-Caveat Lector- <A HREF="http://www.ctrl.org/"> </A> -Cui Bono?- from: http://www.bokler.com/crak_body.html Click Here: <A HREF="http://www.bokler.com/crak_body.html">Bokler's Guide to "CRACKER" Software</A> ----- How well do the systems and software you use protect your data? The level of security provided by much of the software in common use today is very weak. This page illustrates the risks of entrusting your data to software or systems which are cryptographically weak or logically flawed. The "cracker software" listed on this page exploits these weaknesses. The intent is not to low-rate anyone's products; the objectives are to: a. provide a few datapoints on cryptographic strength, b. help assess risk exposure in your environment, and c. help developers avoid common mistakes in new implementations. A Norwegian group calling themselves the Masters of Reverse Engineering (MoRE) has developed a utility that defeats the CSS encryption algorithm used to protect DVDs from being copied. The small decryption utility called DeCSS is available as a Windows binary, and in source code form. See the "official" mirror listing for download sites, and Frank Stevenson's cryptanalysis for code and details. A company called Elcomsoft is offering licenses for password cracker utilities that handle MS Office '95 and '97 (Word, Excel and Access), WinZip (.zip files). Their website also has a nifty collection of dictionaries and dictiona ry generators. The FBI's National Infrastructure Protection Center publishes a list of "Bugs, holes and Patches" every two weeks... good stuff (but it needs better organization!). Check the archive for previous issues. Check out our bookstore for some titles of interest. The current "hot title" i s "Hacking Exposed: Network Security Secrets and Solutions". A couple of tutorials on Windows vulnerabilities that you should be aware of... Guide to (mostly) Harmless Hacking, and one on NetBIOS attacks over TCP from Cult of the Dead Cow. Dmitry Sumin's password cracker software has gone commercial. The new site address is http://www.lostpassword.com. He now offers versions to crack Office '95, '97 and 2000 password-protected files including Word, Excel and Access. See Industry listings for further details. Want to do something useful with your time? - try cracking this 157 year-old cryptograph. Fernando Papa Budzyn has released an updated version of his Fast ZIP Cracker. Version 1.05 was released o/a 16 February, 1998, and is available from our ftp server, or from one of these sites: ftp://ftp.ox.ac.uk/pub/crypto/cryptana lysis/fzc105.zip, or ftp://ftp.elf.stuba.sk/pub/pc/pack/fzc105.zip. Bruce Schneier has released an application to brute-force S/MIME-protected messages which use 40 bit RC2. S/MIME is employed in Netscape's Communicator�, and Microsoft's Outlook Express�. One of the operatives at the L0pht has found another flaw in Internet Explorer which allows arbitrary code on the IE4 host to be executed. A serious bug in the Excite for Web Servers search engine has been discovered which would allow anonymous users to execute shell commands on the server. rootshell.com's site lists over 500 source code modules & "recipes" for hackers, including the recently advertised Land, Teardrop, and Bonk attacks. See the Operating Systems section. The Chaos Computer Club in Germany has devoted a page to detailing security flaws they've discovered with ActiveX� and Internet Explorer�. See the Operating Systems section. Ed Kubaitis' site: WWW Browser Security & Privacy Flaws. See the Operating Systems section. Pavel Semjanov's Homepage - site of the Russian Cracker Page. Thanks to Pavel for notifying us about his site. See the Other Sites section. The L0pht houses numerous resources. Their most recent release of L0phtcrack successfully defeated Microsoft's patch for an earlier Windows NT� password crack. See the Oper. Systems section. The Nomad Mobile Research Centre has FAQs and files for cracking Windows NT, Novell, and both web browsers and servers. See the Operating Systems section. The crackers in this section were designed to break the password protection/encryption built into popular word processor applications. The ones listed here worked without a hitch, returning the correct password value effortlessly in every case. If you are depending on the cryptography in these applications to protect your sensitive data you are definitely risk-prone. Word '97� Cracker: This is a freeware utility developed by Dmitry Sumin designed to discover "lost" Word '97 passwords. The documentation is sparse (very sparse), and by the author's own admission is very slow. It uses a "dictionary attack" - i.e. it guesses different passwords until it finds the one that successfully decrypts the protected file. If the person who password-protected the file originally used a truly random password, then it may take a very long time to recover it. You can