home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
phrk4
/
phrack40.4
< prev
next >
Wrap
Text File
|
1992-10-02
|
33KB
|
599 lines
==Phrack Inc.==
Volume Four, Issue Forty, File 4 of 14
Network Miscellany
*******************************************************
< How to Acquire Information on Internet Computers >
*******************************************************
Compiled from Internet Sources
by The Racketeer
of The Hellfire Club
Network Miscellany created by Taran King
Generally speaking, information is everything. A lot of hacking any computer
on a network is being able to gather information about the machine and its
vulnerabilities. This file is about using the available resources on the
Internet network in order to gain important information about any perspective
sites.
A large amount of information has been printed in Phrack recently about the
Internet, most of it copied straight from manuals and in my opinion lacking
hacking flair. Therefore, I'm going to take you straight into the heart of the
heart of the matter with this file on acquiring information!
Now, the Internet is notorious for not having an instruction manual. Most
people who find out what the Internet is learn from their friends. It used to
be that there was only one real landmark on the Internet, and that was the
SIMTEL-20 FTP archive. Now, the Internet is probably the largest free network
in existence. In fact, it's a hacker's paradise!
Unfortunately, you have to know about "public" sites on the network before you
can use them. Likewise, how are you going to hack an organization if you don't
know any machines on it? Sort of like trying to complain to Packard-Bell about
your computer equipment not working when the bastards don't supply their name,
address, or phone number. You are going to have to find another way to get that
information if you want to get anything done.
There is not any one particular way to learn about a site. In fact, you'll
have to combine several unusual methods of gathering information in order to
obtain anything resembling a "complete picture." However, using the
combinations of techniques described in this file, you can maneuver through any
network on the Internet and learn about the machines within.
The first stop on this journey is the ARPANet Network Information Center
(frequently called "NIC" by experienced network users). NIC's purpose is
simply to keep track of all the network connections, fields, domains, and hosts
that people wish to be told about.
To connect to NIC, you would issue a command from your Internet connected
machine similar to this:
.----------------------- command
\/
[lycaeum][1]> telnet nic.ddn.mil
This will (within a short period of time) route you to the Network Information
Center and grant you access. There isn't a straight forward login/logout
system on NIC like other Unix computers; it will just connect you to the
Information System upon connection. The message you will get will be similar
to this:
* -- DDN Network Information Center --
*
* For TAC news, type: TACNEWS <return>
* For user and host information, type: WHOIS <return>
* For NIC information, type: NIC <return>
*
* For user assistance call (800) 235-3155 or (415) 859-3695
* Report system problems to ACTION@NIC.DDN.MIL or call (415) 859-5921
SRI-NIC, TOPS-20 Monitor 7(21245)-4
@ <prompt>
Great, now we are in. Essentially, since NIC is just a great big telephone
book, we need to let our fingers to the walking. Let's demonstrate a few
simple commands as I go after one of the government contract giants, the
corporation known as UNISYS. Let's start by entering WHOIS.
@WHOIS
SRI-NIC WHOIS 3.5(1090)-1 on Tue, 22 Aug 91 15:49:35 PDT, load 9.64
Enter a handle, name, mailbox, or other field, optionally preceded
by a keyword, like "host sri-nic". Type "?" for short, 2-page
details, "HELP" for full documentation, or hit RETURN to exit.
---> Do ^E to show search progress, ^G to abort a search or output <---
Whois:
Okay, now we are in the database. Since Unisys is our target, let's go ahead
and ask it about "Unisys."
