======================================= =                                     = =            HACKING TOPS             = =                                     = =                 BY                  = =                                     = =      BLITZIOD ?? & GALACTUS **      = =                                     = =                 OF                  = =                                     = =       THE ELITE HACKERS GUILD       = =                                     = ======================================= ABOUT TOPS ----------  TOPS IS AN OPERATING SYSTEM FOR DEC- 20 AND DEC-10 COMPUTERS. TOPS IS SOME- THING OF A 'MEMORY HOG' AND EATS UP A LOT OF CORE. THE SYSTEM IS VERY USER FRIENDLY AND IS THUS GOOD FOR SCHOOLS BUT DUE TO ITS EXCESSIVE OCCUPATION OF MEMMORY IT IS NOT OFTEN USED BY BUIS- NESSES, WHO SEEM HAPPIER WITH RSTS (ANOTHER DEC OPERATING SYSTEM WHICH CAN SOON BE READ ABOUT IN MY UPCOMING PHILE: HACKING RSTS). RECOGNIZING A TOPS ------------------  THE TOPS IS ONE OF THE EASIEST SYS- TEMS TO RECOGNIZE, PARTLY BECAUSE OF ITS UNLIKELY PROMPT '@' BUT MOSTLY BE- CAUSE TOPS IDENTIFIES ITSELF QUITE OPENLY. A TYPICAL TOPS MIGHT LOOK LIKE THIS WHEN YOU FIRST CALL AND GET SYSTEM ATTENTION (WITH <RET> OR ^C): DEC-20/60 CAMPUS COMPUTER, TOPS-20 MONITOR 5.1(6101) @ LOGGING ON ----------  TO LOG ON TO A TOPS: 1. TYPE THE WORD 'LOGIN' OR JUST 'LOG' 2. A SPACE 3. A LOG-ON ID 4. A SPACE 5. YOUR PASSWORD THE LOG-ON ID CONSISTS OF THREE LETTERS THAT DESIGNATE A USER-GROUP, A PERIOD AND A USERNAME. EXAMPLE: ABC.GALACTUS THE PASSWORD DOES NOT ECHO BACK SO YOU WILL NOT SEE IT AS IT IS TYPED, IT CAN CONSIST OF AS MUCH AS EIGHT BYTES, HOWEVER IVE SEEN ONE MAJOR SCHOOLS SYSTEM THAT ONLY USED THREE. A VALID LOG-ON MIGHT LOOK LIKE THIS: @LOG ABC.GALACTUS JOB 13 ON TTY10 22-APR-87 13:18:19, LAST LOGIN 22-APR-87 13:06:40 @ WHAT YOU CAN DO ---------------  ONE OF THE WONDERFULL THINGS ABOUT TOPS IS THAT MOST TOPS WILL ALLOW YOU TO DO LOTS OF THINGS WITHOUT EVEN LOG- GING IN. MOST SYSTEMS WILL ALLOW YOU TO VIEW HELP FILES WITHOUT LOGGING IN. YOU CAN DO THIS BY TYPING HELP FOR OVER-ALL HELP, HELP ? FOR A LIST OF AVAILABLE HELP FILES. SOME OF THE BEST HELP FILES TO VIEW ARE HELP LOGIN AND HELP COMMANDS. OF COURCE THE SYNTAX IS @HELP <HELP FILE NAME>  ANOTHER IMPORTANT COMMAND THAT IS USUALLY AVAILABLE TO YOU IS 'SYSTAT' OR JUST 'SYS'. THIS COMMAND WILL GIVE YOU A LIST OF ALL USERS CURRENTLY ON THE SYSTEM, ALONG WITH THEIR TTY#, JOB#, AND LOGIN ID. A TYPICAL SYSTAT MIGHT LOOK LIKE THIS: @SYSTAT WED 22-APR-87 11:52:18  UP 2:56:28 16+5 JOBS   LOAD AV (CLASS 0)   3.86   3.29   