599 lines
28 KiB
Plaintext
599 lines
28 KiB
Plaintext
|
||
|
||
|
||
ÛÛÛÛÛÛÜ ÜÛÛÛÛÛÜ ÛÛ ÛÛ ÜÛÛÛÛÛÜ ÜÛÛÛÛÛÜ ÛÛ ÜÛÛ ÜÛÛÛÛÛÛ ÛÛÛÛÛÛÜ Rel 2á5
|
||
ÛÛ ÛÛ ÛÛÜÜÜÛÛ ÛÛÜÜÜÛÛ ÛÛÜÜÜÛÛ ÛÛ ÛÛÜÛÛß ÛÛÜÜÜÜ ÛÛ ÛÛ
|
||
ÛÛÛÛÛÛ ÛÛßßßÛÛ ÛÛßßßÛÛ ÛÛßßßÛÛ ÛÛ ÛÛßÛÛÜ ÛÛßßßß ÛÛÛÛÛÛ
|
||
ÛÛ ßÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ßÛÛÛÛÛß ÛÛ ßÛÛ ßÛÛÛÛÛÛ ÛÛ ßÛÛ
|
||
|
||
Code and Idea by Saruman / DFR Engineering
|
||
|
||
P U B L I C B E T A R E L E A S E ( aka BETA-5 )
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Contents
|
||
|
||
|
||
|
||
|
||
The WHAT? WHY? and HOWs?
|
||
|
||
Silly Documentation
|
||
|
||
Hardcore "Auto"[2] Hacking
|
||
|
||
Advanced Usage
|
||
|
||
THIS CRAPPY PIECE OF SHIT ISN'T WORKING!
|
||
|
||
Contact Me
|
||
|
||
Credits
|
||
|
||
History
|
||
|
||
The Concept of Freeware / Copyright Notice
|
||
|
||
Footnotes
|
||
|
||
|
||
|
||
|
||
(=[ The WHAT?, WHY? and HOWs? ]============================================)
|
||
|
||
WHAT? ... RAHacker[1] is a program to attack CRC32 codes. CRC32 is a
|
||
Cyclic Redundancy Code, once calculated it's IRREVERSIBLE! CRC32
|
||
is usually used by communication protocols and archivers to detect
|
||
errors in a bit stream, but it's also used by varius software as a
|
||
method of storing passwords.
|
||
|
||
WHY? .... RAHacker can be looked upon as a tool to play with and as a
|
||
laboratory to learn about CRCs. You can use it to test your own
|
||
passwords, are thay safe from lexicon hacking? For how long can they
|
||
withstand a brute-force attack? You will see that a badly choosen
|
||
password can be breached in seconds, while a good password may survive
|
||
even the most intent hacker[1]. I said 'may', because a password stored
|
||
as a CRC32 checksum is reduced from any length down to just four bytes
|
||
(characters), and as you may gather from that: - many passwords
|
||
have the same CRC! - this is important, because if you choose a password
|
||
of 20 characters, it may have an equalient in just five characters, and
|
||
thus can be easily cracked.
|
||
|
||
HOW? ..... RAHacker is stupid! I cannot describe the program in any
|
||
other way. As there is no way to 'reverse engineer' a password since
|
||
it has been encoded you must go the other way around. We call it
|
||
Brute Force - cause that's exactly what it's all about. With enough
|
||
computing power and patience ANY CRC32 encoded password WILL fall,
|
||
and in your hands you have [to my knowledge] the best tool on the
|
||
market to do it. Okey, so I'm not NSA, I'm not even a very good
|
||
coder, but this program was fun to make and I hope you have some
|
||
fun using it.
|
||
|
||
(=[ Silly Documentation ]==================================================)
|
||
|
||
When RAH starts it will look for a file called RAHACK20.INI - its
|
||
configuration file.
|
||
|
||
-- 8< ------ 8< --- example RAHACK20.INI --8<---
|
||
[RAHACKER]
|
||
Sound = YES
|
||
AutoSave = NO
|
||
UpperPassword = YES
|
||
|
||
BadPassFile =
|
||
ReportFile = RAHACK20.RPT
|
||
Lexicon = WORDLIST.TXT
|
||
UserFile = USERS.BBS
|
||
|
||
BarColor = 46
|
||
AsciiSet = ABCDEFGHIJKLMNOPQRSTUVWXYZ
|
||
PassSeparator = ""
|
||
-- 8< ------ 8< --- snipp --- 8< -----
|
||
|
||
Explanation.
|
||
|
||
SOUND YES/NO
|
||
Beep when passwords found?
|
||
|
||
AUTOSAVE YES/NO
|
||
Save snapshot when password found?
