- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Genius.
Admin
Prevent people changing their own passwords? Would usually be a WTF in itself, but here... can't run the password changer, can't get that file. Possibly.
Admin
TRWTF are passwords
Admin
My friend and I got into trouble in the early eighties for unauthorized use of an admin account on the college mainframe.
He'd found out that punch card jobs, which were actually all that we as engineering students had ever been taught how to use, got processed in an environment with no access restrictions at all. And it didn't take terribly long to work out that the system's user account records were, as in this story, stored in plaintext.
He'd also found out that card processing was not limited to the FORTRAN compile-and-run jobs we'd been taught how to submit, but could also handle jobs written in the same scripting language we'd already taught ourselves how to use on the interactive terminals in the business wing.
If I recall correctly, neither of us had actually gone looking for that knowledge: it simply revealed itself spontaneously one day, after I'd submitted a card job whose end-of-job card had accidentally had a hole punched in the wrong spot, which happened to precede one of the sysadmin's jobs in the card hopper. And that truly was a genuine accident - I'd just fat-fingered one of the card punches.
Which was easy to do, because the only actual keypunch machine on the entire campus was behind the counter in the I/O Centre, for the sole use of the official keypunch operator. Keen engineering students wishing to punch their own cards had a choice between two kinds of manual punch.
There was one that looked like an oversized label making machine, with a big wheel on the side that you twisted around until the character you wanted appeared under the cursor and a big button at the front that you'd thump to punch the code for that character into the card. I hated those clumsy bloody things, and preferred to use the other kind: a very low-tech mechanism with twelve hole-punch keys - one per card row - and a column advance key.
EBCDIC is broken and wrong in all kinds of ways, but its encoding onto 80x12 punch cards is very straightforward.
Admin
TRWTF were non-operator interactive logins on either of those basically batch systems. More normal:
"Let them punch cards"
Admin
TRWTF is, and always will be, Discourse.
Admin
Face down, 9 edge first.
At UMass, in the 70s, we had a CDC 3600 and a 3800, then a CYBER 74. I worked at the UCC, repairing Teletypes. A side benefit was a free, unlimited, account on the mainframe. I did the required assembly language course on the CYBER. It was much more fun than a PDP-11, and I could write code in my dorm room, rather than having to sign up for early morning slots on the PDP-11.
Ahh...the good old days, when computers had switches and lights.
Admin
Admin
Control Data's NOS/BE had a password file, for INTERCOM, it was a plain text file, protected by four levels of password.
But if you knew the password, you were able to find someone who had the Software bit set (system administration), and with their credentials, the mainframe was your oyster.
Control Data used to provide the ENTIRE source code for NOS/BE, including the password change program, which loaded up the password file. Inside the source code was the hard-coded password. :-) icomblstz ... and three other passwords.
I didn't need the file, I had admin access, but it was useful knowledge at the time. Dead operating systems are pretty useless now though, so I'm not too reticent to chuck out this little bit of 'secret' knowledge.
For me, being back working on the guts of NOS/BE, was the highlight of my 32 year career. I never had more eye-opening experiences, nor met cleverer people than I was working with back in the mid 1980's. Absolute geniuses.
Admin
4K is actually ample for encryption. I develop full medical devices in 20K.
Admin
And for the sheer fun of it you could write a short assembly program, convert it to machine language by hand, and thumb it in via the switches. Not that you'd want to do this very often, but when you did - and it worked - you knew that you understood how the thing worked.
The first time I sat in front of a PC it really bugged me that there were no lights so I could tell what the heck it was doing.
Admin
I worked in a similar environment as the article mentions in the early 90s, similar enough it might just have been the same place. However we found out a much easier way when we needed access to the big gray and red machines: most of the professors/researchers used their login as their password....
Admin
I'm just going to leave this here:
http://thedailywtf.com/Comments/WTF-Inc-Epilogue--From-the-Other-Side.aspx?pg=2#419918
Admin
This was the first snoofle story that didn't grate on me. Good job!
However, I am not sure that we can really laugh at things people did in ancient computing. It's like engineers laughing at the designer of the Tower of Pisa or the Tacoma Narrows bridge.
Admin
To all of this I say: so what?
That was back when it was pretty much a massive success to get computer hardware and OS to function reliably. Security wasn't perfect, nor was it anywhere near the problem we have today. Most computers were both air-gapped and meat-sack-gapped, and people were more or less expected not to be assholes. Heck, I found a similar "non-protected read area" bug while learning FORTRAN on a multiuser PDP-8 in the early 70s. Yeah, it was funny to read excerpts of the college bursar's finance reports, but to me the real lesson was to write better code so I only retrieved data from the place (or size) I'd written to.
Admin
Ah, yes, CDC 6000 series. Back in the day I actually figured out a way to patch a running PPU program and was able to do whatever I wanted -- all the system authentication happening in the PPUs. Of course, I just figured it all out for the challenge of doing it, I never used it for anything malevolent. Part of the fun was creating a COMPASS macro set to write PPU code.