3.38 JOB  LINE PROGRAM  USER   6    11  EDIT    AB.D809-LEX.LUTHOR     8    23  EXEC    NOT LOGGED IN  10     5  EDT     FG.U790-THE.CRACKER  11    42  EDIT    CS.H980-ALPHA.HACKER  12   113  ZORK    DS.F198-BIOC.AGENT  13   105  BASIC   CS.B788-LISA      15    13  EXEC    NOT LOGGED IN  16    10  BASIC   CR.D509-THE.WOZ  18    76  EDIT    PO.P567-STEVE.MNA  20    30  EXEC    PHY.B329-FATAL.ERROR      21    14  EDIT    CS.B606-BLITZIOD.??  22    16  EXEC    ME.B482-STRYKER  23     1  EXEC    CS.B720-LEFTY  24    61  EXEC    CS.B708-COSMOS  26*   22  SYSTAT  ABC.GALACTUS  27    15  EXEC    CS.B619-MIC.RIP.OFF  28   101  BASIC   CS.B601-WIZARD        30   115  SNOBOL  CS.B708-SILENT.REBEL  32   112  DEVY    MA.B278-CAPN.CRUNCH   1   205  PTYCON  OPERATOR   2   221  BATCON  OPERATOR   3   222  IBMSPL  OPERATOR   4   223  OPR     OPERATOR   5    54  JOBMON  OPERATOR @  ANOTHER GOOD COMMAND THAT MAY BE AV- AILABLE TO YOU IS THE 'WHO IS' OR JUST 'WHO' COMMAND. IT WILL GIVE YOU ADDED DETAILS ON A GIVEN USER AS REFERENCED BY JOB# TTY# OR LOGIN ID.  WHAT YOU WANT TO DO TO ACCESS A TOPS IS CALL UP AND DO SEVERAL SYSTAT'S IN HIGH USAGE PERIODS. YOU WANT TO GAIN   ABOUT 100 LOGIN ID'S IN THIS MANNER. THEN YOU NEED TO TYPE THEM UP INTO A FILE. NEXT CREATE A FILE OF LIKELY PASSWORD (THINK LIKE A USER... FOR INSTANCE... COLLAGE STUDENT PASSWORDS MIGHT BE NAMES OF POPULAR ROCK GROUPS) HELP LOGIN WILL USUALLY TELL YOU HOW MANY BYTES ARE IN THE PASSWORDS... MOST SYSTEMS I HAVE FOUND USE EIGHT. IN THAT CASE GOOD PASSWORDS MIGHT BE COMPUTER WARGAMES OR MADDONNA. ANYWAY CREATE A FILE OF ABOUT 100 OF THESE. THEN WRITE A PASSWORD HACKING PROGRAM THAT LOADS THEM INTO TWO ARRAYS AND TRIES ALL POSSIBLE COMBONATIONS. THIS IS 100 * 100 =10,000 ATTEMPTS. THIS IS BOUND TO GAIN YOU ACCESS. AFTER YOUR IN -------------  THE FOLLOWING IS AN EXPLANATION OF TOPS COMMANDS THAT YOU WILL BE ABLE TO ACCESS ONCE YOU ARE IN. (VARIOUS VER- SIONS OF TOPS DIFFER BUT THE FOLLOWING ARE COMMON COMMANDS THAT YOU WILL FIND USEFULL)                              ADVISE HELP     THE ADVISE COMMAND LINKS YOUR TERMINAL WITH ANOTHER USER'S TERMINAL     SO THAT YOU CAN GIVE COMMANDS TO THAT USER'S JOB.  THE ADVISEE  CAN     STILL GIVE COMMANDS  TO THE JOB.   [NOTE: FOR ADVISE  TO WORK,  THE     ADVISEE MUST HAVE ISSUED THE  RECEIVE ADVISE COMMAND.  THE LINK  IS     PREVENTED BY DEFAULT OR BY TYPING REFUSE ADVISE.]     THE GENERAL FORM OF THE COMMAND  IS        ADVISE USER     WHERE "USER" IS EITHER A USER NAME OR A TERMINAL LINE NUMBER.     WHILE THE ADVISE COMMAND IS IN EFFECT, THE COMMANDS YOU GIVE AFFECT     THE ADVISEE'S JOB  INSTEAD OF YOUR  OWN.  