|
* Dale Holmes news For all you people who have been wondering why the Digest hasn't come out for two weeks -- sorry, our fearless editor, Dale Holmes, has been busy with some health problems of his wife. She's only seven weeks away from her due date for delivering twins, which is not an easy job. Meanwhile, your Grand Pooh-bah, Carolyn Meinel, is expecting twin granddaughters this spring .. what is it about the Happy Hacker scene that is making all these twins happen?
* New, up-to-date web site! Check out http://www.happyhacker.org for archives of recent GTMHHs and Digests, and lots of great links and Wargame information. Not only have we finally revamped the Happy Hacker Web site, it's on a new server, fishbone.happyhacker.org. Our beloved fishbone is an OpenBSD box just like its predecessor zlliks.505.org. (OpenBSD is a form of Unix.) Because zlliks has performed so well in the hacker wars, it is soon going to work for our sponsor Rt66 Internet doing, let's just say, cool stuff.
* Wargame news! All you folks who wanted an easy to attack computer, where were you the last several weeks when we had a relatively vulnerable fishbone.happyhacker.org lurking on the Happy Hacker T1? Take heart, fishbone is still much more open that zlliks -- time to study the archives at http://www.rootshell.com and http://www.netspace.org/lsv-archive/bugtraq.html for exploits! For your best shot at taking over fishbone, install OpenBSD on your own computer (it runs on most varieties of computers). You can download OpenBSD for free at http://www.openbsd.com. Then try out whatever you plan to do to fishbone on your own computer first. That way, if something you try doesn't work, you can figure out what went wrong from your own OpenBSD box while logged in as root. Expert hackers say this is a much faster way to learn how to break in than attacking an uncooperating box like fishbone. Plus -- remember, to win the Wargame, you need to keep control after you break in. To make sure you know in advance how to fix whatever hole you use to get in, you need to practice on your own OpenBSD box first.
* How do you find out what Wargame computers are on the Happy Hacker LAN? Actually, soon after fishbone went up on the T1, I (Carolyn) was delighted to see a number of people already trying to break into it. That means some of you Wargame players are keeping track of what we have on the Happy Hacker LAN. For the rest of you, here's how to spot a new Wargame box.
1) The only way to break into one of our Wargame boxes is to use a Unix type computer for the attack. The best attack Unix is probably Linux. One reason for this is that the majority of the attack programs (exploits) you find at Rootshell etc. were written for Linux. So first install Linux and get on-line with it. OK, maybe you really need two or more computers to learn to be a great hacker, one to practice using for attacks, and the other being your defender computer.
2) To keep track of what is on our Wargame, use your Linux box (or a Unix shell account at an ISP of your choice) to give the nslookup command on a box you already know is in the game. For example:
~ > nslookup fishbone.happyhacker.org Server: chili.rt66.com Address: 198.59.162.6
Name: fishbone.happyhacker.org Address: 198.59.118.60
2) Now try nslookup on nearby IP addresses, for example: ~ > nslookup 198.59.118.61 Server: chili.rt66.com Address: 198.59.162.6
Name: unused61.happyhacker.org Address: 198.59.118.61
4) Wowie, is "unused61.happyhacker.org" a newbie box on the Wargame? Don't get all excited yet. The Wargame is run by the 505 gang, and they like to fool people. So the next step is to use the ping command see if there really is a computer named unused.happyhacker.org in the game:
~ > ping unused61.happyhacker.org ping: unknown host unused61.happyhacker.org
See, they were just faking you out. However, if there really is a computer at an address on our LAN, you will get:
~ > ping koan.happyhacker.org koan.happyhacker.org is alive
Or depending on your ping program, something similar, for example:
Pinging koan.happyhacker.org [198.59.118.51] with 32 bytes of data:
Reply from 198.59.118.51: bytes=32 time=149ms TTL=252 Reply from 198.59.118.51: bytes=32 time=141ms TTL=252 Reply from 198.59.118.51: bytes=32 time=126ms TTL=252 Reply from 198.59.118.51: bytes=32 time=129ms TTL=252
5) Now suppose you find a live computer while checking out nearby IP addresses. How do you know it is really in the game, instead of a computer that you can get into trouble for attacking? Nslookup comes to the rescue again:
~ > nslookup 198.59.118.62 Server: chili.rt66.com Address: 198.59.162.6
Name: knight.505.org Address: 198.59.118.62
Notice this is a 505.org box instead of a Happy Hacker computer. That means it isn't in the Wargame. Only computers with "happyhacker.org" in their name are OK to attack.