|
||
|
||
UPPERPASSWORD YES/NO
|
||
Should be set to YES if you are hacking RA Passwords. Only change this
|
||
if you _REALLY_ know what you are doing!
|
||
|
||
BADPASSFILE <filename>
|
||
All found passwords will be saved in this file. Make sure you do not use
|
||
this file as input at the same time. This function may be very bugged,
|
||
use with care.
|
||
|
||
REPORTFILE <filename>
|
||
Standard filename for reports
|
||
|
||
LEXICON <filename>
|
||
Path and filename of your lexicon
|
||
|
||
USERFILE <filename>
|
||
Path and filename of the default userfile.
|
||
|
||
BARCOLOR 0-255
|
||
Color of the selector bar. (Bra Att Ha(TM) Funktion ;-=)
|
||
|
||
ASCIISET Characterset
|
||
Default valid characters for bruteforce attack.
|
||
|
||
PASSSEPARATOR Character
|
||
Character to insert between words in CombiLexicon attack,
|
||
usually set to " " or "". Notice that is _does_ say
|
||
passseparator with THREE 's':es .. sigh...
|
||
|
||
RAHacker should work fine even without a configuration file.
|
||
(Yeah sure; and the world is flat, Windows'95 is great and buts may fly!)
|
||
|
||
RAH will look for a file called RAHACK20.DAT, which is a file
|
||
containing a snapshot of your previous visit. This file is not crucial
|
||
and it will not exist until you use SAVE or a password is found and
|
||
AUTOSAVE is on, if it was found though, you will be asked if you
|
||
want to resume the last session.
|
||
|
||
If there is no RAHACK20.DAT, this is probably your first visit in the
|
||
realm of RAHACKER and thus he will look for a file called USERS.BBS,
|
||
which is the file in which RA stores all user information. If this
|
||
file is not found you will face a requester asking for its complete
|
||
path and filename. There should be an example file in the distribution
|
||
archive, try 'FAMOUS.BBS' and see if that kicks...
|
||
|
||
When the userfile has been loaded you will be faced with a list of
|
||
all users, it looks something like this:
|
||
|
||
Ú=ð[ RA-Hacker v2.00á - Saruman / DFR Engineering ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ ³
|
||
³ ÚÄ=ð[ Users ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³
|
||
³ ³ 65535 Eddy Jansson Saruman ³ ³
|
||
³ ³ 6000 Kristoffer Andergrim Neuromancer ³ ³
|
||
³ ³ 6000 Gunnar Rettne Echo ³ ³
|
||
³ ³ 6000 Fredrik Nikala Pajala ³ ³
|
||
³ ³ 1000 Peter Fors Hostile ³ ³
|
||
³ ³ 5000 Robert Risberg Dogge ³ ³
|
||
³ ³ 100 Magnus Stenman Benefactor ³ ³
|
||
³ ³ 100 LarS eRlAndSsoN dARK RIdER ³ ³
|
||
³ ³ 100 Patrick Andersson Infophreak ³ ³
|
||
³ ³ 1000 Christian Sierau Mad Max ³ ³
|
||
³ ³ 1000 Jonas Nilsson Bacardi ³ ³
|
||
³ ³ 100 Andreas Westling The Firepanter ³ ³
|
||
³ ³ 100 Roger Vuolle Roger Vuolle ³ ³
|
||
³ ³ 1000 Thomas Tydal Tydal ³ ³
|
||
³ ³ 100 Klas Niva Android ³ ³
|
||
³ ³ 100 Andreas Karlsson Hermes ³ ³
|
||
³ ³ 5000 Emil Lantz Emil Lantz ³ ³
|
||
³ ³ 100 Mats Mattila Mr Motorola ³ ³
|
||
³ ³ 100 Anders Bergsten Spit ³ ³
|
||
³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
1Help 2Report 3Tag 4Load 5Save 6 7Search 8Hack! 9 10Quit
|
||
|
||
You should see a selector bar positioned on the first user. This is the
|
||
"main" command-center, here you inspect users, choose which should be
|
||
attacked etc... You can 'tag' (aka mark or flag) a user by pressing
|
||
'INSERT', you will notice a little 'flag' appearing on the left when
|
||
you do so. Okay, try tagging a couple of users and press 'ENTER'.
