599 lines
28 KiB
Plaintext
599 lines
28 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Rel 2<>5
|
|||
|
<20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><> <20><><EFBFBD> <20><> <20><> <20><> <20><> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD>
|
|||
|
|
|||
|
Code and Idea by Saruman / DFR Engineering
|
|||
|
|
|||
|
P U B L I C B E T A R E L E A S E ( aka BETA-5 )
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Contents
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The WHAT? WHY? and HOWs?
|
|||
|
|
|||
|
Silly Documentation
|
|||
|
|
|||
|
Hardcore "Auto"[2] Hacking
|
|||
|
|
|||
|
Advanced Usage
|
|||
|
|
|||
|
THIS CRAPPY PIECE OF SHIT ISN'T WORKING!
|
|||
|
|
|||
|
Contact Me
|
|||
|
|
|||
|
Credits
|
|||
|
|
|||
|
History
|
|||
|
|
|||
|
The Concept of Freeware / Copyright Notice
|
|||
|
|
|||
|
Footnotes
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(=[ The WHAT?, WHY? and HOWs? ]============================================)
|
|||
|
|
|||
|
WHAT? ... RAHacker[1] is a program to attack CRC32 codes. CRC32 is a
|
|||
|
Cyclic Redundancy Code, once calculated it's IRREVERSIBLE! CRC32
|
|||
|
is usually used by communication protocols and archivers to detect
|
|||
|
errors in a bit stream, but it's also used by varius software as a
|
|||
|
method of storing passwords.
|
|||
|
|
|||
|
WHY? .... RAHacker can be looked upon as a tool to play with and as a
|
|||
|
laboratory to learn about CRCs. You can use it to test your own
|
|||
|
passwords, are thay safe from lexicon hacking? For how long can they
|
|||
|
withstand a brute-force attack? You will see that a badly choosen
|
|||
|
password can be breached in seconds, while a good password may survive
|
|||
|
even the most intent hacker[1]. I said 'may', because a password stored
|
|||
|
as a CRC32 checksum is reduced from any length down to just four bytes
|
|||
|
(characters), and as you may gather from that: - many passwords
|
|||
|
have the same CRC! - this is important, because if you choose a password
|
|||
|
of 20 characters, it may have an equalient in just five characters, and
|
|||
|
thus can be easily cracked.
|
|||
|
|
|||
|
HOW? ..... RAHacker is stupid! I cannot describe the program in any
|
|||
|
other way. As there is no way to 'reverse engineer' a password since
|
|||
|
it has been encoded you must go the other way around. We call it
|
|||
|
Brute Force - cause that's exactly what it's all about. With enough
|
|||
|
computing power and patience ANY CRC32 encoded password WILL fall,
|
|||
|
and in your hands you have [to my knowledge] the best tool on the
|
|||
|
market to do it. Okey, so I'm not NSA, I'm not even a very good
|
|||
|
coder, but this program was fun to make and I hope you have some
|
|||
|
fun using it.
|
|||
|
|
|||
|
(=[ Silly Documentation ]==================================================)
|
|||
|
|
|||
|
When RAH starts it will look for a file called RAHACK20.INI - its
|
|||
|
configuration file.
|
|||
|
|
|||
|
-- 8< ------ 8< --- example RAHACK20.INI --8<---
|
|||
|
[RAHACKER]
|
|||
|
Sound = YES
|
|||
|
AutoSave = NO
|
|||
|
UpperPassword = YES
|
|||
|
|
|||
|
BadPassFile =
|
|||
|
ReportFile = RAHACK20.RPT
|
|||
|
Lexicon = WORDLIST.TXT
|
|||
|
UserFile = USERS.BBS
|
|||
|
|
|||
|
BarColor = 46
|
|||
|
AsciiSet = ABCDEFGHIJKLMNOPQRSTUVWXYZ
|
|||
|
PassSeparator = ""
|
|||
|
-- 8< ------ 8< --- snipp --- 8< -----
|
|||
|
|
|||
|
Explanation.
