rrich
24th October 2015, 07:51 AM
We had purchased a network from an un-named supplier. (UNS) Included in the UNS network was the network control system. Our network control system used the identical software as the network control system of the UNS public network offering.
My job was network administrator and I had spent several weeks going through the computer code listing of our Network Control System. I was also required to attend class on how to program the network nodes. (Assembly language that utilized the IBM 360 RR, RXR and RS code set.)
About the second day of class ("File services on the Network Control System") we were assigned the task of copying files from one account to another. Then the instructor went to lunch. To accomplish the task, a priority level was needed by the copying user. No one in the class had the required priority level. We were using the live network control system of the public network.
I knew, from looking at the computer code listing of the network control system, the user names of the accounts authorized to raise a user's priority. I also knew the people associated with user names. I chose the user name "GOD" and used the persons initials from the company phone book as the password. I got in on the first try. Then I gave all the students in the class the necessary priority level to copy files from one account to another. Then I signed off.
On Tuesday or Wednesday of the week following our management held a meeting with all the students that had attended class. It seems that UNS had blew a gasket because someone in the class had logged into the GOD account on the live network control system for the public network. Our management didn't want to know but we were instructed to not do it again.
After the meeting I went into my director's office and explained the who, (me) the why (to complete the assignment) and how (intelligent computer hacking). After the why was disclosed my director is laughing. After the how was disclosed my director was laughing hysterically with tears in his eyes. My director told me to get out of his office and that this conversation never happened.
The following week, I heard all the UNS personnel complaining that they were required to change their passwords and follow a specific gibberish format.
My job was network administrator and I had spent several weeks going through the computer code listing of our Network Control System. I was also required to attend class on how to program the network nodes. (Assembly language that utilized the IBM 360 RR, RXR and RS code set.)
About the second day of class ("File services on the Network Control System") we were assigned the task of copying files from one account to another. Then the instructor went to lunch. To accomplish the task, a priority level was needed by the copying user. No one in the class had the required priority level. We were using the live network control system of the public network.
I knew, from looking at the computer code listing of the network control system, the user names of the accounts authorized to raise a user's priority. I also knew the people associated with user names. I chose the user name "GOD" and used the persons initials from the company phone book as the password. I got in on the first try. Then I gave all the students in the class the necessary priority level to copy files from one account to another. Then I signed off.
On Tuesday or Wednesday of the week following our management held a meeting with all the students that had attended class. It seems that UNS had blew a gasket because someone in the class had logged into the GOD account on the live network control system for the public network. Our management didn't want to know but we were instructed to not do it again.
After the meeting I went into my director's office and explained the who, (me) the why (to complete the assignment) and how (intelligent computer hacking). After the why was disclosed my director is laughing. After the how was disclosed my director was laughing hysterically with tears in his eyes. My director told me to get out of his office and that this conversation never happened.
The following week, I heard all the UNS personnel complaining that they were required to change their passwords and follow a specific gibberish format.