========================================================
+HCU Maillist Issue: 211 05/02/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Process Tree
#2 Subject: Re: +HCU ML Issue 209
#3 Subject: Paper Tiger - A Demo CPU Emulation 'Protection'
#4 Subject: hacking
ARTICLES:
-----#1-------------------------------------------------
Subject: Process Tree
Unfortunatly, the download in not any more available:
the "Download now" button has dissappeared from the Website.
AZ111.
-----#2-------------------------------------------------
Subject: Re: +HCU ML Issue 209
On Thu, 30 Apr 1998 21:42:54 +0200 (MET DST) "+HCU ML" ******************
writes:
>========================================================
>+HCU Maillist Issue: 209 04/30/1998
>--------------------------------------------------------
>Subject: packet monitoring
>
>I think you might find NukeNabber useful. You can find latest version
via
>web search. Probably find links to other stuff you want from this.
>
>~~
>Ghiribizzo
>
here you go heres the URL on my NukeNabber... now laong with this nuking
topic... does anyone know of a way to nuke/kill people from a UNIX
*shell*??? (i dont have root)
TecH_bOi
>
>
>
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at *******************
Or call Juno at (800) 654-JUNO [654-5866]
-----#3-------------------------------------------------
Subject: Paper Tiger - A Demo CPU Emulation 'Protection'
Some of you may know that I've been working on the CPU emulation
protections. When I finished the demo I sent it to a few friends. At first
I thought it was a very hard crack, but now that I've looked at it from a
cracker's perspective rather than a protectionist's, I've changed my mind :)
For those of you who want to try it, it is at:
*************************************************
Hint: ZYZOZUZ ZCZAZNZ ZCZRZAZCZKZ ZIZTZ ZUZSZIZNZGZ ZAZ ZHZEZXZ
ZLZIZSZTZIZNZGZ ZAZNZDZ ZPZEZNZ ZAZNZDZ ZPZAZPZEZRZ.Z ZIZTZ ZIZSZ ZAZ
ZOZNZEZ ZBZYZTZEZ ZCZRZAZCZKZ.Z
Remove the Zs if you want the hint.
~~
Ghiribizzo
-----#4-------------------------------------------------
Subject: hacking
Some FTP sites can try to switch from downloading into uploading
(or mixed) mode. Has anybody an information on the subject?
Thanks. AZ111.
=====End of Issue 211===================================
========================================================
+HCU Maillist Issue: 212 05/03/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Undelete Util for FAT32?
#2 Subject: gthorne - on nuking in unix
#3 Subject: Paper Tiger
#4 Subject: nukes
ARTICLES:
-----#1-------------------------------------------------
Subject: Undelete Util for FAT32?
Gentlemen:
I need a simple undelete utility for FAT32. One which checks the fat and
reconstructs deleted files. Is there such an animal?
I enjoy the many intelligent posts on the +HCU list.
Thanks
zinger
-----#2-------------------------------------------------
Subject: gthorne - on nuking in unix
Message Body =
search for teardrop.c
you will find a ton of other files as well, but teardrop is one of the basic nuke programs
+gthorne
-----#3-------------------------------------------------
Subject: Paper Tiger
A note about the different versions:
Depending when you downloaded the file you may have got different versions
of the program. There are also a few beta versions I sent via email and IRC.
Concept Version: Uses a beta version of the ghCPU
Variant A: Uses ghCPU-1
Variant B: Some changes to protection
Variant B2: Minor changes to protection
Possessing multiple versions will make it much easier to crack, except for
variant B and B2 which only has the change:
00000119: 50 C3
0000011A: C3 90
From Variant B onwards, the program displays it's version. If you have
Variant B, then don't bother to get Variant A.
Thanks for the feedback you've given me so far.
~~
Ghiribizzo
-----#4-------------------------------------------------
Subject: nukes
>>>
here you go heres the URL on my NukeNabber... now laong with this nuking
topic... does anyone know of a way to nuke/kill people from a UNIX
*shell*??? (i dont have root)
<<<
Try a search for Nuke and IRC or DoS. You should find a lot of nukes which
you should be able to compile and run from a unix prompt. There are also
precompiled nukes for windows around.
There are also some mIRC scripts which integrate nukes into the irc client.