Whois: unisys
Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil (904) 234-0451
Ebersberger, Eugen (EE35) UNISYS@HICKAM-EMH.AF.MIL (808) 836-2810
Lichtscheidl, Mark J. (MJL28) UNISYS@BUCKNER-EMH1.ARMY.MIL (DSN) 634-4390
Naval Warfare Assessment Center (UNISYS) UNISYS.NWAC.SEA06.NAVY.MIL
137.67.0.11
Navratil, Rich (RN74) UNISYS@COMISO-PIV.AF.MIL (ETS) 628-2250
There are 28 more matches. Show them? y --> of course
Peterson, Randy A. (RP168) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
Przybylski, Joseph F. (JP280) UNISYS@AVIANO-SBLC.AF.MIL (ETS) 632-7721
UNISYS Corporation (BIGBURD) BIGBURD.PRC.UNISYS.COM 128.126.10.34
UNISYS Corporation (GVLV2) GVL.UNISYS.COM 128.126.220.102
UNISYS Corporation (MONTGOMERY-PIV-1) MONTGOMERY-PIV-1.AF.MIL 26.5.0.204
Unisys Corporation (NET-MRC-NET)MRC-NET 192.31.44.0
Unisys Corporation (NET-SDC-PRC-CR) UNISYS-ISF-11 192.26.24.0
Unisys Corporation (NET-SDC-PRC-LBS) UNISYS-ISF-9 192.26.22.0
UNISYS Corporation (NET-SDC-PRC-NET) UNISYS-ISF-7 192.12.195.0
Unisys Corporation (NET-SDC-PRC-SA) UNISYS-ISF-10 192.26.23.0
Unisys Corporation (NET-SDC-PRC-SW) UNISYS-ISF-8 192.26.21.0
Unisys Corporation (NET-UNISYS-CULV) UNISYS-CULV 192.67.92.0
Unisys Corporation (NET-UNISYS-PRC) UNISYS-PRC 128.126.0.0
Unisys Corporation (NET-UNISYS-RES1) UNISYS-RES1 192.39.11.0
Unisys Corporation (NET-UNISYS-RES2) UNISYS-RES2 192.39.12.0
Unisys Corporation (NET-UNISYS2)UNISYS-B2 129.221.0.0
Unisys Corporation (STARS) STARS.RESTON.UNISYS.COM 128.126.160.3
Unisys Corporation (UNISYS-DOM) UNISYS.COM
Unisys Linc Development Centre (NET-LINC) LINC 143.96.0.0
UNISYS (ATC-SP) ATC.SP.UNISYS.COM 129.218.100.161
Unisys (FORMAL) FORMAL.CULV.UNISYS.COM 192.67.92.30
UNISYS (KAUAI-MCL) KAUAI.MCL.UNISYS.COM 128.126.180.2
UNISYS (MCLEAN-UNISYS) MCLEAN-UNISYS.ARMY.MIL 26.13.0.17
UNISYS (NET-UNISYS-RES3) UNISYS-RES3 192.67.128.0
Unisys (NET-UNISYS-SP) UNISYS-SP 129.218.0.0
UNISYS (SALTLCY-UNISYS) SALTLCY-UNISYS.ARMY.MIL 26.12.0.120
UNISYS (SYS-3) SYS3.SLC.UNISYS.COM 129.221.15.85
Wood, Roy (RW356) UNISYS@LAKENHEATH-SBLC.AF.MIL
0044-0638-522609 (DSN) 226-2609
As you can see, the details on these computers get fairly elaborate. The first
"column" is the matching information, second column is the network name or
title, then it is followed by a phone number or IP port address. If the phone
number has an area code, then it is of a standard phone nature; however, if it
is (DSN) then it's on the "Data Security Network," aka Autovon (the military
phone system).
Now, as you can tell from the above list, there are several UNISYS accounts at
military machines -- including a military machine NAMED after Unisys (mclean-
unisys.army.mil). This stands to reason since Unisys deals mostly in military
computer equipment. Since it is a secretive military group, you'd figure an
outsider shouldn't be able to gain much information about them.
Here is what happens if you center on a specific person:
Whois: cartee
Cartee, Melissa (MC142) unisys@email.ncsc.navy.mil
7500 McElvey Road
Panama City, FL 32408
(904) 234-0451
MILNET TAC user
Record last updated on 18-Apr-91.
Hmm.. Very interesting. This user obviously has access to military computers
since she has a TAC card, and goes under the assumed identity as "Unisys" in
general. Could this person be a vital link to the Unisys/U.S. Defense
connection? Quite possibly. More likely she is a maintenance contact, since
she can use her TAC card to contact multiple (confined) military networks.