|
|||
|
|
|||
|
SOUND YES/NO
|
|||
|
Beep when passwords found?
|
|||
|
|
|||
|
AUTOSAVE YES/NO
|
|||
|
Save snapshot when password found?
|
|||
|
|
|||
|
UPPERPASSWORD YES/NO
|
|||
|
Should be set to YES if you are hacking RA Passwords. Only change this
|
|||
|
if you _REALLY_ know what you are doing!
|
|||
|
|
|||
|
BADPASSFILE <filename>
|
|||
|
All found passwords will be saved in this file. Make sure you do not use
|
|||
|
this file as input at the same time. This function may be very bugged,
|
|||
|
use with care.
|
|||
|
|
|||
|
REPORTFILE <filename>
|
|||
|
Standard filename for reports
|
|||
|
|
|||
|
LEXICON <filename>
|
|||
|
Path and filename of your lexicon
|
|||
|
|
|||
|
USERFILE <filename>
|
|||
|
Path and filename of the default userfile.
|
|||
|
|
|||
|
BARCOLOR 0-255
|
|||
|
Color of the selector bar. (Bra Att Ha(TM) Funktion ;-=)
|
|||
|
|
|||
|
ASCIISET Characterset
|
|||
|
Default valid characters for bruteforce attack.
|
|||
|
|
|||
|
PASSSEPARATOR Character
|
|||
|
Character to insert between words in CombiLexicon attack,
|
|||
|
usually set to " " or "". Notice that is _does_ say
|
|||
|
passseparator with THREE 's':es .. sigh...
|
|||
|
|
|||
|
RAHacker should work fine even without a configuration file.
|
|||
|
(Yeah sure; and the world is flat, Windows'95 is great and buts may fly!)
|
|||
|
|
|||
|
RAH will look for a file called RAHACK20.DAT, which is a file
|
|||
|
containing a snapshot of your previous visit. This file is not crucial
|
|||
|
and it will not exist until you use SAVE or a password is found and
|
|||
|
AUTOSAVE is on, if it was found though, you will be asked if you
|
|||
|
want to resume the last session.
|
|||
|
|
|||
|
If there is no RAHACK20.DAT, this is probably your first visit in the
|
|||
|
realm of RAHACKER and thus he will look for a file called USERS.BBS,
|
|||
|
which is the file in which RA stores all user information. If this
|
|||
|
file is not found you will face a requester asking for its complete
|
|||
|
path and filename. There should be an example file in the distribution
|
|||
|
archive, try 'FAMOUS.BBS' and see if that kicks...
|
|||
|
|
|||
|
When the userfile has been loaded you will be faced with a list of
|
|||
|
all users, it looks something like this:
|
|||
|
|
|||
|
<EFBFBD>=<3D>[ RA-Hacker v2.00<EFBFBD> - Saruman / DFR Engineering ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> <20><>=<3D>[ Users ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20>
|
|||
|
<EFBFBD> <20> 65535 Eddy Jansson Saruman <20> <20>
|
|||
|
<EFBFBD> <20> 6000 Kristoffer Andergrim Neuromancer <20> <20>
|
|||
|
<EFBFBD> <20> 6000 Gunnar Rettne Echo <20> <20>
|
|||
|
<EFBFBD> <20> 6000 Fredrik Nikala Pajala <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Peter Fors Hostile <20> <20>
|
|||
|
<EFBFBD> <20> 5000 Robert Risberg Dogge <20> <20>
|
|||
|
<EFBFBD> <20> 100 Magnus Stenman Benefactor <20> <20>
|
|||
|
<EFBFBD> <20> 100 LarS eRlAndSsoN dARK RIdER <20> <20>
|
|||
|
<EFBFBD> <20> 100 Patrick Andersson Infophreak <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Christian Sierau Mad Max <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Jonas Nilsson Bacardi <20> <20>
|
|||
|
<EFBFBD> <20> 100 Andreas Westling The Firepanter <20> <20>
|
|||
|
<EFBFBD> <20> 100 Roger Vuolle Roger Vuolle <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Thomas Tydal Tydal <20> <20>
|
|||
|
<EFBFBD> <20> 100 Klas Niva Android <20> <20>
|
|||
|
<EFBFBD> <20> 100 Andreas Karlsson Hermes <20> <20>
|
|||
|
<EFBFBD> <20> 5000 Emil Lantz Emil Lantz <20> <20>
|
|||
|
<EFBFBD> <20> 100 Mats Mattila Mr Motorola <20> <20>
|
|||
|
<EFBFBD> <20> 100 Anders Bergsten Spit <20> <20>
|
|||
|
<EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
1Help 2Report 3Tag 4Load 5Save 6 7Search 8Hack! 9 10Quit
|
|||
|
|
|||
|
You should see a selector bar positioned on the first user. This is the
|
|||
|
"main" command-center, here you inspect users, choose which should be
|
|||
|
attacked etc... You can 'tag' (aka mark or flag) a user by pressing
|
|||
|
'INSERT', you will notice a little 'flag' appearing on the left when
|
|||
|
you do so. Okay, try tagging a couple of users and press 'ENTER'.