Does anyone here have experience with mIRC scripting? I'd like to integrate
wnuke4.exe into the right popup menu.
~~
Ghiribizzo
=====End of Issue 212===================================
========================================================
+HCU Maillist Issue: 213 05/04/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Decryption
#2 Subject: CPU-emulation-based protections
#3 Subject: FAT32 - undelete
#4 Subject: growing up....
#5 Subject: ProcDump... a tool of the trade
ARTICLES:
-----#1-------------------------------------------------
Subject: Decryption
Does anybody know how to recover (deprotect) zipped files?
-----#2-------------------------------------------------
Subject: CPU-emulation-based protections
If you are interested in CPU-emulation-based protections, you should try to crack my zelazny.com, available for quite some time on ****************************** It emulates a simple stack-based processor.
Known cracks: Aesculapius did it (congrats!) and Ghiribizzo removed some outer encryption parts (see ***************************************************
Jack of Shadows
-----#3-------------------------------------------------
Subject: FAT32 - undelete
There is a util for undeleting files.
It's part of the Norton Utilities 3.0 and it's called (guess) Norton Undelete. It protect's the Recycle Bin and allows
to undelete files, not only moved into the Recycle bin
TWD
mailto : twd(point)rulez(at)gmx(point)net
-----#4-------------------------------------------------
Subject: growing up....
Dear all,
after being lazy for a long time, I finally freed about 250 MB of my
small 1.2 GB to use a better OS instead of the horrible win95.
However, which would you recommend - Linux or FreeBSD ?
I just hope I'm not starting a OS flame war here..... ;-)
WAFNA
-----#5-------------------------------------------------
Subject: ProcDump... a tool of the trade
Weee.. a commercial... they are everywhere:
As we all know envelope protections is quite common - and sometimes
quite annoying from the perspective that it's a lot of work building a
PE-exe from the memory image of it. This is the main reason why G-rom
has developed a tool ProcDump which can actually rebuild PE-files from
memory. I tipped in and coded a trace-engine that'll allow it to find
the original entrypoint and improve dumping.
This tool is EXTREMELY handy to just about anybody removing PE-Envelopes
of just about any type. It has uses far beyound those of the DOC....
If you're into envelope removing.. I suggest you take a peak at this
tool.
---
btw - fravia: you can find the finished version of my "in memory
patching" eassay on my page:
*******************************************
if you wanna update it on your page.
...
to all those who read (and hopefully enjoyed) this easay may I suggest
you take a peak at my homepage because I released a diffent type of
API-hook that is similar to the Debug approach in many ways but
overcomes some of it's shortcommings.
regrds..
Stone / United Cracking Force
=====End of Issue 213===================================
========================================================
+HCU Maillist Issue: 214 05/06/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: gthorne regarding Linux vs FreeBSD
#2 Subject: Stone's updated essay (fravia+)
#3 Subject: RE:Better memory view questions
#4 Subject: New page
#5 Subject: nuking script
#6 Subject: IDA Pro 3.75
ARTICLES:
-----#1-------------------------------------------------
Subject: gthorne regarding Linux vs FreeBSD
Message Body =
wafna - to me the difference is in distribution
there are more linux users so it will be easier for you to find more people who have accomplished tasks in linux than freebsd
i have been the kind of person to tend to try whatever comes my way - so for me it would be a temporary change, and i will always go back to linux
this is for no other reason than that it is my old friend, i have solaris as well, but installing it would only be temporary change until i went back to the one i know the best
each new os is a challenge, and rather exciting in that respect, but i do know that linux has more unix emulation than others - built into the kernel - and people have been and will be developing for it en masse, where other free flavors of unix will for many years to come take a back seat to it - this probably includes support for new devices, since linux users seem to have a zeal to 'make it work' that i have rarelyt seen in other development environments
for those of you who may know exceptions to this general rule, great!
i love to hear more about alternative options and therefore learn more as well
+gthorne
-----#2-------------------------------------------------
Subject: Stone's updated essay (fravia+)
Stone's
>btw - fravia: you can find the finished version of my "in memory
>patching" eassay on my page:
*********************************************
No, it was not there on 4 May 1998, 22:50 UE Time
And it would be nice if you could send your essays to me, updated
and already formatted, you +lazy master (that is, if you have the time :-)
later
fravia+
-----#3-------------------------------------------------
Subject: RE:Better memory view questions
Imported functions from dll's are all listed in a section
of PE files called import section.Good dissasamblers like
IDA are capable to pharse this section and give you
all information about imported functions and dll's from
witch are imported.Note that imports names are not encoded.
