Telehack: May the Command Line Live Forever

GregTampa 4,163 views 26 slides May 17, 2016
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

Want to play a game? I bet I can root more boxes than you and stop you from gaining control. Telehack is a simulation of a stylized arpanet/usenet, circa 1985-1990. It is a full multi-user simulation, including 25,000 hosts and BBS’s the early net, thousands of files from the era, a collection of ...


Slide Content

Mobman & TELEHACK How about feel like a hacker decades ago, those who spent the day in front of a terminal with black and green letters, typing seemingly incomprehensible commands?

what is telehack |what use is it| Connect to over 24,000 simulated hosts, with logged-in ghost users with historically-accurate names culled from UUCP network maps. Hacking metagames , using simplified wardialers and rootkit tools. User classes that act as an achievements system. Group chat with relay, and one-on-one chat with send or talk. Reconstructed Usenet archives, including the Wiseman collection. A BASIC interpreter with historical programs from the SIMTEL archives. Standalone playable games, including Rogue and a Z-code interpreter for text adventure games like Adventure and Zork . Hidden hosts and programs, discoverable only by  hacking Telehack itself.

getting started

some simple commands

More Commands

Basic & Misc Files Filename Description bambi.exe The Adventures of BAMBI animation beer.exe Animation of a jug full with beer cartwhee.exe Animation of a stick-figure doing a cartwheel cartwheel.exe Animation of a stick-figure doing a cartwheel dont-wor.exe Animation of an individual getting shot at firework.exe Animation of a firework fireworks.exe Animation of a firework fishy2.exe Animation about Shamus, the fish glass.exe No information yet globe.exe Animation of the Earth spinning juanspla.exe No information available yet joshua.exe Animation of a text jumble.exe Animation of a text monkey.exe A monkey showing you both middle fingers nasa.exe Animation displaying the N.A.S.A. logo outerlim.exe Animation of a 'television set' being controlled paradise.exe Animation about a destruction of an island prey.exe Animation of a Klingon starship firing a torpedo snowing.exe Animation of Christmas holiday wishes startrek.exe An animation between the NCC-1701 A and D tetris.exe A character based Tetris game trek.exe Animation of the Enterprise taking revenge on the RCA ttest.exe VT100 torture test application turkey.exe Animation of a turkey entering and exiting an oven twilight.exe No information available yet valentin.exe A love message from Dave to Beth wineglas.exe Animation of a glass getting filled with wine xmas.exe Animation of a tree and a toy train

your computer hard drive memory etc

Exploring the Telehack network finger  - lists the registered users on the host finger  - lists information about the user finger @host  - lists the users of a particular host netstat  - lists the hosts with which you can connect ping  - checks if the host is active traceroute  - checks the route between you and the destination host Uupath Uumap uuplot

u upath | uumap

uuplot gets it’s own slide

how to connect to other servers Porthack rlogin Wardial Dial ftp telnet

Host ATT BSD Dynix HP-UX IBM MACH SunOS SysV Tel/ os Ultrix VMS Xenix

System tools Filename Description ftpd.exe TEL/OS FTP Daemon ghostports.exe Advertise Decoy Open Host Ports inspect.exe Remote TEL/OS Process Table Inspector iptun.exe L2TP over PPP Daemon killproc.exe Network process killer listuser.exe List Static Core for Any User netlog.exe Remote syslog notification osprober.exe Sniff Remote OS Vendor pdebug.exe Process debugger porthack.exe Probe for Exploitable  Host  Ports portblock.exe Block Open Port Host Access ptyhide.exe Cloaking Module for PTYCON Line 27 rootkit.exe Rootkit Exploit Launcher satan.exe Security Analyzer over Dial-up wardial.exe AC/Prefix Modem Dialing Prober xmodem.exe XMODEM/CRC support kit

Account Creation Exploits Filename Description aixacct.exe AIX Account Creation Exploit attacct.exe ATT Account Creation Exploit auxacct.exe AUX Account Creation Exploit bsdacct.exe BSD Account Creation Exploit dynixacct.exe Dynix Account Creation Exploit hp-uxacct.exe HP-UX Account Creation Exploit ibmacct.exe IBM Account Creation Exploit machacct.exe MACH Account Creation Exploit milacct.exe MIL Account Creation Exploit sunosacct.exe SunOS Account Creation Exploit sysvacct.exe SysV Account Creation Exploit ultrixacct.exe Ultrix Account Creation Exploit vmsacct.exe VMS Account Creation Exploit xenixacct.exe Xenix Account Creation Exploit

