textfiles/programming/krack.txt

254 lines
12 KiB
Plaintext
Raw Permalink Normal View History

2021-04-15 11:31:59 -07:00
+----------------------------------------------------------------------------+
| |
| KRACK |
| April 1986 |
| Volume 1 Number 1 |
| |
+----------------------------------------------------------------------------+
You are reading KRAK, the official Kracking Textfile. This file is put
out by the Cellar Elite. Captain Quazmo is the Head editor.
If you wish to submit articals to KRACK just upload a Text file in IBM
PC format to one of the official KRACK boards. Krack is for all type of
computers. Apple and C/64-128 users let's get going.
+----------------------------------------------------------------------------+
| |
| Cracking NewsRoom |
| IBM-PC format |
| |
| Captain Quazmo |
| |
+----------------------------------------------------------------------------+
There are a couple of unprotects going around for this piece of software.
This one is rather short but others make you change 51 other bytes that seem
to be unneeded. You will need DEBUG for you dos diskette and a Copy (doesn't
matter if it works) of NewsRoom.
At Dos: A> Ren nwsrm.exe nwsrm.zap
A> Debug nwsrm.zap
-E 691A EB 41
-E 6973 90 90
-E 6977 EB 25 90
-W
-Q
A> Ren nwsrm.zap nwsrm.exe
A> Debug nwsrm1.ovl
-E 05db 8B 46 04 89 46 FE 3B 46 04
-W
-Q
A> Debug nwsrm22.ovl
-10C6 B8 05 43
-W
-Q
You now have a working copy of newsroom. The only not is that all file
most reside on drive A:. Assign can be use to allow this program to work
on a hard drive.
+----------------------------------------------------------------------------+
| |
| Defeating Prolock |
| from the Locksmith Procedures manual |
| |
+----------------------------------------------------------------------------+
You will need: Dos DEBUG
A formatted Blank diskette
A non working copy of the program
This tutorial show how defeat prolock on dBASE III but can be used for most
prolocked disks.
A> Debug DBASE.exe
-R
You will now see whats in the registers. Record the values
-U
-U
Look for a LOOP instruction. The next instruction will be a XCHG.
Using the Address in the first column [091B:XXXX 92 XCHG DX,AX]
enter -G XXXX
-S 100 3000 83 c4 08
Some address will be listed. Take the last address 091b:XXXX and
-A XXXX
XOR AX,AX
RET
Press Return twice until the "-" prompt. enter
-S 100 3000 C0 45 F8
This will display a single value [091B:XXXX]. use it and enter
-E XXXX 0B 46
-M 0:c f 0:200
Prolock will test for the original diskette enter
-R BX
0001
-R CX
When prompted enter the original value of CX
-N TEMP
-S 100 3000 4D 5A
Several values will be displayed. Remove the program disk and
insert the black disk and type
-W 1A50
-Q
A> Ren temp dbase.exe
+----------------------------------------------------------------------------+
| |
| LockSmith Instructions |
| IBMpc Format |
| |
+----------------------------------------------------------------------------+
Locksmith is in my oppion the BEST copy program for the IBMpc. Using
Special Parameters Locksmith can copy almost anything. I hope to explain to
all you PC Pirates how to use this great program. This is first in a 2 part
series on the use of locksmith.
LOCKSMITH MAIN SCREEN
Status Line Drives: A: > B:
DRIVE TRACK SECTOR OPTIONS MISC QUIT Locksmith/PC Ver. 0.0
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
TRACK: 0000000000000001111111111111112222222222 <20> Sector: 00 <20>
123456789ABCDEF012345678ABCDEF0123456789 <20> T H S N Stat % <20>
Head 0: ................Window #1............... <20> <20>
Head 1: ........................................ <20> 00 0 1 2 0000 09 <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ 00 0 2 2 0000 09 <20>
[0000] 0 1 2 3 4 5 6 7 8 9 A B C D E F<> 00 0 3 2 0000 11 <20>
0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 4 2 0000 -11 <20>
0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 5 2 0000 12 <20>
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 6 2 0000 14 <20>
0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 7 2 0000 00 <20>
0040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 8 2 0000 -02 <20>
0050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 9 2 0000 11 <20>
0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 A 2 0000 29 <20>
0070 W i n d o w # 3 <20> <20>
0080 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
0090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
00A0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
00B0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
00C0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> Window #2 <20>
00D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
00E0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
00F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
Status Line - This line show all messages from Locksmith. I give discriptions
In the main and secondary menu modes.
