I didn't see anyone explicitly mention "social engineering". IMO this may be an easier way to get a not-very-technical user's id, but then you are back to how to hack with a "normal" user TSO account. But if a system guy gave out a password for an reason then, well, you know.
What about digging through the trash? Dropping some USB sticks around with interesting programs on them? A few people mentioned some few months back how to get a program authorized from a non-authorized library (or something like that), but nobody gave any details. For sure no script kiddies should ever get in, and if they did they wouldn't know what to do. One thing I didn't see in this thread, was what is the purpose of this hacking. What is to be gained? Sensitive information would be one thing I can think of. Lindy ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html