You can see them as plain text inside PE files. To
understand what happens behind our eyes I suggest reading
a good PE file reference.
The memory layout in Window95 is very simple.The OS use
a page based memory management, providing a linear 4Gb
adress space for each 32bit app.The space is divided as below:
1. 0 to 4mb Low Win16 Heap
2. 4mb to 2 gb per-process user area
3. 2gb to 3 gb a shared memory arena containing
- memory maped files
- 32bit system dll's
- top Win16 global heap
4.3gb to 4 gb 32 bit System arena containig
ring 0 OS components
Each 32 bit process is provided whith it's own adress
space.16 bit aplications are not runned in a separate
adress space in Window95.They are loaded by the OS in
the region starting at 2gb and below 3gb.The system
loads them as close as posible to 2gb to keep a well
organized memory space.Also not that 16 bit app modules
are not mapped in memory like PE executables.
From this memory layout you can see that Dll's are loaded
in a region what is shared between processes.This means
that a dll is nod loaded in every process what use it.The
Os simply maps the shared region in every process adress
space.
Note that 16 bit modules are not runing in a separate
memory space in Windows95.In WindowsNT they do , but
this was implemented paying speed.
Also , in WIndow95 are used only two rings ring3 and ring0.
Strange enough , but system dll's runs at the same privilege
level as user code , on ring3. The VxD's are running
on ring0.Transitions between ring 3 code and ring 0 code is
usualy realized through interrupts gates.
Each ring is provided whith it's own stack space.
Per process stacks are alocated when the process is started.
Size and limit is chosed bt the values contained in the .exe
file.(unverifyed but seems to be OK)
The memory layout described is very schematic but should be
good for starting.
Readings:
(articles)
1.In memory patching - Three aproaches by Stone
2.Win32 Debug API by Iceman
3.Tweaking whith memory in Windows 95 by Iceman
all three available at Fravia's in the Papers section
(books)
4. System level programing for Win95 by Matt Pietrek
Apologies goes to all of you who are familiar with this
subject.
Iceman
______________________________________________________
Get Your Private, Free Email at **********************
-----#4-------------------------------------------------
Subject: New page
We just open a new page for cracks/serials at:
******************************
this page deserve specials links,so be sure to go to Toonland for
what you're looking!
+a
______________________________________________________
Get Your Private, Free Email at **********************
-----#5-------------------------------------------------
Subject: nuking script
>Subject: nukes
>
>>>>
>here you go heres the URL on my NukeNabber... now laong with this nuking
>topic... does anyone know of a way to nuke/kill people from a UNIX
>*shell*??? (i dont have root)
><<<
>
>Try a search for Nuke and IRC or DoS. You should find a lot of nukes
which
>you should be able to compile and run from a unix prompt. There are also
>precompiled nukes for windows around.
>
>There are also some mIRC scripts which integrate nukes into the irc
>client.
>
>Does anyone here have experience with mIRC scripting? I'd like to
integrate
>wnuke4.exe into the right popup menu.
>
>~~
>Ghiribizzo
>
Theres a script that has Winnuke, some other nukes, IPmask, etc. all in
it.. its called Sorcery our something... just do a search for it on those
mIRC scripts pages...
TecH_bOi
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at *******************
Or call Juno at (800) 654-JUNO [654-5866]
-----#6-------------------------------------------------
Subject: IDA Pro 3.75
I can get hold of IDA 3.75 plus updates for a year. However, my supplier
want's something in return. A licence generator for IDA (i.e. IDA.KEY
generator).
I won't be able to work on this until June/July, so if someone want's it
before then, please work on it and send to me.
~~
Ghiribizzo
=====End of Issue 214===================================
========================================================
+HCU Maillist Issue: 215 05/06/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: P-mode
#2 Subject: Better memory view questions, once more.