download the binary word97cr.zip - no source code is included. An improved commercial version of this utility is now offered by Mr. Sumin through Passware at http://www.lostpassword.com. WFWCD vs. Word for Windows� 6.0: The Word for Windows Cracker Demo (WFWCD) appeared during 1996. WFWCD was developed by Fauzan Mirza to extract passwords from MS Word for Windows v 6.0 documents. According to the WFWCD documentation, the changes made to boost the security from the previous version of Word were ineffective. Like WPCRACK, WFWCD makes short work of extracting passwords. Run from the DOS command line, the WFWCD produces a short decrypted text sequence from the protected file, followed by the password value. You can get the WFWCD R8 distribution here. If you'd like to see WFWCD in action, but don't have MS Word 6.0, you can get our MS Word 6.0 password protected file (craktest.zip). The distribution comes with a DOS executable only (no source), and the documentation is more austere than that in WPCRACK and WU. Full file decryption requires a copy of Word 6.0...using the password determined from WFWCD. Word Unprotect (WU) vs. MS Word� 2.0: Sometime later the Word Unprotect program WU appeared. WU was developed by Marc Thibault to decrypt protected Microsoft Word v.1 and v.2 documents. We did not test WU (didn't have an old copy of MS Word). According to the WU documentation it creates a decrypted version of the file rather than produce the password as WPCRACK does. Mr. Thibault's comments (see the WU documentation link above) regarding the strength of the Word encryption algorithm are similar to those for WPCRACK. You can get the WU distribution here. The distribution includes C++ source code, and executables for DOS and Windows. WPCRACK vs. WordPerfect� 5.1: The readme.txt file in the WPCRACK distribution indicates it was widely disseminated over the Internet beginning late in 1992 - making it was one of the first cracker software packages to receive wide distribution. It was developed by Ron Dippold to extract the password from a protected WordPerfect� file. While WP 5.1 is no longer in wide use this package is most interesting for its docimentation; Mr. Dippold discusses the WordPerfect design flaw that allowed him to crack its flimsy password protection. If you're a developer who'd like to avoid making the same errors, you should read the WPCRACK documentation. You can get the WPCRACK distribution here. If you want to test WPCRACK, but don't have WordPerfect 5.1 you can get our WP5.1 password protected file (craktest.zip) here. The WPCRACK distribution includes an additional utility (WPUNCRYP) which will decrypt the WP5.1 file to a text file when supplied with the password found by WPCRACK. This avoids the necessity of even having to own a copy of WordPerfect to view the cracked files (this guy thought of everything)! This distribution comes with C source code only...you'll have to compile it to try WPCRACK. Excel Password Remover: This crack defeats password protection applied to Excel sheets and workbooks; it does not recover password-protected files. It was developed by Einar St�le Huse of Norway. He says it works fine for both sheets and workbooks in Excel 5.0 and Excel 95/7.0; in Excel 97/8.0 the 'Unprotect sheet'-command works fine, but the 'Unprotect workbook'-command does not. You can get the latest version and instructions for its use at Einar's website. The PKZIP compression utility includes an option to encrypt the compressed archive. Following are two genres of PKZIP crackers - dictionary attack crackers, and a known plaintext attack cracker. While cracking PKZIP files is not trivial as it is with the word processor and spreadsheet crackers listed above, you really shouldn't bet the farm on it either. The Dictionary Attack: These crackers employ a brute force/trial-and-error approach: repeatedly guessing password values until the correct one is found. The passwords are typically chosen in sequential order from a list (file) of commonly used passwords. This means that choosing long, obscure passwords may provide greater security than short passwords. This is a good point to remember if you are depending on PKZIP's encryption to secure your data. While not trivial to crack, at least one of these dictionary attack tools probably poses a real threat to PKZIP security. ZIPCRACK: The earliest example of PKZIP cracker software we found was ZIPCRACK v2.0, developed by Paul Kocher while he was a sophomore at Stanford University (circa 1992) to crack PKZIP v 1.1 protected files. ZIPCRACK utilizes a dictionary attack (see above). You can get the ZIPCRACK 2.0 distribution here. Note however that this distribution is crippled (only searches for passwords beginning with the letter "z"), has no source code, and only works against an antique version of PKZIP. We've included it here because the zipcrack.doc file in this distribution contains some