[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: How to Hack Cyber Systems ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #17 | Release date : 1988-04-07 | Editor : Shooting Shark
Phrack XVII IntroductionShooting Shark
Dun & Bradstreet Report on AT&TElric of Imrryr
D&B Report on Pacific TelesisElric of Imrryr
Nitrogen-Trioxide ExplosiveSignal Substain
How to Hack Cyber SystemsGrey Sorcerer
How to Hack HP2000'sGrey Sorcerer
Accessing Government ComputersThe Sorceress
Dial-Back Modem SecurityElric of Imrryr
Data Tapping Made EasyElric of Imrryr
PWN17.1 Bust UpdateSir Francis Drake
PWN17.2 Illegal Hacker CrackdownThe $muggler
PWN17.3 Cracker are Cheating BellThe Sorceress
Title : How to Hack Cyber Systems
Author : Grey Sorcerer
                        % = % = % = % = % = % = % = %
                        =                           =
                        %   P h r a c k   X V I I   %
                        =                           =
                        % = % = % = % = % = % = % = %

                              Phrack  Seventeen
                                07 April 1988

                   File 5 of 12 : How to Hack Cyber Systems



How To Hack A CDC Cyber

By: ** Grey Sorcerer


Index:

1. General Hacking Tips
2. Fun with the card punch
3. Getting a new user number the easy way
4. Hacking with Telex and the CDC's batch design
5. Grabbing a copy of the whole System
6. Staying Rolled In with BREAK
7. Macro Library
8. RJE Status Checks
9. The Worm
10. The Checkpoint/Restart Method to a Better Validation


I'm going to go ahead and skip all the stuff that's in your CDC reference
manuals.. what's a local file and all that.  If you're at the point of being
ready to hack the system, you know all that; if not, you'll have to get up to
speed on it before a lot of this will make sense.  Seems to me too many "how
to hack" files are just short rewrites of the user manuals (which you should
get for any serious penetration attempt anyway, or you'll miss lots of
possibilities), without any tips on ways to hack the system.


General hacking tips:


Don't get caught.  Use remote dialups if possible and never never use any user
number you could be associated with.  Also never re-use a user number.
Remember your typical Cyber site has a zillion user numbers, and they can't
watch every one.  Hide in numbers.  And anytime things get "hot", lay off for
awhile.

Magtapes are great.  They hold about 60 Meg, a pile of data, and can hold even
more with the new drives.  You can hide a lot of stuff here offline, like
dumps of the system, etc., to peruse.  Buy a few top quality ones..  I like
Black Watch tapes my site sells to me the most, and put some innocuous crap on
the first few records..  data or a class program or whatever, then get to the
good stuff.  That way you'll pass a cursory check.  Remember a usual site has
THOUSANDS of tapes and cannot possibly be scanning every one; they haven't
time.

One thing about the Cybers -- they keep this audit trail called a "port log"
on all PPU and CPU accesses.  Normally, it's not looked at.  But just remember
that *everything* you do is being recorded if someone has the brains and the
determination (which ultimately is from you) to look for it.  So don't do
something stupid like doing real work on your user number, log off, log right
onto another, and dump the system.  They WILL know.

Leave No Tracks.

Also remember the first rule of bragging:  Your Friends Turn You In.

And the second rule:  If everyone learns the trick to increasing priority,
you'll all be back on the same level again, won't you?  And if you show just
two friends, count on this:  they'll both show two friends, who will show
four...

So enjoy the joke yourself and keep it that way.


Fun With The Card Punch


Yes, incredibly, CDC sites still use punch cards.  This is well in keeping
with CDC's overall approach to life ("It's the 1960's").

The first thing to do is empty the card punch's punchbin of all the little
punchlets, and throw them in someone's hair some rowdy night.  I guarantee the
little suckers will stay in their hair for six months, they are impossible to
get out.  Static or something makes them cling like lice.  Showers don't even
work.

The next thing to do is watch how your local installation handles punch card
decks.  Generally it works like this.  The operators love punchcard jobs
because they can give them ultra-low priority, and make the poor saps who use
them wait while the ops run their poster-maker or Star Trek job at high
priority.  So usually you feed in your punchcard deck, go to the printout
room, and a year later, out comes your printout.