#3 Subject: 16 bit application
#4 Subject: Hacker Attack? New Forum Location
#5 Subject: IDA Scam - not Ilfak
ARTICLES:
-----#1-------------------------------------------------
Subject: P-mode
Hello Everyone
Loaded program LOCK32.exe into SmartChecker and it tells me
it's a P-mode program. Iam aware that there are a number of
different modes. Would anyone care to discuss aspects of
these modes?
cheers Rundus
______________________________________________________
Get Your Private, Free Email at **********************
-----#2-------------------------------------------------
Subject: Better memory view questions, once more.
Greetings to Iceman and to all others.
I have just received your answer, and I wiil study your references
in the coming days. I am pleased by YOUR answer, because I have already
read your article "WIN32"(20 March 1988) and I have found it the
best among all other articles on Fravia page, as it coincides with my
approach to the problem, and I am not enough competant to judge the
conclusions of the investigations. I briefly explain myself. I am critical
to most of the cracking essays on Fravia pages, because they advance in
the wrong direction: handicraftsmen in the computer age. A new,
"revolutionary" approach is needed to solve unsolvable (until now)
problems. The global vision of the problem is needed, as an OOP
approach in C++ programming. The author of +ORC lessons speak of the
Zen approach (Zen = oriental philosophical school). Christina Cifuentes
has written "Reverse Compilation Techniques" for obtaining the degree
of Doctor of Philosophy. While watching WinIce, first I do not look
for any particular instruction, but try to represent mentally the whole
process on the memory map inside Microsoft black box. As Microsoft
will not reveal its secrets, so the best document sources are outside,
and they are not so numerous: Schulman "Unauthorized Win95" and
Matt Pietreck (I have consulted only his Web page. I hesitate to
order his book, as it is rather expensive; and I am afraid that he will
repeat what has been already said by Schulman). The book of Schulman
has helped me to solve some practical problems. As for the tools
for debugging Windows applications, I appreciate Microsoft tools.
I know that their tools will not reveal what is not revealed in
Microsoft documentation. But contrary to Microsoft documentation,
Microsoft tools do not mislead: they just stop in the middle of
the road and do not advance further, leaving us with a lot of true
data related to threads and process without practical value, especially
in the memory co-ordinates. While watching WinIce we can see also
a lot of that mysterious data.
As for DLL import/export functions, I know that it is indicated
in the beginning of the file, as well as in WDASM list. I meant
if in all jumps and call binary codes the names of the files are not
encoded. For example, in WDASM list I see only references to system
DLL, and no reference to local DLL and help files. And how do they call
each other?
Most assembly books speak of the real mode and non-Windows programs.
As I have only an abstract concept of the protected mode, it is
difficult for me to see clearly a WIN95 process. Even for Schulman
not everything is clear. So I am not ashamed to admit it. I know
theoretically the differance between a linear and a physical adresses,
protected and virtual modes. But when I watch WinIce or any other
debugger, I cannot immediately say what mode is meant and if the
necessary conversion was made, and if I have to correct the debugger.
And for example WDASM: "Attach to an active process" - I could not yet
use it.
Thanks AZ111.
-----#3-------------------------------------------------
Subject: 16 bit application
When a 32 bit PE application is running, we can get its
Process-Control-Block and Module-Structure. From these,
we can get its PE image head, and then get its entry-point,
the first CS:EIP after loading.
For a 16 bit NE application, can I get the initial
CS:EIP runtime ?
to Iceman: Can you help me ?
Can you give me your email address ?
Thank you.
Liutaotao **********************
-----#4-------------------------------------------------
Subject: Hacker Attack? New Forum Location
Those of you who use the forum will know that it has been down for a few
days. It is now back up, but some of you like myself, will still have
problems accessing it. I think this is a problem with the DNS servers or
something as the forum has been shifted to a different server. I managed to
get the IP of disc.server.com using gthorne's web based nslookup (because,
obviously, my own DNS server wasn't resolving the new server correctly) and
so could get to the forum directly. The new URL is
****************************************** or you can follow the link from
my homepage.
The server has been down due to malicious hackers. Now Stone's site has
also been hacked and Fyodor's too. I wonder if there's someone out there
who doesn't like us...
BTW, the links at the top of the page will not work for some as it uses
disc.server.com rather than a direct IP number.
~~
Ghiribizzo
-----#5-------------------------------------------------
Subject: IDA Scam - not Ilfak
For those of you who were following the IDA 3.75 scam, I managed to find
the guy responsible. It was NOT Ilfak.
