**************************************** Hacking ARPAnet -- Part II by The SOURCE of -=>*The Listening Post*<=- 408-923-7575 *************************************** LEARNING WHO's WHO ------------------ As mentioned earlier, ARPANET can be made to disclose a great deal of information before you have logged on or even hacked a password. Among the most useful commands are those that tell you who else is on the system and what the status of the system is. These files give you information that will help your future hacking activities. In this section we discuss commands that disclose data about users that are available from the EXEC level. @HELP WHOIS NICNAME (alias WHOIS) is a utility for cross-net access of the NIC user registration database. NICNAME has been chosen as the global name for the program, although many sites will choose to use the more familiar WHOIS name for the program. For the convenience of sites without user programs to interact with the NICNAME server, WHOIS may be run on the SRI-NIC machine via Telnet service without logging in. The documentation below is slightly inaccurate in this case, since there is no need to reach further through the net to access the database, as the user program and the database are both on SRI-NIC. The initial procedure is a one-reach, one-response query, which allows users at any Internet site to obtain information about an organization or individual by providing either a name or an IDENT. The protocol used is a TCP protocol. A server program running at SRI-NIC takes the user's request, accesses the NIC database and sends back the reply. The reply can be in one of three forms: 1) Record for individual or organization found, information (including name, ident, organization, mailing address and network address) is returned to user. 2) Given name matches more than one record. A short entry is returned for each matching record and the ueer is told to re-query the system using the ident to match any one iddividual or organization shown. 3) No record matched. If an ident was given, this response means that the ident is free for use by an individual or organization, and can be obtained for such by contacting NIC. Examples of use follow. For clarity, the user's typeing appears in uppercase: I. Request for help information. @WHOIS Ident: ? ; Accessing NICNAME server at SRI-NIC... Please enter a name or a handle ("ident"), such as "Smith" or "SRI-NIC". Starting with a period forces a name-only search; starting with exclamation point forces handle-only. Examples: Smith [looks for name or handle SMITH] !SRI-NIC [looks for handle SRI-NIC only] .Smith, John [looks for name JOHN SMITH only] Adding "..." to the argument will match anything from that point, e.g. "ZU..." will match ZUL, ZUM, etc. To search for all the authorized users of a host, use: %HOST To search for mailboxes, use one of these forms: Smith@ [looks for mailboxes with username SMITH] @Host [looks for mailboxes on HOST] Smith@Host [Looks for mailboxes with username SMITH on HOST] To have the ENTIRE membership list of a group or organization, if you are asking about a group or org, shown with the record, use an asterisk character "*" directly preceding the given argument. [CAUTION: If there are a lot of members this will take a long time!] You may of course use exclamation point and asterisk, or a period and asterisk together. II. Search by name only. @WHOIS .GRAY ; Accessing NICNAME server at SRI-NIC... There are 9 matching entries. Gray, Beth (BG10) BGRAY@UDEL-RELAY (202) 274-9446 (AV) 284-9446 Gray, Bobby R. (BRG) BRGray@RADC-MULTICS (315) 330-4846 (AV) 587-4846 Gray, Bruce (BG17) DRSEL-TCS-MCF@OFFICE-7 (201) 544-3671 (AV) 995-3671 Gray, Charles W. (CWG1) CWGray@RADC-MULTICS (315) 330-2116 (AV) 587-2116 Gray, Gilbert R. (GRG2) gray@NEMS (202) 227-1270 (AV) 287-1270 Gray, Neil (NG1) GRAY@SUMEX-AIM (415) 497-1712 Gray, Purnell (PG5) DRSTS-DS@OFFICE-1 (314) 263-3397 (AV) 693-3397 Gray, Randy K. (RKG) DRSEL-CP-RA@OFFICE-7 (201) 544-4733 Gray, Richard M. (RMG) WESTDIV@USC-ISI (707) 646-3514 To single out any one of these, repeat the command, using "IDENT" or "!IDENT" instead of "NAME" (e.g., "vw" or "!vw" instead of "white"). III. Search by name or ident specifying an ident. @WHOIS VW Accessing NICNAME server at SRI-NIC... White, Victor A. (VW) VIC@SRI-KL SRI International Network Information Center Telecommunications Sciences Center 333 Ravenswood Avenue Menlo Park, California 94025 Phone: (415) 859-5303 Send additions or changes to NIC@SRI-NIC IV. Search by name or handle specifying a name with an ellipsis. @WHOIS STEPH... Squires, Stephen L. (STEPH) SQUIRES@USC-ISI (202) 694-5917 Stephany, Michael (MS30) USARCCO@STL-HOST1 (620) 538-8285 (AV) 879-8285 (FTS) 769-8285 Stephen-Smith, Kay (SS2) STEPHENSMITH@SRI-KL (01) 681-1751 Stephens, Donald L. (DLS2) LAOFTHOOD@STL-HOST1 (AV) 737-6608 or 737-3103 Stephens, Eugene F. (EFS1) LAOFTPOLK@STL-HOST1 (AV) 863-4876 or 863-4888 Stephens, Nadine Y. (NYS) DSDC-SGY@GUNTER-ADAM (205) 279-4901 V. Search for mailboxes. @WHOIS MIKE@ Muuss, Michael John (MJM2) MIKE@BRL (301) 278-6678 or 278-6239 (FTS) 939-66 78 or 939-6239 Wahrman, Mike (MW19) mike@CCA-UNIX (703) 522-1717 Liveright, Mike (ML1) MIKE@KESTREL (415) 494-2233 Wahrman, Michael L. (MLW) mike@RAND-UNIX (213) 393-0411 Stonebraker, Michael R. (MRS) mike@UCB-VAX (415) 642-5799 or 642-3068 @WHOIS GPARK@DDN1 Parker, Glynn (GP) gpark@DDN1 Defense Communications Agency Code B627 Washington, D.C. 20305 Phone: (703) 285-5133 MILNET TAC user @WHOIS @MIT-ML Ressler, Andrew L. (ALR) ALR@MIT-ML (617) 253-3504 Kuipers, Benjamin (BK2) BEN@MIT-ML (617) 628-5000 ext 6650 Davies, Byron (BD5) BYRON@MIT-ML (617) 253-3507 . . (items omitted here for brevity) FINGER YOURSELF? ---------------- Let's try the command: @FINGER User Personal name Job Subsys Idle TTY Console location ??? 