I've gone ahead and requested specific information about kauai.mcl.unisys.com,
which as far as I know is a focal point for the Unisys Networks. Of course,
the information on this machine is non-classified (or if it IS classified,
Unisys will probably be chewed out by Uncle Sam). Notice all the great
information it gives:
Whois: kauai.mcl.unisys.com
UNISYS (KAUAI-MCL)
Building 8201, 10th Floor Computer Room
8201 Greensboro Drive
McLean, VA 22102
Hostname: KAUAI.MCL.UNISYS.COM
Nicknames: MCL.UNISYS.COM
Address: 128.126.180.2
System: SUN-3/180 running SUNOS
Coordinator:
Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
(215) 648-2573
domain server
Record last updated on 05-Aug-91.
No registered users.
Aha! The Coordinator on this machine doesn't use it! There are no registered
users! Namely, if you wanted to hack it, you aren't screwing with the higher
ups (this is good). Since when does Unisys buy computers from other companies?
Can't they just grab a few off the assembly line or something? The computer is
stationed in McLean, Virginia! That's where the CIA is! Could Unisys be
developing computers for the international espionage scene? Obviously, there
is a great deal of information to be sucked out of this machine.
How? The answer was listed there. The machine is a DOMAIN SERVER. That means
this computer holds the network information used to identify all the computer
systems on its network and all we need to do right now is figure out a way to
squeeze that information out! But first, let's see if our hunch was correct in
assuming the bigwigs are far away by checking out the head honcho, "Mr.
Meidinger."
Whois: jim@burdvax.prc.unisys.com
Meidinger, James W. (JWM3) jim@BURDVAX.PRC.UNISYS.COM
Unisys Corporation
Computer Resources
Room g311
P.O. Box 517
Paoli, PA 19301-0517
(215) 648-2573
Record Last Updated on 04-Jul-90.
Yup, Mr. Meidinger is far away -- Pennsylvania, to be exact. Not exactly
keyboard's length away, is he? Besides, being in the "Computer Resources"
department, I'd suspect he is just an accountant. Accountants are to computing
as beavers are to trees (unless, of course, they actually like computers, which
isn't a foregone conclusion in the business world).
I'm going to skip the rest of the information on NIC, since it has been
overkilled in this particular magazine anyway. The only hint I have is to read
CERT's and DDN's news blurbs, since they give out some interesting information
which would be useful and educational. Besides, messing around with the CIA's
hired goons sounds much more fun.
Now is the time for a little bit of a lesson in critical reasoning: the
Internet isn't exactly a "free to the public" network, meaning you just can't
attach your computer to a machine on the Internet and expect it to work all of
a sudden. You need to configure your machine around the computers in the
network domain you are linking into, and if you have their permission, then
everything is cool. But once you're configured, and your router and/or server
has been notified of your existence, does that mean anyone else has that
information? The answer is yes, although that info won't be forwarded to a
place like NIC -- it will have to be obtained another way.
All packets of data on the Internet need to be routed to and from valid
computer hosts. Therefore, all of this information is stored on the network's
gateway. But the routing information stored is simply in numeric format, such
as 128.126.160.3. At least, that is as understandable as it gets, since
Ethernet addresses are even more elaborate and in binary.
However, as Internet users know, there is more than a single way of describing
a computer. "telnet 128.126.160.3" would be one way of connecting to a
computer, or "telnet aviary.stars.reston.unisys.com" would be another way of
connecting to the same computer. These names are chosen by the owner of the
network, and are described through the use of "domain servers."
As you recall, kauai.mcl.unisys.com was listed by NIC as a domain server. This
means that the names of the computer systems on that network are stored on that
particular host. Of course, that's not the only thing. The domain server
presents the computer name and IP number to the connecting machine allowing you
to connect to the computer by using a "domain style name." Ultimately,
everything is converted to IP numbers.
Most network software allows compatibility with domain servers, meaning if you
want to connect to nic.ddn.mil, and you specify a command "telnet nic.ddn.mil"
then you will connect to nic.ddn.mil. Sadly, this isn't true of all computers
(which require IP numbers only), but at least it is true enough that the
general user is likely to have such computer resources.