Drives: A: > B: - The first letter [A:] is the Source drive and the second
letter is the Target drive
Drive - Change Drive information
Letter - Change the Source & Target drives
Controller - Change the FDC control codes
Track - Track Utilitys
Analyze - Analyze the selected track showing their N value and
any Errors.
Backup - Copy selected track from Source to Target drives
Format - Format selected track in Regular/IrRegular formats
Erase - Erase selected track to the Fill Byte
Hidden - Search for irregular sector sizes and number
Read - Read in a selected track
Write - Write out a selected track
Compare - Compare tracks with information in BUFFER
Print - Print out Track Buffer
Secoter - Sector Utilitys
Backup - Fast copy [35 sec.]
Read - Read in sectors
Write - Write out sectors
Compare - Compare sectors with memory
Options - Set up Locksmith's parameters
Misc - Misc. Functions
Reset - Reset all information to Default
PrintSetup - Redefine the print tables
Search - Define a string to Search for
Quit - Quit to DOS [A>]
Window #1: Current Track Window. This window is used for selecting what
Tracks are to be used. To get to this window press the [F1] key.
If a number (Track) has a "." under it then it is to be used.
The SPACEBAR is used to toggle a single Track. The "+" key is
used to toggle the whole side of a disk. Left and Right Arrows
keys are used to move the cursor.
Window #2: This is the Sector window. Here you will find the Size (N) and
the Error in the sector if any and the percent of the track taken up
by that sector. By examine the sector's number you can find out how
how the sectors are really numbered because some protection schemes
use abnormal sector numbering. HOME will take you to the top of the
screen to the Number of sectors [SECTORS: 00] prompt. This is used
in creating your own protection schemes which will be explained in
the next issue of KRACK: [F2] get this window
Window #3: The data window can be used to examine, edit and create data to
be written out to the disk. So protection schemes need certain
bytes to be changed. [F3] get you here while [F9] toggle Ascii/Hex
display. If a search string has been entered then [F10] will start
the search.
Copying something with locksmith is pretty easy. If the disk is unprotected
then use the BACKUP in the SECTOR utilitys. If the disk is protected then
you must use the BACKUP in the TRACK utilitys. The best way to copy a
protected diskette is the first to Slow Copy the whole disk [TRACK utilitys]
then write down any odd tracks (more sectors than the other errors etc.).
Use Fast copy [SECTOR utilitys] to copy similar track then use Slow copy to
copy the Fuckup tracks.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-LockSmith Parameters-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Lotus 123: Slow Copy Side 0 tracks 3,7 and Side 1 track 4. Fast copy the rest
Harvard Project Manager v 1.1: Fast Copy all track the Analyze side 1 track 1A
Edit buffer and change address 0F46 to 01
Office Writer: Fast copy all track. Copy tracks 28,29 both sides
Super Cala: Fast Copy all Tracks
Infocom: Slow copy all tracks
WordStar 2000: Fast copy all tracks
XYWrite II: Fast copy all tracks
+----------------------------------------------------------------------------+
| |
| Official KRACK Boards |
| |
+----------------------------------------------------------------------------+
Do you want your board to be an official Krack board. Just leave a message
on one of the current Krack Boards.
Spectrum 007 [24 hours]........................................[914]-338-8837
Outer Limits [24 hours]........................................[914]-462-0363
Thief World [Midnight-6am]....................................[914]-462-2256
Comming Next Month....
Locksmith Tutorial Part 2
Beating SoftGuard
Cracking Strip Poker and PrintShop
Plus: More Locksmith paramters
Building a Black Box
Cap' Quazmo