34 FINGER .106 Internet: SU-TAC#13 DOMAIN Domain Server 28 DSV *:** 102 Job 0, OPERATOR, SYSJOB FEINLER Jake Feinler 31 :BASE 30 EJ200 Jake Feinler x6287 HENRY Henry Chen 41 EXEC . Detached KLH Ken Harrenstien 26 EMACS 1 17 TSC MICOM 30 [P235] X-MAN Jeff Thompson 27 EXEC 12. 3 EK205 Operator Fishbowl x4664 35 EMACS 14 TSC MICOM 30 [P232] @HELP SYSTAT The SYSTAT command lists information about jobs logged into the system in order of job number, along with the date and time, how long the system has been up, the number of jobs logged in, and load average information. If the user is logged in from another host, the name of that host is given under the Foreign host heading. For example: @systat Tue 14-Aug-84 15:29:38 Up 45:40:40 20+13 Jobs Load av 1.70 1.33 1.43 Job Line Program User Foreign host 13 102 DSV DOMAIN 14 40 EXEC NAN 15 16 VOID KLH 16 DET EXEC HENRY 17 106 FTPSRT ANONYMOUS (SRI-KL) 18 54 TYPE OLE 19 3 EXEC SAPPHO 20* 51 SYSTAT STACIA 22 11 EXEC SAPPHO 25 60 MM OLE There are a number of arguments which can be given to the SYSTAT command. These can be listed by typing SYSTAT ?. These arguments include: . All Charge Class Controlling Directory Header In-Class Limit Line Lpt No Program State System Time What Where Who or user name or directory name or Decimal job umber or "," or confirm with carriage return combinations of arguments may be given: @sys stacia all header Tue 14-Aug-84 15:35:12 Up 45:46:14 20+13 Jobs Load av 3.37 2.67 2.02 Job CJB Line Program State Time Limit User, Foreign host 20* 51 SYSTAT RUN 0:09:35 STACIA, PS: @sys stacia all no directory Tue 14-Aug-84 15:35:44 Up 45:46:46 20+13 Jobs Load av 3.09 2.67 2.04 Job CJB Line Program State Time Limit User Foreign host 20* 51 SYSTAT RUN 0:09:37 STACIA The first listed all SYSTAT information about user STACIA. The second listed all of the information given before, without listing the connected directory. WHAT's AVAILABLE ON THE DDN --------------------------- @NIC TOP NIC/Query is a database system containing information about the Defense Data Network (DDN), including MILNET and ARPANET. Each list of topics is presented to the user as a numbered menu of selections. - To see more detail on any of the topics below, type its corresponding number followed by a carriage return, . - To leave NIC/Query, type 'quit'. - For more help and additional commands, type 'help'. 1. INTERNET PROTOCOLS -- Describes Internet protocols 2. PROGRAMS -- Describes programs available on DDN hosts 3. PERSONNEL -- Directory of DDN users 4. HOSTS -- Describes DDN hosts 5. RFCS -- Requests For Comments technical notes 6. IENS -- Internet Experiment Notes 7. NIC DOCUMENTS -- Documents available from the NIC _ for back, ^ for up, + for top, or menu # (1-7): QUIT LOGING OUT ----------- You haven't really loged in yet, and a quick way of loging out is to enter a "C" at the prompt or to simply unplug your phone. However, ARPANET's own files can be revealing: @HELP KK The LOGOUT command logs you off of the system and expunges all deleted files in your directory. Synonyms for LOGOUT include K and KK. You may also log out another job logged in on your account by specifying the job number after the LOGOUT command. In this case a message describing the job to be logged out is printed, and a confirming RETURN is required. If your job hangs, you might wish to log in at another terminal and then LOGOUT the other job, as described in the last paragraph. First find the other job number, as follows: @systat jsmith 27* 54 SYSTAT JSMITH 32 112 BASIC JSMITH The * indicates the job number of the job issuing the SYSTAT command. You will want to use the other job number -- 32 in this case: @logout 32 JSMITH, TTY112, BASIC [Confirm] and you confirm by pressing the RETURN key. MORE HELP --------- @HELP ATTACH ATTACH allows you to move a job to a different terminal or to return it to a terminal from detached status. To ATTACH, say @attach USERNAME Password: At the Password prompt, type in your password (which will not be echoed to the screen) and your job will be attached. If you have more than one job logged on to the system, you will need to supply a job number after your username. Finger yourself to find out this information. If you are attaching a job which is already attached to another terminal, you will be asked to confirm with carriage return before the Password prompt. (In Part III of Hacking ARPANET by The Source, some of the best information ARPANET will tell any "anonymous guest" once you leave the Exec.) Cracking ARPANET by The Source, some of the best information