This document is a "Beginners Guide to VAX/VMS Hacking" by "ENTITY / Corrupt Computing Canada," aiming to introduce fundamental concepts and techniques for exploiting VAX/VMS operating systems.
The guide covers:
Initial Access:
System Navigation and Information Gathering:
$set, $show, $type, $dir).Exploitation Techniques:
LOGIN.COM or executing a custom file using special username qualifiers (/nocomm, /comm=file).SPAWN after a remote connection prompt.$show proc/priv) and attempt to gain all privileges ($set proc/priv=all) if the account is a SYSTEM one. Discusses important privileges like CMKRNL, SETPRV, READALL, SYSPRV, and BYPASS. (Notes that gaining all privileges typically requires advanced kernel programming, which is intentionally not fully detailed to prevent abuse).$show accounting, $show audit) and intrusion records ($show intrusion) to assess system manager vigilance.type sys$system:rightslist.dat, dump sys$system:rightslist.dat, mc psiauthorize, and using AUTHORIZE to access SYSUAF.DAT. Suggests trying default username=password for any discovered users.$show net), copying files (like rightslist.dat) from remote systems, finding user/password information in logical names, connecting to remote hosts ($set host), obtaining DATAPAC/TELENET addresses, and dialing out via modems ($set host/dte). Includes methods to turn off logging for remote sessions.SYSUAF.DAT, AUTHORIZE.EXE) when a privileged user executes a common system COM file (like NOTES.COM or ADDUSER.COM). Emphasizes the importance of covering tracks.AUTHORIZE program (requires SYSPRV or SETPRV) to add new users or modify existing ones, with an emphasis on making changes inconspicuous.Maintaining Undetected Access:
SYMBIONT_xxxx) and includes a stealth.mar assembler program to change process type.$show user, $show system) and files they access ($show devices/files/nosystem), and using the powerful System Dump Analyzer (SDA) to examine system memory (requires CMKRNL privilege).DCL Programming Basics:
WATCHDOG.COM) and assembly (STEALTH.MAR) programs.Resources: Recommendations for external manuals (e.g., "VAX/VMS INTERNALS AND DATA STRUCTURES") and unconventional methods for acquiring them.
The document concludes with a list of DCL commands categorized by function. It serves as a practical, albeit ethically questionable, guide for beginners to explore and exploit VAX/VMS systems.
Site structure and layout ©2025 Majenko Technologies