|
|||
|
|
|||
|
You will be presented to a window that looks like this:
|
|||
|
|
|||
|
<EFBFBD>=<3D>[ RA-Hacker v2.00<EFBFBD> - Saruman / DFR Engineering ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> <20><>=<3D>[ Users ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20>
|
|||
|
<EFBFBD> <20><>65535 Eddy Jansson Saruman <20> <20>
|
|||
|
<EFBFBD> <20><> 6000 Kristoffer Andergrim Neuromancer <20> <20>
|
|||
|
<EFBFBD> <20><> 6000 Gunnar Rettne Echo <20> <20>
|
|||
|
<EFBFBD> <20> 6000 Fredrik Nikala Pajala <20> <20>
|
|||
|
<EFBFBD> <20> 1000 P<><50>=<3D>[ Hack 3 Users by Hand ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> <20>
|
|||
|
<EFBFBD> <20> 5000 R<> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 M<> Password to try: love۰<65><DBB0><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 L<> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 P<><50><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ<EFBFBD> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 C<><43> Sorry, "SNOPP" gave nothing. <20><> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 J<><4A><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ٳ <20> <20>
|
|||
|
<EFBFBD> <20> 100 A<><41><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20>
|
|||
|
<EFBFBD> <20> 100 Roger Vuolle Roger Vuolle <20> <20>
|
|||
|
|
|||
|
I have choosen three users to hack, myself amongst them :), anyway. you
|
|||
|
just enter a password and it will be encrypted and tested on every
|
|||
|
tagged user when you press enter, if you guessed correctly .. Blaammm!
|
|||
|
You got him! :-)
|
|||
|
|
|||
|
"Does this not impress you?" as David Copperfield would have said, well
|
|||
|
I thought not. Although quite fun, hacking by hand is not very efficient,
|
|||
|
but more on that later.
|
|||
|
|
|||
|
In most of my dialogboxes you must press 'ESC' to escape back one level,
|
|||
|
("I will say this only once, so listen carefully" ;)
|
|||
|
|
|||
|
On the bottom of the screen there's a little line of mysterious text.
|
|||
|
Now what could that mean...'1Help', '2Report' etc?.. Well, thats some
|
|||
|
functionkeys you could try, F1 for a little help scroller, F2 to
|
|||
|
save/print a report etc.. I'll go through them now:
|
|||
|
|
|||
|
F2 Report
|
|||
|
|
|||
|
Used to write a report file which basically is just a textfile
|
|||
|
with all users you have hacked and their respective password.
|
|||
|
Press ALT+F2 for a Sort meny, not very useful, just a fun
|
|||
|
thing to have.