The guy is from Canada (hence the videotron isp) and the password was
mirror. He must have messed up the password. I don't have the files anymore
but try mirrroer and variations as that's how he spelled it when writing to
me.
He says that the next riddle and actual ZIP are no longer online.
~~
Ghiribizzo
=====End of Issue 215===================================
========================================================
+HCU Maillist Issue: 216 05/08/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: some attacks
#2 Subject: Re: Undelete Util for FAT32?
#3 Subject: Re: Decryption
#4 Subject: RE:Better memory view questions, once more.
#5 Subject: RE: 16 bit application
ARTICLES:
-----#1-------------------------------------------------
Subject: some attacks
> I am critical to most of the cracking essays on Fravia pages, because they advance in
>the wrong direction: handicraftsmen in the computer age. A new,
>"revolutionary" approach is needed to solve unsolvable (until now)
>problems.
Dear +friend, we are all handicraftsmen in the computer age, and there are
(unfortunately) not many "revolutionary" approaches. The best by far
(and last) one I have seen is +ORC's one, which is much more philosophical
than else.
What we need (we in my sense, of course) are FRESH, NEW, UNTAINTED
crackers. Not programmers, not coders, not helpdesk experts... crackers!
People that FEEL code! I'm not joking!
And in order to get them (if ever!) we MUST deliver 'dummy' lessons
or whatever to 'tease' them into action...
NEVER underestimate the people you don't know of. They maybe (may be)
the masters of tomorrow. (On the other hand: ALWAYS criticize
the people you already know of: they (may be) the obsolete conservatives
of tomorrow (and this seems to apply to some 'money publishing' gurus too...
The most dangerous ones (in my limited experience) are the ones that
take themselves too seriously. As soon as one believes that he is
"somebody", DISTRUST him!
You find/see/sniff/feel a cracker that does not put HIMSELF into
discussion? Forget him at once: he isn't worth.
As strange as it may seem in this aera of overbloated ID, the more
sure of yourself you are, the more moron you are. (Greek philosophs
of 600 B.C. knew that, we hab$ve forgotten this... :-)
> Subject: Hacker Attack? New Forum Location
I'm currently under heavy attack on my main site (and two other ones), yet
I'm defending AND I'm trying to counter-attack: culprits are from Canada
(at least I believe).
No Idea if they are the same that attacked Stone and Fyodor or not.
Fyodor, Stone, please contact me (secure) to discuss this. I'm retaliating
(alone, since +Alistair disappeared), but I'm (apparently) no getting
nowhere.
later
fravia+
-----#2-------------------------------------------------
Subject: Re: Undelete Util for FAT32?
Hi,
>I need a simple undelete utility for FAT32. One which checks the fat and
>reconstructs deleted files. Is there such an animal?
I've got one. It is called "RecoverNT"; you can download it from:
************************
Here is what's written in on-line help:
>RecoverNT is an undelete & file recovery program. RecoverNT is the only true
>32-bit recovery application available, and uses a true easy to use Windows
>interface. RecoverNT allows extraction of files from drives with damaged file
>systems, or where important information has been deleted. The program is
>compatible with all FAT file systems including FAT32 and NTFS file systems.
>The recovered files are displayed in a File Manager type interface with file
>name, size, date, extent of damage, and availability for recovery. The system
>also allows the recovery of whole directories and strives to retain the
>original directory structure.
It works nice under Windows 95, Windows 98 and Windows NT.
The program is not free, however the patch (crack) for trial version is available.
Sincerely yours,
Vladimir
Vladimir Katalov
Managing Director
Elcom Ltd.
***************************
************************ (Corporate site)
********************** (Freeware & Shareware from Russia)
ICQ UIN: 9835660
-----#3-------------------------------------------------
Subject: Re: Decryption
Hello,
> Does anybody know how to recover (deprotect) zipped files?
Do you mean breaking password-protected ZIP archives? If yes, there
are a lot of utilities available. Generally, they're using three
methods:
- brute-force attack
- dictionary-based attack
- "known plaintext" attack
I can recommend you to try the one I've written myself -- "Advanced ZIP
Password Recovery". Frist two methods mentioned above are implemented.
