The PC Hacking FAQ
The PC Hacking FAQ
----------------------------------------------------------------
Written By Deep Thought
----------------------------------------------------------------
DISCLAIMER: The author of this text disclaims all liability
whatsoever regarding the use and/or misuse of the techniques
outlined here or any damages incurred directly or indirectly
thereof.
Table of Contents
-=-=-=-=-=-=-=-=-=-=-
X. Introduction
1. Hardware and Firmware
a. The BIOS
Passwords
Resetting the CMOS
b. Floppy Locks
Picking Them
Buying them
c. Last Resorts
Hard Disk Extraction
2. DOS, Windows, and Netware
a. Getting access to DOS
Boot from a floppy disk
Bypass startup files
Bypass DriveSpace
Break out of Autoexec.bat
b. Getting Past Windows
Screen Savers
Password Protection
DOS Using Write
DOS Using Word
DOS through MODE
c. Getting Past Netware
Common Account Names
Resetting Netware
3. Building a SECURE system
a. Understanding the Issues
Potential "Hackers"
Physical Security
Software Security
Passwords
----------------------------------------------------------------
X. Introduction
the PC. For example, you can't extract the hard disk or
organized file.
Have Phun,
Deep Thought
----------------------------------------------------------------
Passwords
=========
not purged from memory when you turn off the computer. It's
the machine.
If you can get access to the system after the password has been
entered, then there are numerous software-based BIOS password
ftp://oak.oakland.edu/simtel/msdos/sysutil/amis2990.zip
==================
There is only one other way to get past the BIOS password.
such a way that you can see and access the side of
back in.
b. If you have access to the circuit diagrams for the
CMOS.
10. Enter the Setup Screen, and set the Setup Information
BIOS setup.]
extractors available for free off the internet and on BBSes. Try those
----------------------------------------------------------------
to the inside of the drive and lock it, thereby preventing you from
using the floppy drive. The locks used are usually those little
into the little notch on the inside of the swivel lock. Now, pull to
the opposite side of the lock until the swivel is in the unlocked
position.
$0.75)
B. Buy the same brand of floppy lock, and use the key
----------------------------------------------------------------
use. The only way to access such disks is to enter the password,
you're hosed. :(
----------------------------------------------------------------
With some systems, they are set up to boot directly to some sort
C. Bypassing DriveSpace
You can do this using the DOS command FORMAT /S which will
format a disk and place system files on it. Also, the Windows
that the boot drive is the 1.2 MB floppy drive. If the computer
you can either find out by entering System Setup (as described
If the system is set to boot only from the hard disk, then you
Once you have a system disk, you place it in the floppy drive,
right, the computer will boot from the floppy drive and you will
versions of DOS 6.0 or better and Windows 95. When you turn on
or
or
Starting Windows 95 ...
Press and hold the SHIFT or F5 key IMMEDIATELY. This will bypass
text shows to enter the Boot menu. This lets you selectively
this will terminate it and drop you to DOS. This will work unless
----------------------------------------------------------------
by default gives you free access to DOS. There are special security
can be bypassed.
Screen Savers
=============
the Password field. Delete the junk that appears after the equal
sign.
Password Protection
===================
Q: Windows starts up, and you are presented with yet another
A:
**If this is the Primary Windows Logon or a Network logon, then you
can usually get past it by pressing the Cancel button (No Joke!).
the system, and thus will allow you close it. Windows 95 pops up
a neat little dialog box that lets you terminate any running
Q: Windows starts up, and program manager loads, but the File menu
DOS???
A: There are many Security programs for Windows (3.1 *AND* 95) that
do this, and other things. There are a few ways around them:
=================
2. Open C:\COMMAND.COM
5. Save it as C:\WINDOWS\WINHELP.EXE
================
================
When Windows 95 Shuts Down and shows that dumb graphic, it's
really just sitting on top of DOS. You can actually issue DOS
commands (although the graphic will cover them) on the system
after shutdown!!
CLS
If you want to get a nice, clean DOS prompt, you can type:
MODE CO80
16 color) mode.