|
||
|
||
You will be presented to a window that looks like this:
|
||
|
||
Ú=ð[ RA-Hacker v2.00á - Saruman / DFR Engineering ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ ³
|
||
³ ÚÄ=ð[ Users ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³
|
||
³ ³û65535 Eddy Jansson Saruman ³ ³
|
||
³ ³û 6000 Kristoffer Andergrim Neuromancer ³ ³
|
||
³ ³û 6000 Gunnar Rettne Echo ³ ³
|
||
³ ³ 6000 Fredrik Nikala Pajala ³ ³
|
||
³ ³ 1000 PÚÄ=ð[ Hack 3 Users by Hand ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ³
|
||
³ ³ 5000 R³ ³ ³ ³
|
||
³ ³ 100 M³ Password to try: loveÛ°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° ³ ³ ³
|
||
³ ³ 100 L³ ³ ³ ³
|
||
³ ³ 100 P³ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿³ ³ ³
|
||
³ ³ 1000 C³³ Sorry, "SNOPP" gave nothing. ³³ ³ ³
|
||
³ ³ 1000 J³ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ³ ³ ³
|
||
³ ³ 100 AÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³
|
||
³ ³ 100 Roger Vuolle Roger Vuolle ³ ³
|
||
|
||
I have choosen three users to hack, myself amongst them :), anyway. you
|
||
just enter a password and it will be encrypted and tested on every
|
||
tagged user when you press enter, if you guessed correctly .. Blaammm!
|
||
You got him! :-)
|
||
|
||
"Does this not impress you?" as David Copperfield would have said, well
|
||
I thought not. Although quite fun, hacking by hand is not very efficient,
|
||
but more on that later.
|
||
|
||
In most of my dialogboxes you must press 'ESC' to escape back one level,
|
||
("I will say this only once, so listen carefully" ;)
|
||
|
||
On the bottom of the screen there's a little line of mysterious text.
|
||
Now what could that mean...'1Help', '2Report' etc?.. Well, thats some
|
||
functionkeys you could try, F1 for a little help scroller, F2 to
|
||
save/print a report etc.. I'll go through them now:
|
||
|
||
F2 Report
|
||
|
||
Used to write a report file which basically is just a textfile
|
||
with all users you have hacked and their respective password.
|
||
Press ALT+F2 for a Sort meny, not very useful, just a fun
|
||
thing to have.
|
||
|
||
F3 Tag
|
||
|
||
Now this is a handy little gadget. F3 is used to select a range
|
||
of users to tag. Enter '1000' and press enter to tag all users
|
||
with accesslevel onethousand, enter '>0' to tag all users, or
|
||
you could try '<65535' which usually tags all users except the
|
||
sysop. Press ALT+F3 to de-select users.
|
||
|
||
F4 Load
|
||
|
||
You will be asked for a USERS.BBS compatible file to load, all
|
||
previus users will be discarded. Press ALT+F4 to append users
|
||
instead.
|
||
|
||
|F5 Save
|
||
|
|
||
| Create a snapshot of your current progress (tagged users, passwords
|
||
| hacked etc...) Once a USERS.BBS file has been snapshot:ed you don't
|
||
| really need it any more, not for hacking it anyway. New in Beta-5
|
||
| is the ability to save under a different name (ALT+F5), this can be
|
||
| used in case of an emergency when you don't want to overwrite the old
|
||
| snapshot. Remember, RAH will still only look for and load RAHACK20.DAT
|
||
| you've got to rename any other snapshot file if you want to load it..
|
||
|
||
F7 Search
|
||
|
||
Enter a searchstring, RAH will scan the userlist for a match, both
|
||
on name, handle and password. Press ALT+F7 to countinue a search.
|
||
|
||
F8 Hack!
|
||
|
||
See below, this is where the fun starts.
|
||
|
||
ALT+F8/F9 Export/Import
|
||
|
||
You can export the userbase to a plain ascii file. I've implemented
|
||
the Export function to aid 3:d party developers and persons developing
|
||
tools in the same category as this program. Import can be used to
|
||
read other userlists than RA, this means that this program can be
|
||
used to attack _ALL_ sorts of CRC32 codes. All you have to do is
|
||
write a converter from the 'original file format' to this simple
|
||
format that RA-HACKER can import.
|
||
|
||
The format is as follows (plain ascii file):
|
||
|
||
Line one must read "RAHACKER EXPORTED FILE VERSION 1"
|
||
|
||
Now comes the following data for each user.
|
||
|
||
Access Level (in hex if first character is a dollar sign)
|
||
Users full Name
|
||
Users Handle
|
||
Users Password CRC (in hex if first character is a dollar sign)
|
||
Users Password (blank if not known)
|
||
|
||
repeated until end of file and no more users.
|
||
|
||
F10 Quit
|
||
|
||
Guess what? RAHacker will close down. Note: You will be asked if you
|
||
are sure you want to exist, make sure you have saved you progress or
|
||
you may loose many hours of work.
|
||
|
||
|ALT+F10 Shell
|
||
|
|
||
| Shell to DOS with a minimum of memory available (no swapping)
|
||
| Might come in handy ... or something.. I don't know!