You can get more info and download it from:
*********************************
It is shareware ($15); unregistered version has some limitations.
Warning: I've seen some cracks for it, but all of them are not
complete. I've used the strong public-key encryption (RSA), and so
don't think that it can be cracked at all :)
Sincerely yours,
Vladimir
Vladimir Katalov
Managing Director
Elcom Ltd.
***************************
************************ (Corporate site)
********************** (Freeware & Shareware from Russia)
ICQ UIN: 9835660
-----#4-------------------------------------------------
Subject: RE:Better memory view questions, once more.
The imports from non-standard DLL's are coded in the same way as
imports from kernel32.dll and others "standard dll's".The best tool
to watch the calls made to this dll's it's Numega's Boundchecker.
You can create your own validation modules for those dll's
, compile them with a suported compiler and then set the error detection
level to maximum.Run the program from BC and watch.
Dozens of API calls , memory leaks , API failures , non-standard dll's
calls...A wonderfool tool
Understanding protected mode , segments , descriptors , gates it's
not very hard.It took me several weeks , but with a good reference
it's easy.The best reference is Intel's manual . I don;t remember now
exactly it's name but it's something like " Intel architecture Software
Developer Manual." It's available in electronic form ( .pdf ) . Try to
download it from Intel's WEB site.
The best debugger it's Numega's Softice . I use it to debug at both
source level and assembly level.
Iceman
______________________________________________________
Get Your Private, Free Email at **********************
-----#5-------------------------------------------------
Subject: RE: 16 bit application
16 bit windows applications are NE executables,They are not mapped
images , as PE files are.THe OS loads them in the shared
memory arena and use LDT to allocate code and data selectors to
be used by this program.Several days ago someone asked me the same
question.I told him to use the method described below , and
as far as I know he succeded.
A. Windows95
Windows 95 allows flat thunking.Therefore , we can call code from 16
bit dll's for our own use.Remember old , good toolhelp.dll?
It contains all you need to manipulate 16 bit modules.You have to "flat
thunk " from your 32 bit app to 16 bit code.You can do this
by using Microsoft;s thunk compiler or by undocumented means ,
as described by Matt Pietrek.
B:Windows NT
In NT the concept of flat thunking is inexistent.So the method described
before it's unusable.No problem , since NT give as
a whole set of functions for this. They are VDM Debug API
functions.This API is of an incredible power , you can even get
linear adresses fo classic MS_DOS programs running in a command
prompt.
One final word. Be careful , and once you get an linear adress for
a 16 bit selector don;t relay blindly on it.The best thing you can do is
to retrive this adress every time you want to write in such memory
area. THis is because the OS can change the base adress of
a selector during the global heap optimization process.
If you need more help feel free to caontact me.
Iceman
______________________________________________________
Get Your Private, Free Email at **********************
=====End of Issue 216===================================
========================================================
+HCU Maillist Issue: 217 05/08/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#0 Subject: Special addon from +Malattia... please read
#1 Subject: RE: Decryption
#2 Subject: re: P-MODE
#3 Subject: Next Generation of Crackers
#4 Subject: Zip password recovery
#5 Subject: Rre: Decryption.
ARTICLES:
-----#0-------------------------------------------------
Subject: Special addon from +Malattia... please read CAREFULLY! :)
Hi +All! :)
I would be grateful to you if you write directly to me when you think
anyone has done something wrong, like k0X did, and DON'T answer directly
on the list (like k0X did :)))))))
Unfortunately, even if you think you're right, and even if YOU ARE right,
this kind of messages is quite offtopic here, especially if you do have the
address to reply personally to the guy who did something "wrong".
Hey k0X, nothing personal, as I hope you understood from my PERSONAL mail!
And, just to return "on topic": k0X, why don't you explain us how you crack
Vlad's protection? I think it would be a good essay and a good demonstration
of how weak it is... useful for both +crackers and +programmers (yes, I
think even programmers can wear a plus if they deserve it!). Of course, the
challenge is open for EVERYBODY HERE!!!
Sorry if I made you waste some time reading these lines, I hope you
understand my position and wait for a feedback from you at _manhcu_ address
(NOT_ON_THIS_LIST_PLEASE!:))))
crack well,
+Malattia
-----#1-------------------------------------------------
Subject: RE: Decryption
>I can recommend you to try the one I've written myself -- "Advanced ZIP
>Password Recovery".