Reaching back to the Dark Ages, there is a computer program that allows
machines that don't directly interpret domain style addresses to IP addresses
to still find out what the name of a machine is. This program is called
"nslookup" and is usually found in the Unix operating system (at least, I
haven't used it anywhere else -- it might only work on Unix).
"nslookup" stands for Name Server Lookup (there has been some debate, it seems,
if a domain server is really a name server, or visa versa; in fact, both
describe what they do well enough to have conflict). Regardless, let's go
ahead and work on learning how to use nslookup.
[lycaeum][2]> nslookup
Default Name Server: lycaeum.hfc.com
Address: 66.6.66.6
Now, going back to that NIC information we got earlier, let's continue to hack
on poor old Unisys, which is giving up its info every step we make. We
determined that the kauai.mcl.unisys.com was a domain server, so let's jump
ahead to that by changing our server to their server (after all, the computers
we are after aren't on our machine).
> server kauai.mcl.unisys.com
Default Server: kauai.mcl.unisys.com
Address: 128.126.180.2
Okay, now we have connected to the server. This isn't a constant connection,
by the way. It will only establish a connection for the brief instant that it
takes for it to execute commands. It doesn't require a password or an account
to get this information off of a nameserver.
Let's start off by having it give us a list of everything about Unisys that
this server knows. "Everything" is pretty much a good place to start, since we
can't go wrong. If we come up with nothing, then that's what's available. The
basic command to list machines is "ls" like the Unix directory command.
> ls unisys.com
[kauai.mcl.unisys.com]
Host of domain name Internet address
unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
unisys.com server = kronos.nisd.cam.unisys.com 3600
kronos.nisd.cam.unisys.com 128.170.2.8 3600
unisys.com server = kauai.mcl.unisys.com 3600
kauai.mcl.unisys.com 128.126.180.2 43200
unisys.com server = io.isf.unisys.com 3600
io.isf.unisys.com 128.126.195.20 3600
reston.unisys.com server = aviary.stars.reston.unisys.com 3600
aviary.star.reston.unisys.com 128.126.160.3 3600
aviary.star.reston.unisys.com 128.126.162.1 3600
reston.unisys.com server = kauai.mcl.unisys.com 3600
kauai.mcl.unisys.com 128.126.180.2 43200
rosslyn.unisys.com server = aviary.stars.reston.unisys.com 3600
aviary.stars.reston.unisys.com 128.126.160.3 3600
aviary.stars.reston.unisys.com 128.126.162.1 3600
rosslyn.unisys.com server = kauai.mcl.unisys.com 3600
kauai.mcl.unisys.com 128.126.180.2 43200
rmtc.unisys.com server = rmtcf1.rmtc.unisys.com 3600
rmtcf1.rmtc.unisys.com 192.60.8.3 3600
rmtc.unisys.com server = gvlv2.gvl.unisys.com 3600
gvlv2.gvl.unisys.com 128.126.220.102 3600
sp.unisys.com server = dsslan.sp.unisys.com 3600
dsslan.sp.unisys.com 129.218.32.11 3600
sp.unisys.com server = sys3.slc.unisys.com 3600
sys3.slc.unisys.com 129.221.15.85 3600
cam.unisys.com server = kronos.nisd.cam.unisys.com 3600
kronos.nisd.cam.unisys.com 128.170.2.8 3600
cam.unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
prc.unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
prc.unisys.com server = kronos.prc.unisys.com 3600
kronos.prc.unisys.com 128.170.2.8 3600
prc.unisys.com server = walt.prc.unisys.com 3600
walt.prc.unisys.com 128.126.2.10 3600
walt.prc.unisys.com 128.126.10.44 3600
culv.unisys.com server = formal.culv.unisys.com 3600
formal.culv.unisys.com 192.67.92.30 3600
culv.unisys.com server = kronos.nisd.cam.unisys.com 3600
kronos.nisd.cam.unisys.com 128.170.2.8 3600
slc.unisys.com server = sys3.slc.unisys.com 3600