useful information, including some of Mr. Kocher's views of PKZIP's approach to cryptography. EPILOGUE: Subsequent to releasing ZIPCRACK Mr. Kocher and Eli Biham published a paper detailing a known-plaintext attack on PKZIP which was used in the cipher challenge contest sponsored by PKWare. While the results of the contest remain controversial, there is no doubt that the technique works in many real-world cases. You can get a copy of the Biham and Kocher paper titled "A Known Plaintext Attack on the PKZIP Stream Cipher" here (a PostScript version). While Mr. Kocher never released the software described in this paper, Peter Conrad implemented their techniques in working software (see description below) available at his website. Mr. Kocher won further acclaim for himself (including an article in the New York Times!?) by finding a "timing attack" which could be used against many of the public key cryptosystems. You can get further details by visiting Paul Kocher's website. PKCRACK: Very little information is available on the PKZIP password cracker named PKCRACK. Judging from the files in the distribution PKCRACK is 1993 vintage, but nothing was found to identify the author. PKCRACK employs a dictionary attack like ZIPCRACK, but it's not crippled, source code is included, and it works on version 2.04 of PKZIP. Operation is straightforward - it tries all passwords contained in the file pkcrack.dat against the .zip file specified in the DOS command line. You can get the PKCRACK distribution here. It comes with an example .zip archive to illustrate its operation. The dictionary password must be an exact match with the one used to encrypt the zip'd files; missing even the case of a single letter in the password causes PKCRACK to come up empty-handed. FZC: The Fast ZIP Cracker (FZC) was developed by Fernando Papa Budzyn of Montevideo, Uruguay. The latest known version, FZC 1.05, was released o/a Feb 16, 1998. You can get the FZC 1.05 distribution here, or from here. FZC is the most sophisticated of the dictionary attack PKZIP crackers we found. While similar in concept to PKCRACK and ZIPCRACK, FZC augments its dictionary attack with several features that enhance its ability to successfully complete its attack. Most of the documentation on FZC is "online" in the .exe file. While stand-alone documentation is sparse, it lists a pair of ftp sites from which you can replenish your password dictionary. The Known Plaintext Attack: This attack removes any added security from using long, obscure passwords. Using the attack requires that a few bytes (at least 13, more is better) of plaintext be known. Plaintext is simply the unencrypted version of an encrypted file. If you're paying attention to this, you just asked yourself why you need to crack an encrypted file if you already know what the decrypted (plaintext) file contains... good question! There's also a good answer: You don't have to know all of the plaintext, just several bytes (13 in this case). Since most file types contain a header or trailer which does not vary from file to file the required plaintext is generally available. Determining these plaintext header values is an exercise left to the reader... Kocher & Biham's paper on the subject is "A Known Plaintext Attack on the PKZIP Stream Cipher". PkCrack: PkCrack (not to be confused with the PKCRACK dictionary attack above) is an implementation of the known plaintext attack. It was developed by Peter Conrad of Germany based on the techniques described in Biham & Kocher's paper. Using it will require some work to define the known plaintext values for the encrypted, compressed files. As of this writing there are no known sources of plaintext for common filetypes; you'll have to get these on your own. The latest version of PkCrack can be found at Peter Conrad's website. It is available as "C" source, DOS and Win '95 executeables. MS Windows: Jos Visser at OSP has created a very good source on cracking passwords on Windows NT�. The L0pht has released a Windows NT� password cracker that has attracted a LOT of attention. Download executables and read all about the latest version of L0phtcrack at their website. Teardrop and Land denial-of-service attacks as well as a host of other hacks are described at rootshell.com, as reported in TechWeb News. The Bonk denial-of-service attack is an enhanced version of Teardrop which counters Microsoft's patch for that attack - as reported in Wired News. Does Bonk really work?... apparently so. The folks who brought you "Back Orifice" were nice enough to share some insights into how it works in this piece on NetBIOS Attacks over TCP. This related article on the same subject is also worth reading (an excerpt from Carolyn Meinel's book?) Novell�: The Novell Netware� Hack FAQ exposes the dangers of entrusting your secrets to Novell's security system; available as a downloadable file, a web page, and occasionally posted