----------------------------------------------------------------
====================
Novell Netware has the following default accounts: SUPERVISOR, GUEST,
and Netware 4.x has ADMIN and USER_TEMPLATE as well. All of these have
no password set. Only a dummy would leave the SUPERVISOR and ADMIN
Account Purpose
------- ---------------------------------------------------
LASER
HPLASER
PRINTER
LASERWRITER
GATE
FAXUSER
FAXWORKS
Resource Kit, Ch. 9 pg. 292 and Ch. 11 pg. 401 you
Resetting Netware
=================
But how can you make the server think it has just been installed
the disk? Simple. You just delete the files that contain the
security system!
In Netware 2.x, all security information is stored in two files
new Netware 4.x system stores all login names and passwords in five
and UNINSTAL.NDS [This last file may not be there, don't worry]).
Although Novell did a very good job encrypting passwords, they let all
directory information easy to find and change if you can access the
server's disk directly, using common utilities like Norton's Disk Edit.
to make these files vanish. All you need is a bootable DOS disk,
1. Boot the server and go to the DOS prompt. To do this, just let the
network boot normally and then use the DOWN and EXIT commands. This
procedure does not work on old Netware 2.x servers and in some
installations where DOS has been removed from memory. In those cases,
4. Select "Object" and then "Drive". At the window, select the C: drive
and make sure you check the button "physical drive". After that,
5. Select "Tools" and then "Find". Here, you'll enter the name of the
possible that you find these strings in a place that is not the
Netware directory. If the file names are not all near each other and
between them), then you it's not the place we are looking for. In
then "Find again". [In Netware 3.x, you can change all occurences of
6. You found the directory and you are ready to change it. Instead of
deleting the files, you'll be renaming them. This will avoid problems
with the directory structure (like lost FAT chains). Just type "OLD"
7. Select "Tools" and then "Find again". Since Netware store the
other copy and change it the same way. This will again prevent
8. Exit Norton Disk Edit and boot the server again. If you're running
9. Load Netware 4 install utility (just type LOAD INSTALL at the console
prompt) and select the options to install the Directory Services. You
be prompted for the Admin password while doing this. After that, you
may go to any station and log in as user Admin, using the password
----------------------------------------------------------------
Potential "Hackers"
===================
secure PC quite a bit. Truth be told, IBM didn't design the Personal
Computer with security in mind. Back in 1980, their main objective was
share.
to bridge this gap. These were quite popular, and were put into use
So, who are potential "Hackers"? The answer is: Anyone. Experienced
users especially, but even newbies sometimes find weak spots. This
deal with how to secure your system, both through physical and
software-based means.
Physical Security
=================
In the old days, back when computers filled multiple rooms, the
guards, etc. Now the emphasis has shifted away from physical security,
**If you want to prevent people from resetting your CMOS and
accessing the floppy drives, etc. you have to secure the system
leaving only the screen and keyboard accessible. There are many
products which let you extend the reach of screen and keyboard cables.
Even some that let you control many different computers using one
screen.
removable media system that lets you "hot-swap" and lock hard disks.
The hard disk could then be easily removed (with the *unique* key)
***Computer locks which bind your computer to a desk are good for
discouraging theft.
Anchor Pad, Lucasey, and others that completely enclose the PC.
These are devices such as lockdown pads, cables for monitors, and
metal boxes. There are also devices that cover and lock the floppy
Make sure that you test the computer immediately after these
***You can buy devices that prevent the PC electrical cord from
some insurance for your computer. It won't get your data back,
=======================
Below is a list of measures you can take to secure your system using
SWITCHES=/F /N
out of autoexec.bat
SWITCHES=/F /N
d. Add the line:
BREAK OFF
for write-protection.
FORMAT
DELTREE
SUBST
JOIN
BACKUP
RESTORE
ATTRIB
Passwords
=========
random page. With your eyes still closed, put your finger on a
random spot on this page. Remember the word, and do this again.
Combine the two words, and append a three-digit number to the end.
Also, NEVER write your password down. Always keep it in your head.
A simple Post-It note on your monitor can bring down all the
----------------------------------------------------------------