|
|||
|
|
|||
|
F3 Tag
|
|||
|
|
|||
|
Now this is a handy little gadget. F3 is used to select a range
|
|||
|
of users to tag. Enter '1000' and press enter to tag all users
|
|||
|
with accesslevel onethousand, enter '>0' to tag all users, or
|
|||
|
you could try '<65535' which usually tags all users except the
|
|||
|
sysop. Press ALT+F3 to de-select users.
|
|||
|
|
|||
|
F4 Load
|
|||
|
|
|||
|
You will be asked for a USERS.BBS compatible file to load, all
|
|||
|
previus users will be discarded. Press ALT+F4 to append users
|
|||
|
instead.
|
|||
|
|
|||
|
|F5 Save
|
|||
|
|
|
|||
|
| Create a snapshot of your current progress (tagged users, passwords
|
|||
|
| hacked etc...) Once a USERS.BBS file has been snapshot:ed you don't
|
|||
|
| really need it any more, not for hacking it anyway. New in Beta-5
|
|||
|
| is the ability to save under a different name (ALT+F5), this can be
|
|||
|
| used in case of an emergency when you don't want to overwrite the old
|
|||
|
| snapshot. Remember, RAH will still only look for and load RAHACK20.DAT
|
|||
|
| you've got to rename any other snapshot file if you want to load it..
|
|||
|
|
|||
|
F7 Search
|
|||
|
|
|||
|
Enter a searchstring, RAH will scan the userlist for a match, both
|
|||
|
on name, handle and password. Press ALT+F7 to countinue a search.
|
|||
|
|
|||
|
F8 Hack!
|
|||
|
|
|||
|
See below, this is where the fun starts.
|
|||
|
|
|||
|
ALT+F8/F9 Export/Import
|
|||
|
|
|||
|
You can export the userbase to a plain ascii file. I've implemented
|
|||
|
the Export function to aid 3:d party developers and persons developing
|
|||
|
tools in the same category as this program. Import can be used to
|
|||
|
read other userlists than RA, this means that this program can be
|
|||
|
used to attack _ALL_ sorts of CRC32 codes. All you have to do is
|
|||
|
write a converter from the 'original file format' to this simple
|
|||
|
format that RA-HACKER can import.
|
|||
|
|
|||
|
The format is as follows (plain ascii file):
|
|||
|
|
|||
|
Line one must read "RAHACKER EXPORTED FILE VERSION 1"
|
|||
|
|
|||
|
Now comes the following data for each user.
|
|||
|
|
|||
|
Access Level (in hex if first character is a dollar sign)
|
|||
|
Users full Name
|
|||
|
Users Handle
|
|||
|
Users Password CRC (in hex if first character is a dollar sign)
|
|||
|
Users Password (blank if not known)
|
|||
|
|
|||
|
repeated until end of file and no more users.
|
|||
|
|
|||
|
F10 Quit
|
|||
|
|
|||
|
Guess what? RAHacker will close down. Note: You will be asked if you
|
|||
|
are sure you want to exist, make sure you have saved you progress or
|
|||
|
you may loose many hours of work.
|
|||
|
|
|||
|
|ALT+F10 Shell
|
|||
|
|
|
|||
|
| Shell to DOS with a minimum of memory available (no swapping)
|
|||
|
| Might come in handy ... or something.. I don't know!
|
|||
|
|
|||
|
There are more keys you could try, for instance you can see some
|
|||
|
debug-information if yuu press TAB, and you can change the password
|
|||
|
of a user by pressing CTRL+ENTER. There are also two undocumented
|
|||
|
functions which are undocumented just because they are extremely
|
|||
|
"beta:ish" and you really don't need them anyway, trust me on that.