Also, a lot of people generally get their decks fed in at once at the card
reader.

If you can, punch a card that's completely spaghetti -- all holes punched.
This has also been known to crash the cardreader PPU and down the system.  Ha,
ha.  It is also almost certain to jam the reader.  If you want to watch an
operator on his back trying to pick pieces of card out of the reader with
tweezers, here's your chance.

Next, the structure of a card deck job gives lots of possibilities for fun.
Generally it looks like this:

  JOB card:  the job name (first 4 characters)
  User Card:  Some user number and  password -- varies with site
EOR card: 7-8-9 are punched
  Your Batch job (typically, Compile This Fortran Program).  You know, FTN.
  LGO.  (means, run the Compiled Program)
EOR card: 7-8-9 are punched
  The Fortran program source code
EOR card: 7-8-9 are punched
  The Data for your Fortran program
EOF card: 6-7-8-9 are punched.  This indicates:  (end of deck)

This is extremely typical for your beginning Fortran class.

In a usual mainframe site, the punchdecks accumulate in a bin at the operator
desk.  Then, whenever he gets to it, the card reader operator takes about
fifty punchdecks, gathers them all together end to end, and runs them through.
Then he puts them back in the bin and goes back to his Penthouse.


GETTING A NEW USER NUMBER THE EASY WAY


Try this for laughs:  make your Batch job into:

  JOB card:  the job name (first 4 characters)
  User Card:  Some user number and  password -- varies with site
  EOR card:  7-8-9 are punched
  COPYEI INPUT,filename:  This copies everything following the EOR mark to the
                          filename in this account.
  EOR Card:  7-8-9 are punched.

Then DO NOT put an EOF card at the end of your job.

Big surprise for the job following yours:  his entire punch deck, with, of
course, his user number and password, will be copied to your account.  This is
because the last card in YOUR deck is the end-of-record, which indicates the
program's data is coming next, and that's the next person's punch deck, all
the way up to -his- EOF card.  The COPYEI will make sure to skip those pesky
record marks, too.

I think you can imagine the rest, it ain't hard.


Hacking With Telex

When CDC added timeshare to the punch-card batch-job designed Cyber machines,
they made two types of access to the system:  Batch and Telex.  Batch is a
punch-card deck, typically, and is run whenever the operator feels like it.
Inside the system, it is given ultra low priority and is squeezed in whenever.
It's a "batch" of things to do, with a start and end.

Telex is another matter.  It's the timeshare system, and supports up to, oh,
60 terminals.  Depends on the system; the more RAM, the more swapping area (if
you're lucky enough to have that), the more terminals can be supported before
the whole system becomes slug-like.

Telex is handled as a weird "batch" file where the system doesn't know how
much it'll have to do, or where it'll end, but executes commands as you type
them in.  A real kludge.

Because the people running on a CRT expect some sort of response, they're
given higher priority.  This leads to "Telex thrashing" on heavily loaded CDC
systems; only the Telex users get anywhere, and they sit and fight over the
machine's resources.

The poor dorks with the punch card decks never get into the machine, because
all the Telex users are getting the priority and the CPU.  (So DON'T use punch
cards.)

Another good tip:  if you are REQUIRED to use punch cards, then go type in
your program on a CRT, and drop it to the automatic punch.  Sure saves trying
to correct those typos on cards..

When you're running under Telex, you're part of one of several "jobs" inside
the system.  Generally there's "TELEX," something to run the line printer,
something to run the card reader, the mag tape drivers (named "MAGNET") and
maybe a few others floating around.  There's limited space inside a Cyber..
would you believe 128K 60-bit words?..  so there's a limited number of jobs
that can fit.  CDC put all their effort into "job scheduling" to make the best
of what they had.

You can issue a status command to see all jobs running; it's educational.

Anyway, the CDC machines were originally designed to run card jobs with lots
of magtape access.  You know, like IRS stuff.  So they never thought a job
could "interrupt," like pressing BREAK on a CRT, because card jobs can't.
This gives great possibilities.