Rootkits Filename Description aixkit.exe Support Process for AIX Rootkit attkit.exe Support Process for ATT Rootkit auxkit.exe Support Process for AUX Rootkit bsdkit.exe Support Process for BSD Rootkit dynixkit.exe Support Process for Dynix Rootkit hp-uxkit.exe Support Process for HP-UX Rootkit ibmkit.exe Support Process for IBM Rootkit machkit.exe Support Process for MACH Rootkit milkit.exe Support Process for MIL Rootkit sunoskit.exe Support Process for SunOS Rootkit sysvkit.exe Support Process for SysV Rootkit ultrixkit.exe Support Process for Ultrix Rootkit vmskit.exe Support Process for VMS Rootkit xenixkit.exe Support Process for Xenix Rootkit

BADGES ACCT Registered User ACKNAK Flowing Bytes 2600HZ Captain Crunch BABYLON First Dynasty BRUTE May the FORCE be with you CBBS Ward & Randy CLONER Send in the Cloner CONSEC ConSec Inc DEPSECDEF Head of the Heads DTMF Wardial Access FOOL Folly or Wisdom HACK5 Hacked 5 network hosts HACK10 Hacked 10 network hosts HACK50 Hacked 50 network hosts HACK100 Hacked 100 network hosts HACKER Hack the Planet IOCOM Illuminati Online KGB Markus Hess KILROY Kilroy was Here KONAMI Konami Code LATENITE Go to sleep MITNICK Free Kevin MOON Tranquility NETIZEN Emily Postnews PERMUSER Permanent User PDEBUG Segmentation Fault PHREAK ATT Lineman PIONEER Go West POSTMASTER I read your e-mail PTYCON Invoked PTYCON REGUSER Regular User RETR Passive or Active RETUSER Returned User ROOT Got root? SEEDER Share it SYSADM User Table Hacked SYSMON System Monitor SYSWATCH /dev/ panopticon TURING AI Complete UNHALT Restarted the CPU XYZZY Get lamp

Root refers to the "root" account on Unix and Linux systems. It comes from the idea of directory "trees", the rootGot Root?  being the most basic level of the tree from which all other branches grow. A root user would have access to everything."Getting root" on a system refers to the act of getting admin access. Rootkits exist in real life, and often do more than just give the user root access. Many involve infesting malware into the system files. Real rootkits are srs bsns . (Actually, they are.) In Telehack , you must have and run two separate .exe files to get root on a server. These two files must be on the host's file library. The first is an operating-system-specific rootkit, also called a "support process". For example, aixkit.exe, sunoskit.exe, etc. The second is rootkit.exe which will work on all OSs. You must use both files to gain root. These files are placed, individually, on various servers throughout the telehack network. Some may even be on BBSs. They should be on the same servers for everyone, though this author has noticed some inconsistencies. After finding the .exes, you must download it, then transfer it to the host you wish to root. In order to get root, no one else can have root on a system. The OS must match your rootkit. First run the OS-specific rootkit. If it succeeds, then run rootkit.exe. Now you have root and can run more commands than most other people. 

BBS WTF IS IT? HISTORY Inside Telehack

In order to get root, no one else can have root on that server. If someone else has root, run ps and notice they have at least one process running. You must kill all their other processes (if there is only a support process running, you will be able to root the system with only rootkit.exe.), then the rootkit, to remove their root access. This is done by using kill process .exes that are hidden around the servers, just like the rootkits were. (this sentence should be pointed atKILLPROC.exe and PDEBUG.exe)

playing with egjor

tips and tricks settings up fast connections LOCK OUT USERS VARIOUS PROGRAMS CENTRAL KEY SERVERS

FUCK PETE I was banned because I took (4!!) roots from 2 top players and they didn't like the competition. Truthfully, I found the game to be fun and reminiscent.  I really wanted to play - but if my IP gets banned just because some players find me 'annoying' (read: competitive), then it's no longer a game..it's a clubhouse. I'd be happy to come back and play - in fact, I enjoyed playing very much - but I just thought I'd share the mentality with EVERYONE. ---relay chat--- (something from egroj about me taking some of his roots) grice : heh echo: he stole two of my roots, then egroj stole them from the twit echo: this new user, funnyman, pisses me off, to be honest... bigrice : do tell pete : three votes ..... (IP banned)

DEMO -- Questions Wanna play a game? Lets demo this shit!!! How long till I get banned??? BETS? Fuck you pete once again Incased you missed the first FU PETE