sys3.slc.unisys.com 129.221.15.85 3600
slc.unisys.com server = dsslan.sp.unisys.com 3600
dsslan.sp.unisys.com 129.218.32.11 3600
slc.unisys.com server = nemesis.slc.unisys.com 3600
nemesis.slc.unisys.com 128.221.8.2 3600
bb.unisys.com server = sunnc.wwt.bb.unisys.com 3600
sunnc.wwt.bbs.unisys.com 192.39.41.2 3600
bb.unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
isf.unisys.com server = orion.ISF.unisys.com 3600
orion.ISF.unisys.com 128.126.195.7 3600
isf.unisys.com 128.126.195.1 3600
isf.unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
isf.unisys.com server = io.isf.unisys.com 3600
io.isf.unisys.com 128.126.195.20 3600
gvl.unisys.com 128.126.220.102 172800
gvl.unisys.com server = gvlv2.gvl.unisys.com 3600
gvlv2.gvl.unisys.com 128.126.220.102 3600
gvl.unisys.com server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
mcl.unisys.com 128.126.180.2 43200
mcl.unisys.com server = kauai.mcl.unisys.com 43200
kauai.mcl.unisys.com 128.126.180.2 43200
mcl.unisys.com server = burdvax.prc.unisys.com 43200
burdvax.prc.unisys.com 128.126.10.33 3600
mcl.unisys.com server = kronos.nisd.cam.unisys.com 43200
kronos.nisd.cam.unisys.com (dlen = 1152?) 4096
ListHosts: error receiving zone transfer:
result: NOERROR, answers = 256, authority = 0, additional = 3.
Bummer, an error. Funny, it claims there isn't an error, yet it screwed up the
kronos address and knocked me out. Apparently, this domain server is screwed.
Oh well, I guess that's really their problem because in the information it gave
us, it was able to provide all the answers we needed to figure out the next
step!
Quick analysis of the above information shows that most of the servers were
connected to at LEAST two other servers. Quite impressive: A fault-tolerant
TCP/IP network. Since it is fault tolerant, we can go ahead and use a
different machine to poke into the "mcl.unisys.com" domain. Since "mcl" stands
for McLean, that's where we want to go.
Remember that NIC told us that kauai.mcl.unisys.com had an alias? It was also
called "mcl.unisys.com". Looking at the above list, we see toward the bottom
that mcl.unisys.com is also domain served by the computers
burdvax.prc.unisys.com and kronos.nisd.cam.unisys.com. Let's connect to one of
them and see what we can gather!
Whenever a server starts acting screwy like kauai was doing, I make it a habit
of using IP numbers when they are available. I'm going to connect to
burdvax.prc.unisys.com through its IP address of 128.126.10.33.
> server 128.126.10.33
Default server: [128.126.10.33]
Address: 128.126.10.33
Now that we are connected, let's see the network information again, but this
time let's try something different and possibly more useful. This time we will
use the -h command, which happens to describe the computer type (CPU) and the
operating system it runs on (OS) which will give us a better idea of what we
are dealing with.
> ls -h mcl.unisys.com
Host or domain name CPU OS
maui.mcl.Unisys.COM SUN-2/120 UNIX 43200
cisco.mcl.Unisys.COM CISCO GATEWAY CISCO 43200
kauai.mcl.Unisys.COM SUN-3/180 UNIX 43200
voyager.mcl.Unisys.COM SUN-4/330 UNIX 43200
dial.mcl.Unisys.COM SUN-3/260 UNIX 43200
astro.mcl.Unisys.COM SUN-3/60 UNIX 43200
hotrod.mcl.Unisys.COM Unisys 386 SCO/UNIX 43200
oahu.mcl.Unisys.COM VAX-11/785 UNIX 43200
lanai.mcl.Unisys.COM SUN-3/160 UNIX 43200
mclean_is.mcl.Unisys.COM 386 NOVELL 43200
WOW! Look at all those Suns! I guess Unisys has no faith in their own
computers or something! If only President Bush could see this display of a
company backing their product! In fact, the only Unisys computer in this whole
lot is a cheesy 386 clone which probably is some guy's desktop machine.