>it is shareware ($15); unregistered version has some limitations.
>Sincerely yours,
>Vladimir
Mr Vladimir...
This is no advertising place nor it is a market place ... We all post here
to learn more....
Please keep up with the guide lines and the "license agreement" of this
mail list ... Which i am sure you do know what it means. ;)
k0X
P.S. NOTHING is uncrackable... Even RSA...This is just publicity .. ;) ,
you have to get the proper tools for the job.
-----#2-------------------------------------------------
Subject: re: P-MODE
Are you sure that it is not a P-CODE program?Cause if not I do not know
about what you are talking.
Anyway P-Code is a kind of interpreted code.The run time interpretor
emulates a stack based procesor to cary out P-code operations.
Stack based processors operates preferentialy with the stack , the
operands are pop-ed from the stack and than the result is pushed
back.The emulated processor maintains two stacks , one for integers
and other , called coprocessor stack for floating point values.
The P-code model was used by old Microsoft Visual C compilers.
(1.5) and maybe others.
If your proggie is not a P-code but other thing , please give us more
details about ithe P-mode you want to be disscussed.
Greetings to all of you , Iceman
______________________________________________________
Get Your Private, Free Email at **********************
-----#3-------------------------------------------------
Subject: Next Generation of Crackers
>>>
What we need (we in my sense, of course) are FRESH, NEW, UNTAINTED
crackers. Not programmers, not coders, not helpdesk experts... crackers!
People that FEEL code! I'm not joking!
And in order to get them (if ever!) we MUST deliver 'dummy' lessons
or whatever to 'tease' them into action...
<<<
When I first started writing tutorials, I tried to recruit new crackers. I
released the crack for a program into Usenet with a message attached
basically saying "if you want to learn how to do this yourself take a look
at this web page..". Although there may be some new crackers due to this, I
found that I got more attention from the 'plz crack this' lot than from
anyone actually wishing to learn. I think in the end, the next generation
of crackers will find us, not the other way around.
I disagree with some of fravia's comments above. I think that programmers
who learn to crack can be of great help. We already have some great tools
(sice dumpers, installshield script decompilers etc.) which have come
directly because of the programming skills of some crackers.
In any case, it may be impossible to get 'untainted' crackers as a newbie
studying tutorials will necessarily be tainted with 'standard' techniques
and instruction found within the many tutorials available today.
~~
Ghiribizzo
-----#4-------------------------------------------------
Subject: Zip password recovery
You should try to use pkcrack (known plaintext) whenever possible. For
brute force, I recommend FZC (now ver 1.05).
FZC implements exhaustive search and dictionary attack. It is fast and
unlike AZPR, it is free.
~~
Ghiribizzo
-----#5-------------------------------------------------
Subject: Rre: Decryption.
Thank you for your answer. I well mean what I've said: "to recover"
and not "to break", because they are my own files I have protected
once and have lost the key. Secondly, I regularly protect some of
my files and I want to test their protection. Thirdly, I am not so
interested in brute-force or dictionary-based attacks (I have seen
such applications on the Web; BTW how many letters does support
your tool: 4, 5, 6?), but in a real decryption process, based on the
knowledge of the algorithme (Huffman). There some restrictions in
certain countries concerning encryption/decryption usage in communications,
but, as far as I know, no restrictions for internal home purposes:
exercises, tests, compiling/decompiling one's owm files. I think
the subject would be interesting for many readers of this list,
as it was never really discussed here. I mean how to compile a decryptor, or
how to apply a commercial one.
My best wishes.
=====End of Issue 217===================================
========================================================
+HCU Maillist Issue: 218 05/10/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: Re: Zip password recovery
#2 Subject: Re: Zip password recovery
#3 Subject: p-mode
#4 Subject: CryptKey
#5 Subject: Borg Disassembler v1.0
ARTICLES:
-----#1-------------------------------------------------
Subject: Re: Zip password recovery
>You should try to use pkcrack (known plaintext) >whenever possible. For brute force, I recommend >FZC (now ver 1.05).
I would also go along with that. Has anoyone
here tried to use pkcrack with a fragment of
plaintext?