Like:

Grabbing a Copy Of The System

For instance.  Go into BATCH mode from Telex,  and do a Fortran compile.
While in that, press BREAK.  You'll get a "Continue?" verification prompt.
Say no, you'd like to stop.

Now go list your local files.  Whups, there's a new BIG one there.  In fact,
it's a copy of the ENTIRE system you're running on -- PPU code, CPU code, ALL
compilers, the whole shebang!  Go examine this local file; you'll see the
whole bloody works there, mate, ready to play with.

Of course, you're set up to drop this to tape or disk at your leisure, right?

This works because the people at CDC never thought that a Fortran compile
could be interrupted, because they always thought it would be running off
cards.  So they left the System local to the job until the compile was done.
Interrupt the compile, it stays local.

Warning:  When you do ANYTHING a copy of your current batch process shows up
on the operator console.  Typically the operators are reading Penthouse and
don't care, and anyway the display flickers by so fast it's hard to see.  But
if you copy the whole system, it takes awhile, and they get a blow-by-blow
description of what's being copied.  ("Hey, why is this %^&$^ on terminal 29
copying the PPU code?") I got nailed once this way; I played dumb and they let
me go.  ("I thought it was a data file from my program").


Staying "Rolled In"

When the people at CDC designed the job scheduler, they made several "queues."
"Queues" are lines.

There's:

1. Input Queue.  Your job hasn't even gotten in yet.  It is standing outside,
                 on disk, waiting.
2. Executing Queue.  Your job is currently memory resident and is being
                 executed, although other jobs currently in memory are
                 competing for the machine as well.  At least you're in
                 memory.
3. Timed/Event Rollout Queue:  Your job is waiting for something, usually a
                 magtape.  Can also be waiting for a given time.  Yes, this
                 means you can put a delayed effect job into the system.  Ha,
                 ha.  You are on disk at this point.
4. Rollout Queue:  Your job is waiting its turn to execute.  You're out on
                 disk right now doing nothing.

Anyway, let's say you've got a big Pascal compile.  First, ALWAYS RUN FROM
TELEX (means, off a CRT).  Never use cards.  If you use cards you're
automatically going to be low man on the priority schedule, because the CPU
doesn't *have* to get back to you soon.  Who of us has time to waste?

Okay, do the compile.  Then do a STATUS on your job from another machine.
Typically you'll be left inside the CPU (EXECUTE) for 10 seconds, where you'll
share the actual CPU with about 10-16 other jobs.  Then you'll be rolled-out
(ROLLOUT), at which time you're phucked; you have to wait for your priority to
climb back up before it'll execute some more of your job.  This can take
several minutes on a deeply loaded system.

(All jobs have a given priority level, which usually increments every 10 sec
or so, until they start executing).

Okay, do this.  Press BREAK, then at the "Continue?" prompt, say yes.  What
happened?  Telex had to "roll your job in" to process the BREAK!  So you get
another free 10 seconds of CPU -- which can get a lot done.

If you sit and hit BREAK - Y <return> every 10 sec or so during a really big
job, you will just fly through it.  Of course, everyone else will be sitting
and staring at their screen, doing nothing, because you've got the computer.

If you're at a school with a Cyber, this is how to get your homework done at
high speed.


Macro Library

If you have a typical CDC site, they won't give you access to the "Macro
library."  This is a set of CPU calls to do various things -- open files, do
directory commands, and whatnot.  They will be too terrified of "some hacker."
Reality:  The dimbulbs in power don't want to give up ANY of their power to
ANYONE.  You can't really do that much more with the Macro library, which
gives assembly language access to the computer, than you can with batch
commands..  except what you do leaves lots less tracks.  They REALLY have to
dig to find out what your program did if you use Macro calls..  they have to
go to PPU port logs, which is needle in a haystack sort of stuff, vs. batch
file logs, which are real obvious.

Worry not.  Find someone at Arizona State or Minnesota U. that's cool, and get
them to send you a tape of the libraries.  You'll get all the code you can
stand to look at.  By the way they have a great poster tape...  just copy the
posters to the line printer.  Takes a long time to print them but it's worth
it.  (They have all the classic ones..  man on the moon, various playmates,
Spock, etc.  Some are 7 frames wide!).