TO END  AN ADVISING  LINK     THAT YOU HAVE MADE BETWEEN  TERMINALS, YOU MUST TYPE CTRL-E,  WHICH     IS NOT ECHOED ON EITHER TERMINAL.     USE THE  CONTROL-^?   (CONTROL  UP-ARROW QUESTION  MARK)  FOR  HELP     DURING ADVISE.   FOR  MORE  INFORMATION, SEE  THE  TOPS-20  COMMAND     REFERENCE MANUAL AND THE RELATED TOPIC OF TALK. @                               TALK HELP     THE TALK COMMAND  LINKS YOUR TERMINAL  TO ANOTHER USER'S  TERMINAL.     TYPE 'TALK ARGUMENT' WHERE  "ARGUMENT" IS EITHER  A USER-NAME OR  A     TERMINAL'S LINE  NUMBER.  AS  SOON AS  YOU GIVE  A SUCCESSFUL  TALK     COMMAND, BOTH TERMINALS BEGIN PRINTING  BOTH USERS' TYPING AS  WELL     AS SYSTEM RESPONSES  TO THAT  INPUT.  EACH  JOB, HOWEVER,  RECEIVES     INPUT ONLY FROM ITS OWN TERMINAL.     MESSAGES SENT  BETWEEN TERMINALS  MAY  BE PRECEDED  BY ONE  OF  THE     FOLLOWING:       ;      TREAT ALL TEXT UP TO END OF LINE AS A MESSAGE.       !      TREAT ALL TEXT UP TO THE NEXT "!" (WHICH MUST BE ON THE SA ME              LINE) AS A MESSAGE.  THIS FEATURE ALLOWS YOU TO PUT A MESS AGE ON              THE SAME LINE AS A COMMAND.       REMARK REGARD ALL INPUT, UP TO A CTRL-Z, AS A MESSAGE, REGARDLESS OF              INPUT BY THE OTHER USER.     YOU CANNOT USE  TALK TO  CONTACT A USER  WHOSE TERMINAL  IS SET  TO     REFUSE LINKS.  TYPE CTRL-C, AND USE MAIL TO SEND MAIL INSTEAD.     FOR MORE INFORMATION, REFER TO THE TOPS-20 COMMAND REFERENCE MANUAL     OR THE DOCUMENT HLP:TALK.DOC.  RELATED HELP TOPICS REFUSE,  REMARK,     AND RECEIVE. @                              DEPOSIT HELP     THE DEPOSIT COMMAND CHANGES THE CONTENTS OF A MEMORY LOCATION.  THE     SYNTAX IS:        DEPOSIT LOCATION CONTENTS     WHERE "LOCATION"  IS THE  OCTAL ADDRESS  OF A  MEMORY LOCATION  AND     "CONTENTS" IS AN OCTAL NUMBER TO BE DEPOSITED AT THAT ADDRESS.     DEPOSIT CHANGES ONE  MEMORY LOCATION  AND LEAVES  YOUR TERMINAL  AT     TOPS-20 COMMAND LEVEL.     RELATED COMMANDS: DDT, EXAMINE,  FORK, SET PAGE-ACCESS.  SEE  ALSO:     "TOPS-20 COMMAND REFERENCE MANUAL". @                             DIRECTORY HELP     THE DIRECTORY  COMMAND LISTS  THE  NAMES OF  FILES IN  A  SPECIFIED     DIRECTORY.  ITS SYNTAX IS:        DIRECTORY <DIRECTORY>NAME.TYPE,        SUBCOMMAND     IF YOU OMIT <DIRECTORY>, YOUR DIRECTORY IS SEARCHED.  TO GIVE  MORE     THAN ONE  FILENAME, SEPARATE  THEM  WITH COMMAS.   IF YOU  GIVE  NO     FILENAMES, DIRECTORY WILL  LIST ALL  THE FILES  IN THAT  DIRECTORY.     YOU MAY USE WILDCARD CHARACTERS (*  AND %) WHEN TYPING FILE  NAMES.     