I have an encrypted zip with a DLL in it, I have
a DLL which I know starts with the same bytes as the one in the zip (first 100 or so anyway).
When I look at the compressed versions of two
such dlls they differ in the first few bytes.
It seems to me that plain text fragment facility
in pkcrack is only useful if you have a fragemnt
of the compressed version of exactly the same file
(in which case you probably have the whole file anyway).
Anyone else looked at this and come to some
conclusion?
-----#2-------------------------------------------------
Subject: Re: Zip password recovery
Sheesh - 3rd time lucky.
Just wanted to add it was me (spyder) asking about
pkcrack and fragments, and me that just sent the empty message (fingers working faster than my
brain).
spyder
-----#3-------------------------------------------------
Subject: p-mode
Hello Everyone
Hello Iceman
It might be a few days before I can better explain with
regards to P-mode or P-code. Since Iam working on Display Doctor
and my screen keeps freezing up, maybe part of the protection
( I played with the generating of the password )or not compatible with
my video card. I could reload my old video drivers and get my computer
up and running. But if it is part of Display Doctor program's
protection, I don't want it to beat me.
cheers Rundus
______________________________________________________
Get Your Private, Free Email at **********************
-----#4-------------------------------------------------
Subject: CryptKey
Hi this is Muso,
I recently recieved a demo CD of the Protel PCB program which is a 30
days trail version. They use a commecial license system called
CryptKey. Does anybody know something about it? Any hints,
suggestions?
Hope to hear from someone...
Muso
Mu
-----#5-------------------------------------------------
Subject: Borg Disassembler v1.0
Borg Disassembler for PE exe's is now available.
Please help me in Beta testing this,
********************************************************
Thanks
Cronos.
=====End of Issue 218===================================
========================================================
+HCU Maillist Issue: 219 05/11/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: P-code
ARTICLES:
-----#1-------------------------------------------------
Subject: P-code
Hello Everyone
Hello Iceman
You are absolutely right it's P-code and NOT P-mode (thank you).
What can I say, except I hope it's the pressure of my heavy
workload and Iam not losing my mind.
Does anyone know what Service B is with regards to the operations
of a Video Card? I think there is a connection with the VxD files.
Tried contacting Diamond.com (DirectDraw Stealth 64 Video 2001 PCI)
for an answer and only get standard replies from their computer. It
will not allow me to talk to it's master.
Had to abandon work on Display Doctor.exe because of the above
problem. Has anyone worked on Display Doctor?
Any help is always greatly appreciated and it helps me sleep at
night.
cheers Rundus
______________________________________________________
Get Your Private, Free Email at **********************
=====End of Issue 219===================================
========================================================
+HCU Maillist Issue: 220 05/12/1998
--------------------------------------------------------
Send Articles To:......................... *************
Info, Help, Unsubscription, etc:....... ****************
Web Repository.........................hcuml.home.ml.org
========================================================
CONTENTS:
#1 Subject: IDA
#2 Subject: none
#3 Subject: Repository updated
ARTICLES:
-----#1-------------------------------------------------
Subject: IDA
Does anyone have a idb/idc file for ida.wll which has the functions renamed
(e.g. _522 renamed to something meaningful). If so, and you are willing to
share, please contact me.
Also, does anyone have the IDA SDK? I've obtained IDA375 fully regged. I've
already dcc'd it to a few people on IRC. Hopefully it will be spreading
around. Anyone with very fast FTP space, please contact me.
Also, you can get it from me via DCC if you have a fast connection. I'm
usually on IRC at midnight GMT (+/- 3 hours). (or if you see GhiriFTP, FTP
to it's IP address and anon login)
~~
Ghiribizzo
-----#2-------------------------------------------------
Subject: none
Hello JaZZ (I'm hoping you're on this list),
Congratulations for your very interesting essay on Corel Ventura...there's
a few things I'd like to discuss with you regarding the Corel/Elan scheme
etc., please contact me: **********************
Cya,
+ReZiDeNt
-----#2-------------------------------------------------
Subject: Repository updated
Hi +All! :)
I'm sorry the repository hasn't been updated in the last month... this night
I'll upload all the back issues until this one! Also, I'll try to find the
time to update my secret page too ;)
byez,
.+MaLaTTiA.
=====End of Issue 220===================================