Click here to find books related to 'network security'.





                                       Act! v2 for Windows 

Act! was written by Symantec, a company that really should have known better. Act! does not actually encrypt data at all. Instead,
it merely stores the password in encrypted format, and asks you to enter the password before it lets you see the database. Not
terribly effective. 

The obvious solution is to create a database of your own and save it. Save it again under a different name, but this time with a
password. Doing a file compare, you should see only a few changes. All but one will be obvious changes, ie, the name of the file. In
one file, filename.MUD, you will see two double-quotes in the 'unencrypted' file, and two double-quotes with junk between them in
the 'encrypted' file. You're almost there already. 

You have two ways to proceed at this point - change the password, or decrypt the original password. We'll start with changing the
password. In the same location (Offset, anyone?) in the *.MUD file you wish to crack, you'll find a set of double-quotes. Actually,
you'll find three. Of the three, only one will have eight or less characters between the quotes. All you have to do is change the first
junk character to a double-quote (to make a set of empty quotes) and fill the rest of the field with the empty 2Eh character. A good
hex-editor will come in handy here. 

The other possibility is to decrypt the password. Its a simple substitution code, thus it'd be simple to write a program to automate the
process. I'm too lazy, any takers? 

a 9E    A BE   1 CE
b 9D    B BD   2 CD
c 9C    C BC   3 CC
d 9B    D BB   4 CB
e 9A    E BA   5 CA
f 99    F B9   6 C9
g 98    G B8   7 C8
h 97    H B7   8 C7
i 96    I B6   9 C6
j 95    J B5   0 ?? 
k 94    K B4  
l 93    L B3
m 92    M B2
n 91    N B1
o 90    O B0
p 8F    P AF
q 8E    Q AE
r 8D    R AD
s 8C    S AC
t 8B    T AB
u 8A    U AA
v 89    V A9
w 88    W A8
x 87    X A7
y 86    Y A6
z 85    Z A5


All those values are hexadecimal, of course. Anyone who cares to look up the punctuation is free to, but nobody uses punctuation
anyway. 

Any information about other versions of Act! is welcome.... To the best of my knowledge, versions 1 and 3 have the same flaws. 


This page was created Wed Aug 11 12:21:15 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com Acquiring Account Information @ Matarese.com            

All hacks / Annoyance @ Matarese.com       Alt 2600 FAQ @ Matarese.com      

Hacking Angelfire @ Matarese.com       Anonymous E-Mail @ Matarese.com      

BBS Hacking @ Matarese.com       Bug List @ Matarese.com      

The Matarese Circle @ Matarese.com       Credit Carding - Part I - The Card @ Matarese.com      

Frequently Asked Questions About Exploits @ Matarese.com       Making free calls in payphones @ Matarese.com      

FTP Bouncing @ Matarese.com       Hacking Encyclopedia @ Matarese.com      

Hacking From Windows 95 FTP @ Matarese.com       Hacking Tripod @ Matarese.com      

Hacking Web Pages @ Matarese.com       Hacking PW @ Matarese.com      

Hacking Servers @ Matarese.com       Hacking Tutorial @ Matarese.com      

Hacking UNIX @ Matarese.com       Hacking WWW @ Matarese.com      

Hacker Handbook (Big File) @ Matarese.com       Harmless Hacking @ Matarese.com      

Security Hole List @ Matarese.com       Hacking Hotmail @ Matarese.com      

How to Hack Guide @ Matarese.com       Improving Security By Breaking In to Your Site(Big FIle) @ Matarese.com      

Internet Security (Becoming a Ueberadmin) @ Matarese.com       Lord Somer's IRC FAQ @ Matarese.com      

QueSO Test Drive @ Matarese.com      

unix   linux   networking   c   c++   operating systems     Copyright (C) 1999 - Matarese.com