With the Macro library, you can do many cool things.

The best is a demon scanner.  All CDC user numbers have controlled access for
other users to individual files -- either private, (no access to anyone else),
semiprivate (others can read it but a record is made), or public (anyone can
diddle your files, no record).  What you want is a program (fairly easy to do
in Fortran) that counts through user numbers, doing directory commands.  If it
finds anything, it checks for non semi-private (so no records are made), then
copies it to you.

You'll find the damnedest stuff, I guarantee it.  Try to watch some system
type signing in and get the digits of his user number, then scan variations
beginning with that user #.  For instance, if he's a SYS1234, then scan all
user #'s beginning with SYS (sysaaaa to sys9999).

Since it's all inside the Fortran program, the only record, other than
hard-to-examine PPU logs, is a "Run Fortran Program" ("LGO.") on the batch
dayfile.  If you're not giving the overworked system people reason to suspect
that commonplace, every-day student Fortran compile is anything out of the
ordinary, they will never bother to check -- the amount of data in PPU logs is
OVERWHELMING.

But you can get great stuff.

There's a whole cool library of Fortran-callable routines to do damned near
anything a batch command could do in the Minnesota library.  Time to get some
Minnesota friends -- like on UseNet.  They're real cooperative about sending
out tapes, etc.

Generally you'll find old files that some System Type  made public one day (so
a buddy could copy them) then forgot about.  I picked off all sorts of stuff
like this.  What's great is I just claimed my Fortran programs were hanging
into infinite loops -- this explained the multi-second CPU execution times.
Since there wasn't any readily available record of what I was up to, they
believed it.  Besides, how many idiot users really DO hang into loops?  Lots.
Hide in numbers.  I got Chess 4.2 this way -- a championship Chess program --
and lots of other stuff.  The whole games library, for instance, which was
blocked from access to mere users but not to sysfolk.

Again, they *can* track this down if you make yourself obnoxious (it's going
to be pretty obvious what you're doing if there's a CAT: SYSAAAA
CAT: SYSAAAB  CAT: SYSAAAC .. etc. on your PPU port log) so do this on someone
else's user number.


RJE Status Checks

Lots of stupid CDC installations..  well, that doesn't narrow the field much..
have Remote Job Entry stations.  Generally at universities they let some poor
student run these at low pay.

What's funny is these RJE's can do a status on the jobs in the system, and the
system screeches to a halt while the status is performed.  It gets top
priority.

So, if you want to incite a little rebellion, just sit at your RJE and do
status requests over and over.  The system will be even slower than usual.


The Worm

Warning:  This is pretty drastic.  It goes past mere self-defense in getting
enough priority to get your homework done, or a little harmless exploration
inside your system, to trying to drop the whole shebang.

It works, too.


You can submit batch jobs to the system, just as if you'd run them through the
punchcard reader, using the SUBMIT command.  You set up a data file, then do
SUBMIT datafile.  It runs separate from you.

Now, let's say we set up a datafile named WORM.  It's a batch file.  It looks
like this:

JOB
USER,blah (whatever -- a user number you want crucified)
GET,WORM; get a copy of WORM
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
SUBMIT,WORM.; send it to system
  (16 times)
(end of file)

Now, you SUBMIT WORM.  What happens?  Worm makes 16 copies of itself and
submits those.  Those in turn make 16 copies of themselves (now we're up to
256) and submit those.  Next pass is 4096.  Then 65536.  Then...

Now, if you're really good, you'll put on your "job card" a request for high
priority.  How?  Tell the system you need very little memory and very little
CPU time (which is true, Submit takes almost nothing at all).  The scheduler
"squeezes" in little jobs between all the big ones everyone loves to run, and
gives ultra-priority to really tiny jobs.

What happens is the system submits itself to death.  Sooner or later the input
queue overflows .. there's only so much space .. and the system falls apart.

This is a particularly gruesome thing to do to a system, because if the guy
at the console (count on it) tries the usual startup, there will still be
copies of WORM in the input queue.  First one of those gets loose, the system
drops again.  With any luck the system will go up and down for several hours
before someone with several connected brain cells arrives at the operator
console and coldstarts the system.

