Berkeley CSUA MOTD:Entry 18746
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/07 [General] UID:1000 Activity:popular
4/7     

2000/7/21-22 [Computer/SW/Security] UID:18746 Activity:high
7/21    Is there a way to get root access given (unlimited) access to console
        on a sparc20 box with solaris 2.5.1? The pricks in IS&T are taking over
        a month to fix some things on my desktop machine and I really
        need to take care of several of them to get anything done, at risk
        of pissing off IS&T. Please withhold the "if you don't know how to
        do this, you shouldn't have root anyway" flames; i know how to fix
        what I want fixed, while not fucking up anything else.
              \_ Well, if the other things fail you could try:
                 <DEAD>phrack.infonexus.com/search.phtml?view&article=p53-9<DEAD>
                 I haven't done this, and don't know whether it will work with
                 your model+keyboard. --Galen
                 \_ Thank you kindly. This worked like a charm after
                    a few small corrections (s/1\@/@/g).
                    \_ How do you find the memory address of the process?
                       ps -lp gives me a ? for ADDR
                       \_ It didn't do that for me; make sure you're running
                          /usr/bin/ps though (/usr/ucb/ps, for one, has
                          entirely different flags). If that fails, poke
                          around in /proc/$$/, it's probably visible from
                          somewhere in there (try bytes 0x48-0x4B of
                          /proc/$$/psinfo). Make sure to check the current
                          contents of *(process_pointer)+0x18 first, and see
                          if it matches your current ruid (or risk clobbering
                          something random in memory)
        \_ Boot from CD. -tom
           \_ No CD drive (or floppy for that matter)
                \_It is likely that your box was installed over network and
                  the install server is still acting as boot/install server.
                  In this case you can boot of the network by typing "boot net"
                  from open boot prom. This is equivalent to booting from CD.
                  Of course, this wouldn't work if boot prom is password
                  protected. In this case you might need to swap the prom chip.
                  Though, if your box is also locked then you can't get root
                  without breaking things.
                \_ Borrow a cdrom - the CSUA has a sun-compatible one.
           \_ unless of course they set a prom password, in which case you're
              pretty hosed.
                \_ or swap in a prom.  Or swap in a disk with your favored
                   configuration.  With physical access it's always
                   possible.  -tom
                   \_ Mmm..physical access.. *drool*
        \_ They all say they know how to fix what they want fixed without
           fucking up anything else. Why don't you talk to their manager
           or have your manager talk to their manager? If it's truly
           preventing you from getting work done then it's a big deal and
                                       i'm an intern. it's not _/
           taking matters into your own hands will just mask a problem. Maybe
           IS&T is short-staffed and enough complaints will allow them to
           hire, for example. --dim
           \_ IS around here is absolutely hopeless. Trust me, this is the last
              resort.
              \_ Well, if the other things fail you could try:
                 <DEAD>phrack.infonexus.com/search.phtml?view&article=p53-9<DEAD>
                 I haven't done this, and don't know whether it will work with
                 your model+keyboard. --Galen
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/07 [General] UID:1000 Activity:popular
4/7     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/2/9-3/26 [Computer/SW/Security, Computer/SW/Unix] UID:54305 Activity:nil
2/9     Reminder: support for mail services has been deprecated for *several
        years*. Mail forwarding, specifically .forward mail forwarding, is
        officially supported and was never deprecated.
        \_ There is no .forward under ~root.  How do we mail root and how do
           we get responses?
           \_ root@csua.berkeley.edu is and always has been an alias.
	...