Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Proud to have compromised an 11/780 as an 18yo intern, by writing a trojan that perfectly emulated the VMS login service, leaving it running on an admin terminal after inventing some excuse to be in their office and to log in on a terminal there. Somewhere I still have the printout of sys$uaf with my account having "Change mode to kernel privilege".


Oh, we tried that.

Then I had to learn how to write memory resident keyloggers, and even that didn't help us catch the sysop password.

What did eventually help us cause a lot of trouble by mistakenly tearing down the entire school's Novell network and forcing them to rebuild from backups, was sneaking up behind the sysop while he was logging in and looking over his shoulder. I would have preferred one of the other solutions.

In return, the sysop used a similar technique to catch the guilty ones, by putting a PC speaker buzzer in his own login script and patiently waiting next door until we logged in to see the result.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: