just show a few of them> Accetta, Michael (MA) MIKE.ACCETTA@CMU-CS-A (412) 578-7681 Asato, Mino (MA1) NEEAPAC@HAWAII-EMH (808) 471-3444 (AV) 421-6834 Amaro, Manny (MA10) MAMARO@SIMTEL20 (505) 678-9500 (AV) 258-9500 (FTS) 898-9 500 Aguilar, Mary (MA11) mary@RAND-UNIX (213) 393-0411 Aronstein, Michael (MA12) ARONSTEIN@BBNA (619) 224-3243 Adams, Marilyn (MA13) MADAMS@BBNA (617) 497-3678 Abe, Michael (MA14) PACDET@PAXRV-NES (808) 471-0821 Ackerman, Mark (MA15) ACKERMAN@JPL-VLSI (818) 354-4467 Altenau, Mike (MA17) CENCOMS-F4@USC-ISID -- Addison, Michael (MA19) MARCOMMS@PAXRV-NES (703) 521-8835 Allerding, Martin (MA20) 600140@LANL (703) 326-7028 ... LOGIN ----- ARPANET very graciously tells us just about all we know to be able to log into the system in the related HELP file below: .HELP LOGIN Only people with authorized accounts may log in on this system, though some programs can be run without logging in. Type "HELP GUEST" for a list of these "free" programs. Type "HELP ACCOUNT" for information on opening an account. To log in, type the word LOGIN (this may be abbreviated L) followed by a space, your project name, a comma, and your programmer name: L PRJ,PRG This will lo you in, and type out any system messages or personal mail for you wich may exist. You can stop the message typeout by typing the CALL eg (CONTROL-C twice from other characters in place of the "," namely: / - types only system messages that have been posted since you last logged in. . - suppresses all messages. % - lets you specify a new password. In order to log in from the network or remotely, you must have a password. For a more complete description of LOGIN options, see the printed Monitor Command Manual or its online version MONCOM.BH[S,DOC], whose updates are in MONCOM.UPD[S,DOC]. Rembember, ARPANET has already shown us how to find out the PRG (programmer name) part of the login: .FINGER INT where INT are the initials of a programmer. If the initials don't exist you will get an error message. Keep trying until you find the correct initials. Passwords are often the same as the programmer's initials. If not, then try the programmer's first name which you can learn from using the Personnel option on the menu in the Exec's QUERY. Once you have a password, you may then log onto just about any ARPANET computer. Instead of typing "O 0,11", enter the machine's NetWork number! All that's left to be hacked is the first section of the logon code -- the PRJ name, which may be as long as three letters and which may include nubmers. HAPPY HACKING! THIS SERIES OF ARTICLES WAS BROUGHT TO YOU BY **THE SOURCE**. COPY IT; SPREAD IT AROUND; USE IT FREELY BUT DON'T FORGET TO PUT THE AUTHOR'S NAME IN IT