|
|||
|
|
|||
|
(=[ Hardcore "Auto"[2] Hacking ]==============================================)
|
|||
|
|
|||
|
Press F8 and you will face this menu:
|
|||
|
|
|||
|
<EFBFBD> <20><> 6000 Kristoffer<65><72><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> <20>
|
|||
|
<EFBFBD> <20><> 6000 Gunnar Ret<65> <20> <20> <20>
|
|||
|
<EFBFBD> <20><> 6000 Fredrik Ni<4E> Start Lexicon Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Peter Fors<72> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 5000 Robert Ris<69> Start Num-Counter Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 Magnus Ste<74> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 LarS eRlAn<41> Start Alpha-Counter Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 Patrick An<41> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Christian <20> Start User/Handle Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Jonas Nils<6C> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 Andreas We<57> Start Random String Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100 Roger Vuol<6F> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000 Thomas Tyd<79><64><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20>
|
|||
|
|
|||
|
I'll go through the choices in turn...
|
|||
|
|
|||
|
LEXICON ATTACK
|
|||
|
|
|||
|
This is _exactly_ what it sounds like, you will be prompted for a
|
|||
|
vanilla textfile, one word per line. RAH will read each word in turn
|
|||
|
and test it upon all tagged users passwords. This is a very simple
|
|||
|
attack but in my honest oppinion it's also the best, atleast if you
|
|||
|
take in account the 'hits per time' ratio. When all words have been
|
|||
|
tested once the attack will start over, but this time RAH will take
|
|||
|
one word and combine with EACH AND EVERY OTHER and test that new
|
|||
|
COMBINATION as a password. This is a _very_ tedious attack, and you'd
|
|||
|
usually want to interrupt it. if it took one minute to do the 'straight'
|
|||
|
lexicon attack, it will take one minute^(words in the wordlist) to
|
|||
|
do this combi-attack... (Or something like that, I'm no math genious,
|
|||
|
but the point is that .. IT TAKES AGES! )
|
|||
|
|
|||
|
NUMERIC COUNTER ATTACK
|
|||
|
|
|||
|
This one is silly^H^H^Hmple, you define a range and a counter attack
|
|||
|
from <start> to <end> will be initiated, this is effiecient to break
|
|||
|
passwords made up of simple things like a persons phonenumber, social
|
|||
|
security number or maybe really stupid passwords like '1234' and such.
|
|||
|
|
|||
|
ALPHA COUNTER ATTACK
|
|||
|
|
|||
|
This is the most "complex" of the attack methods available in RAH.
|
|||
|
It's your typical 'state-of-the-art' brute force alphanumberic counter
|
|||
|
attack =)
|
|||
|
|
|||
|
<EFBFBD> <20> 6000 Fredrik Ni<4E> Start Lexicon Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000<30><30>=<3D>[ Configure Brute Force Attack ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> <20>
|
|||
|
<EFBFBD> <20> 5000<30> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100<30> Starting Password: UW0 <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100<30> Ending Password: ZZZZZZZZZZZZZZZZZZZZ <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100<30> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000<30> Define Valid Characters <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000<30> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100<30> Start Bruteforce Attack <20> <20> <20>
|
|||
|
<EFBFBD> <20> 100<30> <20> <20> <20>
|
|||
|
<EFBFBD> <20> 1000<30><30><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20>
|
|||
|
|
|||
|
Starting password is just that, make sure that only characters defined
|
|||
|
as valid (see below) are used. NOTE: There are always one 'invisible'
|
|||
|
character last on this string, thus if you enter 'A' the first string
|
|||
|
to be tested will be 'AA', this is a speedoptimization, the last character
|
|||
|
will never be saved as it is used in a tight loop that always goes
|
|||
|
all the way through the set. Okey, so its a little technical humbo-jumbo,
|
|||
|
just keep in mind that you usually would NOT want to change the starting
|
|||
|
password, but if you do you must be aware of this.
|
|||
|
|
|||
|
Ending Password should usually not be tampered with, I didn't even feel
|
|||
|
like implementing it, but I did. You can guess what it's used for.
|
|||
|
|
|||
|
Define Valid Characters will pop-up this little requester:
|
|||
|
|
|||
|
<EFBFBD> <20><>=<3D>[ Users<72><73>=<3D>[ Define Valid Characters ]<5D>=<3D><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ<EFBFBD><C4BF><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ <20>
|
|||
|
<EFBFBD> <20><>65535 Edd<64> |