* Rules for fishbone.happyhacker.org OK, suppose you get root on fishbone. What can you get away with doing to her? Obviously, if you want to keep control, you'd better leave the Happy Hacker website there. We work on it in the home/cmeinel directory, which has a symbolic link to var/www/htdocs/ where the actual web page files reside. If you are good enough to take over fishbone, you'll be good enough to figure out how to put your own Web site up at http://fishbone.happyhacker.org while leaving it so requests for http://www.happyhacker.org go to var/www/htdocs/.
Other than that, the general Wargame rules apply, as posted at http://www.happyhacker.org/hwgstart.html. Most important, you can't use fishbone for any illegal activities. Also, our firewall, knight.505.org, will prevent you from making telnet or ftp connections to any computer outside the Wargame.
How do we enforce the rules? Ask anyone who has spent much time on koan.happyhacker.org. Hint: while on koan's guest account, give the command "man lart".
How do you get into koan.happyhacker.org's guest account? Hint: the password is really stupid. Even a stupid person can guess it. To see what the people who have broken into the guest account have to say, check out http://koan.happyhacker.org/~guest/. If you break in, you get to add your say to this Web page.
* How to break into koan.happyhacker.org? Koan is a FreeBSD box (a kind of Unix). Your first step in getting root on koan is to install FreeBSD on your own computer. You can download FreeBSD from http://www.freebsd.org. Then -- sorry, you won't find exploit programs for koan anywhere. You have to create your own! This is a tough box -- it has been up since mid-September and no one has rooted it! It will probably take a team effort to win the game. To meet others who are trying to root koan, go to the IRC channel #koan on Undernet.
If you really want fun, when you break into koan's guest account, try this: koan% who guest ttyp0 Nov 16 22:44 (208.250.172.216) guest ttyp3 Nov 16 22:56 (152.203.210.91) guest ttyp4 Nov 16 22:58 (shell.rt66.com) koan% w 10:59PM up 1 day, 7:39, 3 users, load averages: 0.27, 0.13, 0.05 USER TTY FROM LOGIN@ IDLE WHAT guest p0 1Cust216.tnt40.d 10:44PM - vi any-erect.c guest p3 203-210-91.ipt.a 10:56PM - -tcsh (tcsh) guest p4 shell.rt66.com 10:58PM - w
That tells you where the other players are and what they are doing. In this case, the fellow on "tty0" is using the vi editor to write a C program (vi any-erect.c). Since vi is a somewhat advanced editor program, we hope this fellow may know a thing or two. So.. you want to meet this guy, huh? Just give the command "talk tty0" and if he or she wants to talk with you, you will soon have a private conversation going.
* How are people doing on koan? Satori is doing a magnificent job maintaining root on koan.happyhcker.org. Normally, by allowing people easy access to a guest account, Satori should have quickly lost koan to someone else. There are many more ways to get root starting from inside a shell account than there are from outside a computer. However, as anyone who has played with the koan guest account has discovered, Satori has figured out many ways to keep control. Even so, one player did manage to at least get telnet going from the guest account. Cryptik (who ran the first Wargame computer cyrptotek.happyhacker.org) looked in the file usr/bin/telnet and saw:
-r-xr-xr-- 1 bin wheel 69632 Sep 17 15:08 telnet*
The last three spaces of that "-r-xr-xr--" means that people who are ordinary users such as "guest" could "r" (read) this file but not "x" (execute, which means run) the telnet program. Oh, yes, we know it is a program because of the asterisk after the word "telnet".
So Cryptik copied that file into the guest directory and got it to run and was telneting around our LAN -- until Satori caught him. Now that trick won't work any more. Satori, you are a tough man to try to beat!
* Big news is coming up soon with Happy Hacker. You may have been hearing rumors about Happy Hacker Grand Pooh-bah Carolyn Meinel (yes, me). Stay tuned for interesting revelations:):)
* The second edition of The Happy Hacker book was shipped from the printer (after much delay) Friday 13, 1998 -- a truly auspicious day! The second edition is a 400 pages, large format paperback book, up from 262 pages in the first edition. For more details see http://www.happyhacker.org/hhbook.html. What does the new cover look like? Beats me, I haven't seen it yet! The publisher says he wants to surprise me. Last time he surprised me by using a cartoon of me wearing a nose ring on the cover. Bletch, I *hate* nose rings. What did he do to me this time???? Hey, maybe this time you are on the cover!
OK, I, the Grand Pooh-bah, am signing off now. Happy hacking against fishbone and koan!
|