Once again, there is some fascinating information here. Let's run through it
really quick:
Maui is a Sun 2, which is a really old RISC computer. You don't see many of
these around but they still can be useful for storing stuff on. But then
again, it probably is faster than a PC!
Oahu is a Vax-11 which is apparently running Ultrix. This may be where Unisys
hoards all their programmers since it isn't being used for serious networking
(at least, as far as we can tell).
Mclean_is happens to be the file server for a PC network. We can't really tell
from this point how many computers are on this network, but it could be
possible it is used for public information trade, where secretaries or
receptionists use it to confirm trade and scheduling.
Hotrod is also a 386, made by Unisys even! Oddly, it is running a copy of SCO
Unix, which means it is, no doubt, a personal computer someone uses for Unix
programming. If Unisys were itself a part of the government, I'd think this
computer would have been a kludged bidding contract which they got stuck with
because they were aiming for lowest bid and were unfortunately not very picky.
Voyager is an interesting machine, which is apparently the most modern on this
network. Since it is a Sun-4 computer (probably IPX) it would be a high-speed
graphics workstation. This could be the machine where many CAD applications
are stored and worked on. Another possibility is that Sun 4 computers were
extremely expensive when they purchased this network of Suns, and they
purchased this one machine to be the file server to the other Sun 3s and the
Sun 2. If you were to gain access to one of the other machines, it's possible
you would have access to all of them.
Cisco is just a standard Cisco Router/Gateway box, linking that particular
network to the Internet.
Kauai is a messed up domain server, big deal. It might work on the same
network as Astro and Lanai.
Dial is a Sun-3. Is there something in a name? This could be the
telecommunications dial-in for the network. Maybe the same computer system has
a dialout attached to it. It might even be possible that "dial" has a guest
account for people logging in so that they can easily connect to other
computers on the same network (probably not).
Astro and Lanai are also Sun 3 computers. It isn't quite obvious what their
purpose is. Essentially, we have the impression that they were all purchased
about the same time (explaining the large number of Sun-3 computers in this
network) and it is quite possible they are just linked up to the Sun 4 in a
file sharing network. It is also possible they are older and fundamental to
the operation of Unisys's communication platform at this particular site.
There is one flaw that makes using the -h switch somewhat unreliable:
Sometimes people realize you can do this and take the time to remove or never
include the information about the individual machines on the network.
Therefore, it is always best for you to do a "ls <domain>" and check everything
out in case a computer has been removed. Using "telnet" to connect to the
computer is usually a foolproof method of finding out what computer it is they
are talking about.
> ls mcl.unisys.com
[[128.126.10.33]]
Host or domain name Internet address
mcl.Unisys.COM server = kauai.mcl.unisys.com 3600
kauai.mcl.unisys.com 128.126.180.2 3600
mcl.Unisys.COM server = burdvax.prc.unisys.com 3600
burdvax.prc.unisys.com 128.126.10.33 3600
mcl.Unisys.COM server = kronos.nisd.cam.unisys.com 3600
kronos.nisd.cam.unisys.com 128.170.2.8 3600
mcl.Unisys.COM 128.126.180.2 43200
maui.mcl.Unisys.COM 128.126.180.3 43200
cisco.mcl.Unisys.COM 128.126.180.10 43200
kauai.mcl.Unisys.COM 128.126.180.2 3600
voyager.mcl.Unisys.COM 128.126.180.37 43200
dial.mcl.Unisys.COM 128.126.180.36 43200
LOCALHOST.mcl.Unisys.COM 127.0.0.1 43200
astro.mcl.Unisys.COM 128.126.180.7 43200
hotrod.mcl.Unisys.COM 128.126.180.125 43200
oahu.mcl.Unisys.COM 128.126.180.1 43200
lanai.mcl.Unisys.COM 128.126.180.6 43200
mclean_is.mcl.Unisys.COM 128.126.180.9 43200
Well, running down the list, it appears that there aren't any more computers
important to this domain that we don't know already. LOCALHOST is just another
way of saying connect to where you are, so that isn't a big deal. Hotrod being
separate from the rest of the machines seems apparent since its IP address is
x.x.x.125, which is quite separate from the others. Even though this doesn't
have to be, it seems it is a wiring kludge -- probably for an office like I
surmised.