If you've got a whole room full of computer twits, all with their hair tied
behind them with a rubber band into a ponytail, busily running their Pascal
and "C" compiles, you're in for a good time.  One second they will all be
printing -- the printers will be going weep-weep across the paper.  Next
second, after you run, they will stop.  And they will stay stopped.  If you've
done it right they can't get even get a status.  Ha, ha.

The faster the CPU, the faster it will run itself into the ground.

CDC claims there is a limit on the number of jobs a user number can have in
the system.  As usual they blew it and this limit doesn't exist.  Anyway, it's
the input queue overflow that kills things, and you can get to the input queue
without the # of jobs validation check.

Bear in mind that *anything* in that batch file is going to get repeated ten
zillion times at the operator console as the little jobs fly by by the
thousands.  So be sure to include some charming messages, like:

job,blah
user,blah
* eat me!
get,worm
submit,worm .. etc.

There will now be thousands of little "eat me!"'s scrolling across the console
as fast as the console PPU can print them.

Generally at this point the operator will have his blood pressure really
spraying out his ears.

Rest assured they will move heaven and earth to find you.  This includes past
dayfiles, user logs, etc.  So be clean.  Remember, "Revenge is a dish best
served cold."  If you're mad at them, and they know it, wait a year or so,
until they are scratching their heads, wondering who hates them this much.

Also:  make sure you don't take down a really important job someone else is
doing, okay?  Like, no medical databases, and so forth.

Now, for a really deft touch, submit a timed/event job.  This "blocks" the job
for awhile, until a given time is reached.  Then, when you're far, far away,
with a great alibi, the job restarts, the system falls apart, and you're
clear.  If you do the timed/event rollout with a Fortran program macro call,
it won't even show up on the log.

(Remember that the System Folk will eventually realize, in their little minds,
what you've done.  It may take them a year or two though).


CHECKPOINT / RESTART

I've saved the best for last.

CDC's programmers supplied two utilities, called CheckPoint and Restart,
primarily because their computers kept crashing before they would finish
anything.  What Checkpoint does is make a COMPLETE copy of what you're doing -
all local files, all of memory, etc. -- into a file, usually on a magtape.
Then Restart "restarts" from that point.

So, when you're running a 12 hour computer job, you sprinkle checkpoints
throughout, and if the CDC drops, you can restart from your last CKP.  It's
like a tape backup of a hard disk.  This way, you only lose the work done on
your data between the last checkpoint and now, rather than the whole 12 hours.
Look, this is real important on jobs that take days -- check out your local
IRS for details..

Now what's damned funny is if you look closely at the file Checkpoint
generates, you will find a copy of your user validations, which tell
everything about you to the system, along with the user files, memory, etc.
You'll have to do a little digging in hex to find the numbers, but they'll
match up nicely with the display you of your user validations from that batch
command.

Now, let's say you CKP,that makes the CKP file.  Then run a little FORTRAN
program to edit the validations that are inside that CKP-generated file.  Then
you RESTART from it.  Congratulations.  You're a self made man.  You can do
whatever you want to do - set your priority level to top, grab the line
printer as your personal printer, kick other jobs off the system (it's more
subtle to set their priority to zilch so they never execute), etc. etc.
You're the operator.

This is really the time to be a CDC whiz and know all sorts of dark, devious
things to do.  I'd have a list of user numbers handy that have files you'd
like made public access, so you can go in and superzap them (then peruse them
later from other signons), and so forth.

There's some gotchas in here.. for instance, CKP must be run as part of a
batch file out of Telex.  But you can work around them now that you know the
people at CDC made RESTART alter your user validations.

It makes sense in a way.  If you're trying to restart a job you need the same
priority, memory, and access you had when trying to run it before.

Conclusion


There you have it, the secrets of hacking the Cyber.

They've come out of several years at a college with one CDC machine, which I
will identify as being somewhere East.  They worked when I left; while CDC may
have patched some of them, I doubt it.  They're not real fast on updates to
their operating system.


** Grey Sorcerer
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.