Updated - 4/1/92 to include XENIX systems
      
  The Hollow's Alliance * 415-236-2371 * MONDO h/ph/c g-files and discussion


     Here's our seventh, and like I promised a few issues back, a large list
of default passwords. This includes the HP-3000, Primos, Unix, VM/CMS, and
VMS systems. I would have liked to also made this a thorough file on
identifying systems, but that'll have to be another file, there are about 10
other systems I'd like to go over.

     This is in no-way a guide to hacking, just a list of defaults. I
compromised the extras to get this file out sooner. You should assume to use
the account name as password too for all defaults listed.

. ... and we're off!!

                            ___________________________
                           /...........................\
                          ( HP-3000 running MPE XL or V )
                           :::::::::::::::::::::::::::::
e.g. log-on

 : 
 EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.  (CIERR 1402)
 : hello mgr.intx3,pub
 ENTER ACCOUNT (INTX3) PASSWORD: intx3 
 ENTER ACCOUNT (INTX3) PASSWORD: hponly 
 ENTER ACCOUNT (INTX3) PASSWORD: manager 

 INCORRECT PASSWORD.  (CIERR 1441)


     As you can see, the account is made up of a USER.ACCOUNT,JOB ID so try
the following ones in every combination possible. The job id (e.g. pub) is
always optional.

USER names    ACCOUNT names   JOB IDs
~~~~~~~~~~    ~~~~~~~~~~~~~   ~~~~~~~
mgr           cognos          pub
manager       disc            sys
operator      hpoffice
field         hpword
              support
              sys
              system
              telesup
              xlserver

    Default accounts are almost always open, but in case you're asked for a
password, first try the user names, account names, and things common like:

hponly
manager
hp
mpe

Here are the most common default accounts:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
operator.cognos
mgr.hpword
field.hpword
manager.hpoffice
mgr.hpoffice
wp.hpoffice
spoolman.hpoffice
mailman.hpoffice
advmail.hpoffice
mail.hpoffice
field.support
operator.support
operator.sys
rsbcmon.sys
pcuser.sys
operator.system
operator.disc
mgr.xlserver
mgr.hpdesk
mgr.robelle
mgr.vesoft
manager.itf3000
sys.telesup
manager.security
mgr.conv
mgr.rje
mgr.hpp187
mgr.hpp189
mgr.hpp196
field.hpp187
mgr.intx3
mgr.carolian
manager.tch
mgr.word
                             ____________________
                            /....................\
                           ( Prime running PRIMOS )
                            ::::::::::::::::::::::

     When connected you might not get anything on the screen, type "login"
or "login " to be prompted. Try all User ids as passwords. It seems
that not many people have had luck hacking the Primos operating system.

e.g. log-on

 login
 User id? fam
 Password? fam 
 Invalid user id or password; please try again.

User ids       Passwords
~~~~~~~~       ~~~~~~~~~
mail
prime          prime/primos
primos_cs      prime/primos
primenet
mfd
fam (v.18 Primos and below)
system (v.18 Primos and below) system/prime
dos (v.18 Primos and below)
tele
netlink
test
guest
guest1         guest1/guest

                               ______
                              /......\
                             ( VM/CMS )
                              ::::::::

     You may not always see this standard VM/CMS logon screen, alot of systems
have a customized logon screen. But if it asks you to 'LOGON', then you usually
have a VM/CMS.

e.g. log-on

 VM/370 ONLINE--VM/3084--PRESS BREAK KEY TO BEGIN SESSION
 !

 Enter one of the following commands :

    LOGON userid                (Example : LOGON VMUSER1)
    DIAL userid                 (Example : DIAL VMUSER2)
    MSG userid message          (Example : MSG VMUSER2 GOOD MORNING)
    LOGOFF


 .LOGON EREP


Userids
~~~~~~~
 $ALLOC$
 TEMP
 TDISK
 CPNUC
 DIRECT
 SAVSYS
 SYSERR
 SYSCKP
 SYSWRM
 AUTOLOG1
 CMSBATCH
 CMSUSER
 EREP
 GCS
 IVPM1
 IVPM2
 MAINT         CPCMS
 OLTSEP
 OPERATNS
 OPERATOR
 SYSDUMP1
 TSAFVM
 OPERATOR
 SYSDUMP1
 TSAFVM
 VSEMAINT
 VSEIPO
 ROUTER
 AP2SVP
 APL2PP
 VMASSYS
 VMASMON
 VMASTEST
 BATCH
 BATCH1
 BATCH2
 CSPUSER
 CVIEW
 DIRMAINT
 DATAMOVE
 FSFCNTRL
 FSFTASK1
 FSFTASK2
 FSFADMIN
 IIPS
 ADMIN
 DISKACNT
 CPRM
 OP1
 VMUTIL
 IPFSERV
 ISPVM
 NETVIEW
 PRODBM
 PROMAIL
 PROCAL
 SYSADMIN
 SFCM1
 PSFMAINT
 PDM470
 PDMREMI
 PVM
 RSCS
 RSCSV2
 SMART
 SQLDBA
 SQLUSER
 VMARCH
 VMBACKUP
 VMBSYSAD
 DEMO1-4
 VMTAPE
 VMTLIBR
 VMMAP
 VTAM
 VM3812
 VSEMAN
 PENG
 MOESERV
 VTAMSUER
 CCC
 IDMSSE
 IDMS
                       ______________________________________
                      /......................................\
                     ( VAX running VMS: Virtual Memory System )
                      ::::::::::::::::::::::::::::::::::::::::

     You can sometimes identify a VMS by the beep you hear after connecting.

e.g. log-on

 Username: SYSTEST_CLIG
 Password: SYSTEST_CLIG 
 User authorization failure 
 Username: DEMO
  etc.. . .

Usernames     Passwords
~~~~~~~~~     ~~~~~~~~~
allin1
allin1mail
backup
dcl
dec
decmail
decnet
default         default/user
demo
field           field/service/test/digital
games
guest
help
helpdesk
host
info
ingres
link
mail
mailer
mbmanager
mbwatch
netcon
netmgr
netpriv
netserver
network
newingres
news
operator
opervax
pfmuser
postmaster
priv
report
rje
student
sys
sysmaint        sysmaint/service/digital
systest         systest/uetp
systest_clig
system          system/manager/operator/syslib
teledemo
test
uetp
user
userp
vax
vms


                                  ______
                                 /......\
                                (  UNIX  )
                                 ::::::::
e.g. log-on

login: root
password: root1234 
Login incorrect
login: somebody
password: ydobemos
Login incorrect
logi.. .etc.. . .

logins
~~~~~~
root
makefsys
mountfsys
umountfsys
checkfsys
lp
daemon
trouble
nuucp
uucp
bin
adm
sysadm
sys
rje
sync
tty
nobody
somebody
setup
powerdown
ingres
general
guest
gsa
user
games
help
public
unix
test
admin
student
standard
pub
field
demo
batch
visitor
w
listen
network
uuhelp
usenet
sysinfo
cron
console
sysbin
who



                               ___XENIX___

cron
bin
sysh
uucp
vib
rt1
adm
sys
sysa
uia
dos
vpix