Admin
If this was really pre-ethernet, would we really expect them to be encrypting passwords? Ethernet was 1980 and I don't believe the idea of storing passwords in a hashed form even existed until the mid-70s. Modern cryptography was in its infancy in the 70s.
Admin
My first professional job (early 80s) was writing machine code programs for an 8085 which required that I type the hex codes into an EPROM programmer. Happy days.
Admin
Over where I was a student, we used a system that required username and password cards. Which meant that some careless folks tossed them along with the rest of their decks when they were done. I spent many an hour playing games on accounts pulled from the trash bin.
They had also forgotten to protect the card reader. Some of the lab assistants had a little game going about who had the shortest program to snag a deck from the reader. It all ended when I discovered that you could just $TYPE CRA0: and get the next deck, username and password and all, displayed at your terminal.
Admin
You sound a lot like my college roommate from my freshman year, though wrong timeframe as this was the mid-1970s. He never was intentionally malicious, but would find ways access everything on our University's CDC 6400. Snagging himself a copy of one of the system tapes landed him a suspension. "but if you didn't want us to access it, you'd set the permissions accordingly" was his plea and it did seem to get him reinstated eventually. I've always wondered if he's now a black hat or a white hat.
Admin
did you neighbors catch you when you wonder in their houses, when they forgot to lock doors?
Admin
We had a couple of students at college who noticed that the job numbers on the main frame were all 4 digits long.
In the week preceeding April 1, they created 10,000 decks of jcl jobs that would not execute until some procedure was loaded in the future. Obviously, they wanted to see what happened when they used up every possible 4 digit job number.
I had a small part in the prank. They were going to just duplicate the same job card 10,000 times but I pointed out that every job would have the same identical user assigned id that would likely make it easy for the mainframe operators to identify and delete the offending jobs. So I wrote a little program for them that generated 10,000 job cards with random ids.
In the early evening of April 1 -- I think it was a Sunday evening -- they started running the decks through the card reader. It was painfully slow because the card reader would pause after reading the job card and password while it checked the account number and password to validate the job.
All went well until they had read in about 1,500 jobs. The card reader stopped reading. After about an hour and a half, it started back up again with those 1,500 jobs gone. It was kind of anticlimatic.
Admin
Seriously. The place I work at we all know eachother and we can trust eachother. Nobody has passwords and nothing goes wrong. You just need better friends.
Admin
The age of the dinosaurs was after this foobard story
Admin
Admin
Shirley the password for a file called VALIJUN would be 24601?
Admin
Admin
Or Wolverine.
Admin
Yeah this made me raise an eyebrow (which is more physical exercise than I like to get in a day). Especially during those days when programmers were generally used to working in tiny memory, 4 kB would've gone a long way.
Admin
We had a couple of students at college who noticed that the job numbers on the main frame were all 4 digits long.
First place I worked had a telephone system that required you to enter a 5 digit code for an outside line. We had some number of thousand people in the facilty. I did the math, tried 100 sequential numbers and found one that worked.
Admin
Shall we list those ways?
Hmmm...they forgot the KS (Kitchen Sink) character. Maybe EBCDIC is TRWTF?
Admin
Lol.
Admin
Can I post? I just got some errors...
Admin
According to wiki (http://en.wikipedia.org/wiki/Password#History_of_passwords) early 70s.
It's plausible to me that the very first versions of Unix didn't hash passwords.
Admin
The staff had a slightly different username formation, but it didn't take long to figure out that their initial passwords were all "staff", and pupils amused themselves by sending WinPopup messages from staff accounts to their friends.
Guess what the headmaster's password was?
Admin
Back in high-school, Windows 95/98 had a feature where username.pwl files were left behind from anyone who logged on, each containing saved network credentials, like a sort of keyring. The files were rather-weakly encrypted with the user's primary logon password.
This meant that you could easily do an offline brute-force attack of any user who had previously sat down to the same computer, including, say, the teachers in the computer lab...
Admin
reminds me of a story in a book: an old program called "sendmail" had a bug that allowed it to send "messages" anywhere-including restricted system folders! so if you knew where the user profiles were stored, you could easily "mail" a fake profile, with admin privileges, into the system. the makers of "sendmail" released a patch to fix this, but lots of lazy or sloppy admins simply didn't get around to applying it...
Admin
Back at University we had a Burroughs system for the old computer labs. I think it was something like a mainframe which had several minicomputers hooked to it which had all of the terminals the students used hooked to them. Anyway, for some reason the usernames and passwords were stored in plain text file on the server. I was told there was one student who used to come in each weekend, crack the system to get at the file, print it out, hand it to the front desk workers in the computer building then go home. Each week they'd block whatever loophole he used to get it and the following weekend he'd do it again.
I also heard on one student who somehow got root access on the Sun Unix system they used in a different building. He wasn't actually trying to crack the system and he just poked around a bit then logged out. The Sysadmin noticed the intrusion though and noted the user ID of the student. He grabbed him the next time he logged into the system. I believe he just got a warning since he didn't actually do anything malicious.