IF YOU TYPE A COMMA AT THE  END OF THE LINE, JUST BEFORE YOU  PRESS     RETURN, YOU WILL BE PROMPTED (WITH @@) FOR SUBCOMMANDS.     FOR MORE INFORMATION, SEE THE TOPS-20 COMMAND REFERENCE MANUAL  AND     THE  RELATED   TOPICS   OF  FDIRECTORY,   TDIRECTORY,   VDIRECTORY,     SUBCOMMANDS, WILDCARDS, AND DOCUMENTS DIRECTORY-PROTECTION.DOC  AND     DIRECTORY-SUBCOMMANDS.DOC IN THE HELP DIRECTORY (LOGICAL HLP:). @                              EXAMINE HELP     EXAMINE DISPLAYS, IN OCTAL, THE CONTENTS OF A MEMORY LOCATION WHOSE     OCTAL ADDRESS YOU SPECIFY.  THE SYNTAX IS:        EXAMINE ADDRESS     THE CONTENTS  WILL  BE  DISPLAYED  AS  TWO  6-DIGIT  OCTAL  NUMBERS     SEPARATED BY A PAIR OF COMMAS  (,,).  THE TWO NUMBERS ARE THE  LEFT     AND RIGHT HALVES  OF THE 36-BIT  WORD.  IF THE  LEFT HALF IS  ZERO,     ONLY THE RIGHT HALF IS DISPLAYED, WITHOUT THE COMMAS.     RELATED COMMANDS: DDT, DEPOSIT.  SEE ALSO: HELP DDT, HELP  DEPOSIT,     "TOPS-20 COMMANDS REFERENCE MANUAL". @                              EXECUTE HELP     THE EXECUTE  COMMAND COMPILES  SPECIFIED FILES  (IF NEEDED),  LOADS     THEM INTO  MEMORY,  THEN  BEGINS EXECUTION  OF  THE  PROGRAM.   THE     COMMAND HAS THE FORM:        EXECUTE /SWITCH SOURCE/SWITCH OBJECT,...     WHERE SOURCE IS THE  NAME OF THE SOURCE  PROGRAM AND OBJECT IS  THE     NAME OF THE RELOCATABLE BINARY FILE.  IF "OBJECT" IS NOT SPECIFIED,     THE OBJECT FILE  WILL KEEP THE  NAME OF THE  SOURCE FILE WITH  FILE     TYPE  REL.   THE  FILENAMES  OF  THESE  FILES  ARE  RESTRICTED   TO     6-CHARACTER NAMES AND 3-CHARACTER TYPES.     IF SWITCHES  ARE PLACED  BEFORE ALL  FILES IN  THE COMMAND  (GLOBAL     SWITCHES), THEY ACT AS DEFAULTS FOR ALL; OTHERWISE THEY AFFECT ONLY     THE FILE WHOSE NAME IMMEDIATELY PRECEDES THE SWITCH.  FOR A LIST OF     AVAILABLE SWITCHES, SEE HLP:LOAD-CLASS-SWITCHES.DOC.     FOR MORE INFORMATION, SEE THE TOPS-20 COMMAND REFERENCE MANUAL  AND     THE RELATED TOPICS OF COMPILE, DEBUG, LOAD, AND RUN. @ IN ADDITION MOST STSTEMS HAVE AN E-MAIL SYSTEM OF SOME SORT AND VARIOUS LANGUAG- ES WHICH CAN BE ACCESSED SIMPLY BY TYPING THE LANGUAGE NAME, SUCH AS BASIC, FORTRAN, COBOL AND PASCAL SPECIAL FEATURES ---------------- '?' AS A PAREMATER LISTS ALL AVAILABLE PAREMATERS. ^C = BREAK KEY ^[ (ESCAPE KEY) = COMPLETES A COMMAND   AFTER THE FIRST 3 BYTES HAVE BEEN   ENTERRED. OTHER BLITZIOD ?? & GALACTUS ** AS OF APRIL 22 1987 1. USING DIVERTERS 2. HACKING THE HP2000 (PARTS 1-6) 3. HACKING THE HP3000 ====================================== =           END OF PHILE              = ======================================= Downloaded from P-80 Systems.....