The next step? Go ahead and hack away! This is where all those system hacks
people trade on the net and all those CERT Advisories become useful. If you
become good hacking a single machine (Suns, for example), using nslookup will
help you identify those machines and make it easier for you to hack.
Looking for annex computers, libraries, guest machines, and other such
computers also becomes easy when you use nslookup, because the names and
computer types are there for your convenience. Checking on sites by selecting
interesting "special purpose" machines with nslookup first can yield good
results. People have called this "netrunning," and it sounds like as good a
name as any.
Of course, the other big problem when dealing with domain servers is trying to
identify them. The largest list of domain servers can be found off of the
Department of Defense Network Listing (usually called hosts.txt) which is
available almost everywhere on the Internet through anonymous FTP. Here is a
rundown on how to get the file:
[lycaeum][3]> ftp wuarchive.wustl.edu
220 wuarchive.wustl.edu FTP server (Version 6.24 Fri May 8 07:26:32 CDT 1992)
ready.
Remote host connected.
Username (wuarchive.wustl.edu:rack): anonymous
331 Guest login ok, send your complete e-mail address as password.
Password (wuarchive.wustl.edu:anonymous):
230- This is an experimental FTP server. If your FTP client crashes or
230- hangs shortly after login please try using a dash (-) as the first
230- character of your password. This will turn off the informational
230- messages that may be confusing your FTP client.
230-
230- This system may be used 24 hours a day, 7 days a week. The local
230- time is Wed Jun 3 20:43:23 1992.
230-
230-Please read the file README
230- it was last modified on Mon Mar 2 08:29:25 1992 - 93 days ago
230-Please read the file README.NFS
230- it was last modified on Thu Feb 20 13:15:32 1992 - 104 days ago
230 Guest login ok, access restrictions apply.
ftp> get /network_info/hosts.txt
200 PORT command successful.
150 Opening ASCII mode data connection for /network_info/hosts.txt (1088429 bytes).
226 Transfer complete.
Transferred 1109255 bytes in 182.95 seconds (6063.29 bytes/sec, 5.92 KB/s).
ftp> quit
221 Goodbye.
Now let's convert it to a file we can use effectively: let's take out of that
huge list of only the machines that are domain servers:
[lycaeum][4]> grep -i domain hosts.txt > domains
Okay, now that we have done that, let's prove that this is a way of finding a
domain server without connecting to anyplace. Let's just use the grep command
to search the file for a server in the mcl.unisys.com domain:
[lycaeum][5]> grep -i mcl.unisys.com domains
HOST : 128.126.180.2 : KAUAI.MCL.UNISYS.COM,MCL.UNISYS.COM : SUN-3/180 :
SUNOS : TCP/TELNET,TCP/FTP,TCP/SMTP,UDP/DOMAIN :
[lycaeum][6]>
And there you have another way. Everything we looked at is here: IP number,
the name, the "alias," the computer type, the operating system, and a brief
list of network protocols it supports, including the domain server attribute.
However, none of the other machines on the mcl.unisys.com network were
displayed. The DoD isn't a complete list of network machines, only the network
machines that are vital to the functioning of the Internet (in the last year,
this list has grown from about 350K to 1.1 megabytes -- and this only reflects
the "new" networks, not including the addition of new machines onto old
networks; the Internet is definitely "in;" I believe it was estimated 25%
growth per month!).
Obviously, this is very effective when going after university sites. It seems
they have too many machines to take good care of security on. Essentially, the
DoD list contains much the same information as NIC does, and is about a million
times more discreet. I'm not sure if NIC is fully logged, but it does have a
staff Head of Security (*snicker*).
Well, that will pretty much wrap it up for this file. Hope some of it was
useful for you.
_______________________________________________________________________________
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+