|
||
|
||
There are more keys you could try, for instance you can see some
|
||
debug-information if yuu press TAB, and you can change the password
|
||
of a user by pressing CTRL+ENTER. There are also two undocumented
|
||
functions which are undocumented just because they are extremely
|
||
"beta:ish" and you really don't need them anyway, trust me on that.
|
||
|
||
(=[ Hardcore "Auto"[2] Hacking ]==============================================)
|
||
|
||
Press F8 and you will face this menu:
|
||
|
||
³ ³û 6000 KristofferÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ³
|
||
³ ³û 6000 Gunnar Ret³ ³ ³ ³
|
||
³ ³û 6000 Fredrik Ni³ Start Lexicon Attack ³ ³ ³
|
||
³ ³ 1000 Peter Fors³ ³ ³ ³
|
||
³ ³ 5000 Robert Ris³ Start Num-Counter Attack ³ ³ ³
|
||
³ ³ 100 Magnus Ste³ ³ ³ ³
|
||
³ ³ 100 LarS eRlAn³ Start Alpha-Counter Attack ³ ³ ³
|
||
³ ³ 100 Patrick An³ ³ ³ ³
|
||
³ ³ 1000 Christian ³ Start User/Handle Attack ³ ³ ³
|
||
³ ³ 1000 Jonas Nils³ ³ ³ ³
|
||
³ ³ 100 Andreas We³ Start Random String Attack ³ ³ ³
|
||
³ ³ 100 Roger Vuol³ ³ ³ ³
|
||
³ ³ 1000 Thomas TydÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³
|
||
|
||
I'll go through the choices in turn...
|
||
|
||
LEXICON ATTACK
|
||
|
||
This is _exactly_ what it sounds like, you will be prompted for a
|
||
vanilla textfile, one word per line. RAH will read each word in turn
|
||
and test it upon all tagged users passwords. This is a very simple
|
||
attack but in my honest oppinion it's also the best, atleast if you
|
||
take in account the 'hits per time' ratio. When all words have been
|
||
tested once the attack will start over, but this time RAH will take
|
||
one word and combine with EACH AND EVERY OTHER and test that new
|
||
COMBINATION as a password. This is a _very_ tedious attack, and you'd
|
||
usually want to interrupt it. if it took one minute to do the 'straight'
|
||
lexicon attack, it will take one minute^(words in the wordlist) to
|
||
do this combi-attack... (Or something like that, I'm no math genious,
|
||
but the point is that .. IT TAKES AGES! )
|
||
|
||
NUMERIC COUNTER ATTACK
|
||
|
||
This one is silly^H^H^Hmple, you define a range and a counter attack
|
||
from <start> to <end> will be initiated, this is effiecient to break
|
||
passwords made up of simple things like a persons phonenumber, social
|
||
security number or maybe really stupid passwords like '1234' and such.
|
||
|
||
ALPHA COUNTER ATTACK
|
||
|
||
This is the most "complex" of the attack methods available in RAH.
|
||
It's your typical 'state-of-the-art' brute force alphanumberic counter
|
||
attack =)
|
||
|
||
³ ³ 6000 Fredrik Ni³ Start Lexicon Attack ³ ³ ³
|
||
³ ³ 1000ÚÄ=ð[ Configure Brute Force Attack ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ³
|
||
³ ³ 5000³ ³ ³ ³
|
||
³ ³ 100³ Starting Password: UW0 ³ ³ ³
|
||
³ ³ 100³ Ending Password: ZZZZZZZZZZZZZZZZZZZZ ³ ³ ³
|
||
³ ³ 100³ ³ ³ ³
|
||
³ ³ 1000³ Define Valid Characters ³ ³ ³
|
||
³ ³ 1000³ ³ ³ ³
|
||
³ ³ 100³ Start Bruteforce Attack ³ ³ ³
|
||
³ ³ 100³ ³ ³ ³
|
||
³ ³ 1000ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³
|
||
|
||
Starting password is just that, make sure that only characters defined
|
||
as valid (see below) are used. NOTE: There are always one 'invisible'
|
||
character last on this string, thus if you enter 'A' the first string
|
||
to be tested will be 'AA', this is a speedoptimization, the last character
|
||
will never be saved as it is used in a tight loop that always goes
|
||
all the way through the set. Okey, so its a little technical humbo-jumbo,
|
||
just keep in mind that you usually would NOT want to change the starting
|
||
password, but if you do you must be aware of this.
|
||
|
||
Ending Password should usually not be tampered with, I didn't even feel
|
||
like implementing it, but I did. You can guess what it's used for.
|
||
|
||
Define Valid Characters will pop-up this little requester:
|
||
|
||
³ ÚÄ=ð[ UsersÚÄ=ð[ Define Valid Characters ]ð=ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³
|
||
³ ³û65535 Edd³ |