-
October 1st, 2005, 09:22 AM
#1
Junior Member
Can anyone make a crack or password finder for this(source including)?
Here is a program in visual basic with the source.Can anyone make a program that will recover any password from any file protected with that program???????????if someone do it please upload source with some explanation...
-
October 1st, 2005, 10:46 AM
#2
Why can't you?
If the source is there, then you should be able to understand how the password system works, so learn for yourself, I doubt anyone here will do it for you.
i2c
-
October 1st, 2005, 12:21 PM
#3
Are you talking about scanning over the source taking out the code or lines of code you need to create an API? And you using that API in your own programs to crack whatever?
if yes, why not build it yourself and find out.
-
October 2nd, 2005, 08:39 AM
#4
Junior Member
This is not my source!i just downloaded!i tried to understand what exactly does and i trie to crack it but i failed!
-
October 2nd, 2005, 09:54 AM
#5
Re: Can anyone make a crack or password finder for this(source including)?
Originally posted here by daemonarch
Here is a program in visual basic with the source.Can anyone make a program that will recover any password from any file protected with that program???????????if someone do it please upload source with some explanation...
why you request for another person, do performance? o encoding this source?
you see:
Private Sub ButtonExecute_Click()
Dim FileNum As Long, Details As ProtectionDetails_Type, Pass() As Byte
Dim Temp As String, Pos As Long, SaveAs As String, ExitRoutine As Boolean
Dim ExpirationDate As Date, ED As Byte, EM As Byte, EY As Integer
Dim FSO As Object
If TextFileName.Text = "" Then
LabelStatus.Caption = "Please select a file"
Exit Sub
End If
If TextTitle.Text = "" Then
LabelStatus.Caption = "Please enter a title"
Exit Sub
End If
If TextPassword.Text = "" Then
LabelStatus.Caption = "Please enter a password"
Exit Sub
End If
If CheckExpires.Value = 1 Then
On Error GoTo DateError::
ExpirationDate = CDate(TextExpires.Text)
On Error GoTo 0
ED = Day(ExpirationDate)
EM = Month(ExpirationDate)
EY = Year(ExpirationDate)
CopyMemory ByVal VarPtr(Details.ExpirationDate), ByVal VarPtr(ED), 1
CopyMemory ByVal VarPtr(Details.ExpirationDate) + 1, ByVal VarPtr(EM), 1
CopyMemory ByVal VarPtr(Details.ExpirationDate) + 2, ByVal VarPtr(EY), 2
End If
i don't understand really where is the "cracking" section
Function GeneratePasswordData(Password As String, Data() As Byte)
Data = StrConv(Password, vbFromUnicode)
End Function
last code and
Function DecryptDataFile(Data() As Byte, Password As String)
Dim Pass() As Byte
GeneratePasswordData Password, Pass
Shield.Encoder.DecodeData Data, Pass, True
End Function
No represent any complex encoder or decoder functions, you see
if i decide generate a cracker the first step is take a patrol cipher machine like this:
think in patrol we need a scheme for take the key points:
DWORD hash_ckeeper[_LOCKS_DISCARD][2] = {
0x1D6, 0x1e11,
0xFBD, 0x1e66,
0xFC3, 0x200b,
0xFCE, 0x1e79,
0xFD4, 0x2303,
0xFDA, 0x200a,
0xFE5, 0x2313,
0xFEB, 0x22d0,
0xFF1, 0x2000,
0xFFC, 0x22d1
};
second
a struct we needet for "move" and "make" points for offset
typedef struct {
int length;
bool encrypted;
DWORD offset;
bool code;
} _section; // a portion for flags
memory offsets: (for cracking victim stream [memory or phisical data])
[t853ut8h4iy73gt2]
:
:
[ouuyr84dlksjkjfdkd]
:
:
[sdfsdvfsdvdfbrfu48]
:
:
[3u8949yrytfwrjfoih]
:
:
[h8u8rnlweufh7reih]
:
:
[dlhfweyr47yrhiwujk]
third
decrypter for the low 3 bits stripped off
for (i=0; i<dwNumOfRealSections; i++)
{
if (section[i].encrypted)
{
for (int j=0; j<section[i].length-(section[i].length%0x8); j++)
{
*(BYTE*)((DWORD)pMappedFile+section[i].offset+j) ^= key[j%0x1000];
}
}
}
your code:
Function DecryptDataFile(Data() As Byte, Password As String)
Dim Pass() As Byte
GeneratePasswordData Password, Pass
Shield.Encoder.DecodeData Data, Pass, True
End Function
don't work and is too easy for cracking the lost key onto destination file
i recommend the last point for consideration if you decide make a cracker password, that point are fundamental and it's for begginning, most complex and serious codes include an memory inspector, check points for lost encrypted key on source and double crossing scanners.
Last consideration:
Function GetUniqueID(Data() As Byte) As String
Dim DataSize As Long, Mean As Single, SD As Single
Dim Totals1() As Long, Totals2() As Long, ByteOrder1 As Single, ByteOrder2 As Single
Dim TempMean As Single
Dim ByteFrequency(255) As Long, TotalByteValue As Long
Dim Pos As Long, Total As Long, Pos2 As Long
Dim UniqueIDData() As Byte
Dim OriginalSize As Long
OriginalSize = UBound(Data)
DataSize = OriginalSize + 1
For Pos = 0 To DataSize - 1
ByteFrequency(Data(Pos)) = ByteFrequency(Data(Pos)) + 1
TotalByteValue = TotalByteValue + Data(Pos)
TotalByteValue = TotalByteValue Mod 256 ^ 3
ByteFrequency(Data(Pos)) = ByteFrequency(Data(Pos)) Mod 256
Next
Mean = TotalByteValue / DataSize
For Pos = 0 To 255
Total = Total + ByteFrequency(Pos) * (Pos - Mean) ^ 2
.
.
.
.
what is the central ID?
i recommend too too too you read more for key generators ,cracking and anticracking (for scanners and brute force..) papers.
on this sites you find so much information about that and other stuffs:
tutos of http://www.antionline.com
tutos of http://www.phrack.org (the best)
and read more about C/C++ languaje VB is limmited.
Good Post
Saludos
-
October 2nd, 2005, 10:02 AM
#6
Im sorry to say but its just gonna take time to read over it and learn how it works and then work from there.
In the source code tehre is decode routines i assume, these are what you need to look at, the best way to start would be to imagine you were doing this project, how would you do it? sit down with a pen and a piece of paper and draw a flow chart of its operation. Then work backwards - at least you have the basic and you arent working from assembly, count yourself lucky
i2c
-
October 2nd, 2005, 10:18 AM
#7
Hi,
I'm with you ic2 and this person need read more about reverse engineering. VB is not the best way, and his routines for cryp and decryp are so poor.
i recomend for my past post and ic2 post for you
Saludos
AzRaEL [NuKE]
-
October 2nd, 2005, 11:55 AM
#8
Junior Member
i agree with the both of you. revese engineering is the best bet for you.
and dude, using someone else's crack is the most lame thing to do. i suggest you give it a hand urself. the basic rule of hacking is - "do it urself" - then only u get the pleasure of what u do.
phrack is gr8. www.antionline.com and www.securityfocus.com would also help you get on track. learn what u need to do first and then try to crack it urself. go on, check out the stuff and keep us updated on ur progress.
chill
-
October 2nd, 2005, 11:59 AM
#9
Junior Member
and i also suggest you dig your head deep into MSDN. it'll do u lots of good.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|