[ Pobierz całość w formacie PDF ]

auxiliary programs. Because I am supreme arbiter of what goes into these Guides, I get to decide what the
most important commands are. Hmm, "ten" sounds like a famous number. So you're going to get the:
Ten Meinel Hall of Fame Shell Account Exploration Tools
1) man
This magic command brings up the online Unix manual. Use it on each of the commands below, today!
Wonder what all the man command options are? Try the "man -k" option.
2) ls
Lists files. Jericho suggests "Get people in the habit of using "ls -alF". This will come into play down
the road for security-conscious users." You'll see a huge list of files that you can't see with the "ls"
command alone, and lots of details. If you see such a long list of files that they scroll off the terminal screen,
one way to solve the problem is to use "ls -alF|more."
3) pwd
Shows what directory you are in.
4) cd
Changes directories. Kewl directories to check out include /usr, /bin and /etc. For laughs, jericho suggests
exploring in /tmp.
5) more
This shows the contents of text files. Also you might be able to find "less" and "cat" which are similar
commands.
6) whereis
Think there might be a nifty program hidden somewhere? Maybe a game you love? This will find it for you.
Similar commands are "find" and "locate." Try them all for extra fun.
7) vi
An editing program. You'll need it to make your own files and when you start programming while in your
shell account. You can use it to write a really lurid file for people to read when they finger you. Or try
"emacs." It's another editing program and IMHO more fun than vi. Other editing programs you may find
include "ed" (an ancient editing program which I have used to write thousands of lines of Fortran 77 code),
"ex," "fmt," "gmacs," "gnuemacs," and "pico."
8) grep
Extracts information from files, especially useful for seeing what's in syslog and shell log files. Similar
commands are "egrep," "fgrep," and "look."
9) chmod
Change file permissions.
10) rm
Delete file. If you have this command you should also find "cp" for copy file, and "mv" for move file.
How to Tell Whether Your Shell Account Is any Good for Hacking
Alas, not all shell accounts are created equal. Your ISP may have decided to cripple your budding hacker
career by forbidding your access to important tools. But you absolutely must have access to the top ten
tools listed above. In addition, you will need tools to explore both your ISP's local area network (LAN) and
the Internet. So in the spirit of being Supreme Arbiter of Haxor Kewl, here are my:
Ten Meinel Hall of Fame LAN and Internet Exploration Tools
1) telnet
If your shell account won't let you telnet into any port you want either on its LAN or the Internet, you are
totally crippled as a hacker. Dump your ISP now!
2) who
Shows you who else is currently logged in on your ISP's LAN. Other good commands to explore the other
users on your LAN are "w," "rwho, " "users."
3) netstat
All sorts of statistics on your LAN, including all Internet connections. For real fun, try "netstat -r" to see the
kernel routing table. However, jericho warns "Be careful. I was teaching a friend the basics of summin g up a
Unix system and I told her to do that and 'ifconfig'. She was booted off the system
the next day for 'hacker suspicion' even though both are legitimate commands for users."
4) whois
Get lots of information on Internet hosts outside you LAN.
5) nslookup
Get a whole bunch more information on other Internet hosts.
6) dig
Even more info on other Internet hosts. Nslookup and dig are not redundant. Try to get a shell account that
lets you use both.
7) finger
Not only can you use finger inside your LAN. It will sometimes get you valuable informa>
------------------------------------------------------------------------
Transfer interrupted!
sts.
8) ping
Find out if a distant computer is alive and run diagnostic tests -- or just plain be a meanie and clobber people
with pings. (I strongly advise *against* using ping to annoy or harm others.)
9) traceroute
Kind of like ping with attitude. Maps Internet connections, reveals routers and boxes running firewalls.
10) ftp
Use it to upload and download files to and from other computers.
If you have all these tools, you're in great shape to begin your hacking career. Stay with your ISP. Treat it
well.
Once you get your shell account, you will probably want to supplement the "man" command with a good
Unix book . Jericho recommends _Unix in a Nutshell_ published by O'Reilly. "It is the ultimate Unix
command reference, and only costs 10 bucks. O'Reilly r00lz."
How to Keep from Losing Your Shell Account
So now you have a hacker's dream, an account on a powerful computer running Unix. How do you keep this
dream account? If you are a hacker, that is not so easy. The problem is that you have no right to keep that
account. You can be kicked off for suspicion of being a bad guy, or even if you become inconvenient, at the
whim of the owners.
Meinel Hall 'O Infamy
Top Five Ways to Get Kicked out of Your Shell Account
1) Abusing Your ISP
Let's say you are reading Bugtraq and you see some code for a new way to break into a computer. Panting
with excitement, you run emacs and paste in the code. You fix up the purposely crippled stuff someone put
in to keep total idiots from running it. You tweak it until it runs under your flavor of Unix. You compile and
run the program against your own ISP. It works! You are looking at that "#" prompt and jumping up and
down yelling "I got root! I got root!" You have lost your hacker virginity, you brilliant dude, you! Only,
next time you go to log in, your password doesn't work. You have been booted off your ISP. NEVER, NEVER
ABUSE YOUR ISP!
*********************************************************
You can go to jail warning: Of course, if you want to break into another computer, you must have the
permission of the owner. Otherwise you are breaking the law.
*********************************************************
2) Ping Abuse.
Another temptation is to use the powerful Internet connection of your shell account (usually a T1 or T3) to
ping the crap out of the people you don't like. This is especially common on Internet Relay Chat. Thinking of [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • g4p.htw.pl
  •