Changes between Version 7 and Version 8 of computers


Ignore:
Timestamp:
2016-01-30 21:44:58 (8 years ago)
Author:
dky
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • computers

    v7 v8  
    99 
    1010Active HBC computers can be used to read employee emails and documents, revealing information both vital and of no consequence to the investigation. If the computer is locked, the [wiki:boot_drive boot drive] may be used to unlock it. After all, once a hacker has physical access to your machine, it's basically game over, man. 
     11 
     12== Hacking a *NIX Computer (Tentative) == 
     13 
     14A *NIX system is a Unix-like system, which means many Unix idioms, like {{{/etc/passwd}}} and {{{/etc/shadow}}}, are also available on *NIX OS. If you have physical access to the machine, it should be possible to perform the following actions (unless the drive is encrypted): 
     15 
     161. Reboot the computer and boot onto a [wiki:bootdrive portable disk drive]. 
     172. From the alternate boot partition, log in to that partition's OS and mount the computer's drive somewhere on your file system. 
     183. Add a new user entry to the {{{/etc/passwd}}} file on that drive, and add a hashed password entry to {{{/etc/shadow}}}. 
     194. Grant the new user {{{sudo}}} permissions in the sudoers file ({{{/etc/sudoers}}}). 
     205. Add {{{/home/}}} folders, etc. 
     216. Restart the computer and boot normally. 
     227. Log in using the username/password combination you added to {{{/etc/passwd}}} and {{{/etc/shadow}}}. 
     238. Use {{{sudo}}} or {{{su}}} to access the machine with root permissions. 
     24 
     25Presumably all or most of this is automated by the [wiki:bootdrive boot drive] that MT gives to the player, since the player is probably not all that tech-literate.