to comp.security.misc A command line NLM for setting any user's password on a NetWare� server to anything you want. Thanks to KRP, one of our readers, for this one. WWW, Windows NT and Novell: >From Simple Nomad, the guy who brought you the Novell Hack FAQ... this is an all new site with an enlarged agenda - The Nomad Mobile Research Centre. Web Browsers: Ed Kubaitis' site has a page on WWW Browser Security & Privacy Flaws. No software is available, but this is a good source of information on the risks of simply browsing the Web. The L0pht has published an advisory documenting their discovery of a security flaw in IE 4.x which gives away user control over execution of code on their machine. ActiveX: The Chaos Computer Club's website in Germany has a page devoted to security problems with ActiveX� controls. They demonstrated these flaws on a German television program by using their ActiveX control to cause Quicken� to transfer money from the dupe's bank account to the hacker's account - klicken sie hier for the full story. If you're using Internet Explorer� you can try some of their malicious ActiveX controls for yourself... be careful! Pavel Semjanov's Home Page: Pavel Semjanov works in the Software Security Labs of St. Petersburg Technical University... no, not St. Petersburg, Florida - St. Petersburg, Russia. His English is still a bit rough, but this is an interesting website; the Russian Crackers Page has a variety of stuff for Novell, ARJ, BIOS, Stacker, Diskreet (a Norton Utility), and a Password Cracking Library (PCL). Visit Pavel's site in: | this frame | new window | this window (bye) | Has cracking become an industry? Apparently so... these are now at least three companies who develop and market software designed to recover information protected with "built-in" encryption software. CRAK Software: John Kuslich and the folks at CRAK Software are selling software crackers for many of the popular Windows applications, most of it for $99. They have demo (crippled) versions of at least some of their products. But hey, I'm stealing their thunder...you can go visit CRAK's web site from here. Access Data Corp: AccessData Corp. also markets an extensive line of utilities to recover passwords from a wide variety of Windows applications. Prices and demo versions are available from AccessData's website. Passware: Dmitry Sumin & company have recently commercialized their successful crackers for Office '95 and Office '97 applications including Word, Access and Excel. They offer demo versions of most of their products which extract partial passwords. Prices and product offerings are available from Passware's website in Russia. Password Crackers, Inc: Password cracking is now a component of the service industry. If you're not a "do-it-yourselfer", these guys will be happy to do it for you. They guarantee results, and handle a large number of file types. Visit the Password Crackers, Inc. website for more details. Application Commercial Cracker Sources Free Cracker Utilities Microsoft Money AccessData MsOfPass - (Office '95 & '97) ? Microsoft Word AccessData CRAK Software MsOfPass - (Office '95 & '97) WU- Word 2.0 WFWCD R8- Word 6.0 word97cr.zip Microsoft Excel AccessData CRAK Software MsOfPass - (Office '95 & '97) excrak.zip Excel (v 4.0 & up) for "sheets" Word Perfect AccessData CRAK Software WPCRACK - WP 5.1 Data Perfect AccessData ? Professional Write AccessData ? Lotus 1-2-3 AccessData CRAK Software ? Quattro Pro AccessData CRAK Software ? Paradox AccessData ? Symantec Q&A AccessData ? Quicken CRAK Software AccessData ? PKZIP ? ZIPCRACK 2.0 - PKZIP 1.1 PKCRACK - PKZIP 2.04 FZC 1.04 - PKZIP 2.04 Peter Conrad's Known Plaintext Code ------------------------------------------------------------------------ NOTE: Our original idea for this page was just to publish a list of all the cracker software we could find. After casting our nets and examining the catch it occurred to us that there might be a larger and more interesting story here... drop us a line if you've got some opinions or information you'd like to share relevant to this page. PLEASE NOTE: THIS PAGE CONCERNS CRYPTOGRAPHY. IT HAS NOTHING TO DO WITH "WAREZ" AND THE LIKE. WE DO NOT TRADE IN UTILITIES TO DEFEAT SOFTWARE COPY PROTECTION, AND WILL NOT ANSWER REQUESTS FOR SUCH UTILITIES. ------------------------------------------------------------------------ Copyright �, 1995-2000 Bokler Software Corp. All rights reserved. DEScipher, TDEScipher and HASHcipher are trademarks of Bokler Software Corp. The "animated_cipher.gif" is copyrighted by Bokler Software Corp. Microsoft, Windows, Visual Basic, Visual C++ and ActiveX are trademarks of Microsoft Corp. ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are not allowed. Substance�not soap-boxing! These are sordid matters and 'conspiracy theory'�with its many half-truths, misdirections and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
