• mooose (unregistered) in reply to ammoQ
    ammoQ:
    Ekklon:
    A typical person would use google and download the "crack" that does exactly the same, but automatized. I know lots of people who does it.

    IMO anyone who downloads a crack and uses the same computer for anything important, e.g. internet banking, is at least grossly negligent.


    VMWare + XP + limited user account = win.

    Captcha: [_____] ma nizzle
  • (cs) in reply to CDarklock
    CDarklock:

    ParkinT:

    Now you make me feel *really old*.

    Dude, your sig was part of the tagline file distributed in Mustang Software's OLX over 15 years ago, which almost guarantees you're a part of the BBS generation. Not only SHOULD you feel old, you should be *lording* it over all those little whippersnappers who don't even know the difference between RS-232 and RS-422.

    Just like me. Why, I remember being EXCITED when I got my first 1200 baud modem! And even MORE excited when it didn't need the phone receiver strapped onto it!

     


    Some of us under 30 know what RS-232 and RS-422 are, I can just never remember that it's 422 and not 458 or 485 or any other 4XX number. :D



    My first modem was also 1200 baud, but I wasn't very excited about it, because it was 1994! :( (once it got zapped in a thunderstorm it's 14.4k replacement was much more warmly recieved.)

  • allo (unregistered)

    Hm, what if you simply delete the file or delete both keys?

    a fail-resistant program would recreate it, with a new date. This is not that efficient, but it works on some more programs.

    captcha: error

  • (cs)

    Jenny, Jenny...

    Who can I turn to?

  • Your Ma (unregistered)

    I've got a much better registration WTF than any of yours.

    Back when I was at my first job, I was double-jobbing at my day job as a programmer and my night job in a fast food place. The fast food job was one that I had in college, and was only meant to tide me over until the company I'd started working for had enough money to start paying me properly.

    Only, two months into the job, they still hadn't payed me squat.

    At this point, I was a little pissed, so I talked to my bosses to get them to pay me something, anything. I couldn't get them to budge, so I suggested that I'd take ownership of my dev workstation until such time as they paid me the money I was owed. They weren't even slightly happy with the idea, and I left the company at the end of the week.

    When I was leaving, I decided I'd might as well get some recompense for my work, so I grabbed the Visual Studio 6 installation CDs along with the rest of my stuff. Little did I realise that the discs didn't come the product key on the jewel case as well as the box.

    So here was me with what appeared to be a useless copy of VS6, so I decided to try a few guessed product keys just for fun. The second one I tried was all zeros, and lo-and-behold, it worked! My guess is that whoever wrote the installer left it as a back door for testing and never thought to remove it, or it accidently fell out of the code for validating keys.

  • (cs) in reply to GoatCheez
    GoatCheez:
    ...
    At least the guy didn't re-invent the wheel like Jed did.
    <font size="5">I</font>n my opinion, Jed invented the three-sided wheel--he didn't make it to the round version.
  • (cs) in reply to triso
    triso:
    GoatCheez:
    ...
    At least the guy didn't re-invent the wheel like Jed did.
    <font size="5">I</font>n my opinion, Jed invented the three-sided wheel--he didn't make it to the round version.


    In the JED.NET framework, anything implementing the IIsMostlyRound interface is presumed to be a wheel.
  • (cs) in reply to Your Ma
    Anonymous:

    I've got a much better registration WTF than any of yours.

    Back when I was at my first job, I was double-jobbing at my day job as a programmer and my night job in a fast food place. The fast food job was one that I had in college, and was only meant to tide me over until the company I'd started working for had enough money to start paying me properly.

    Only, two months into the job, they still hadn't payed me squat.

    At this point, I was a little pissed, so I talked to my bosses to get them to pay me something, anything. I couldn't get them to budge, so I suggested that I'd take ownership of my dev workstation until such time as they paid me the money I was owed. They weren't even slightly happy with the idea, and I left the company at the end of the week.

    When I was leaving, I decided I'd might as well get some recompense for my work, so I grabbed the Visual Studio 6 installation CDs along with the rest of my stuff. Little did I realise that the discs didn't come the product key on the jewel case as well as the box.

    So here was me with what appeared to be a useless copy of VS6, so I decided to try a few guessed product keys just for fun. The second one I tried was all zeros, and lo-and-behold, it worked! My guess is that whoever wrote the installer left it as a back door for testing and never thought to remove it, or it accidently fell out of the code for validating keys.



    Using all "1"s would work too, IIRC.

    Not that I ever DID that.
  • (cs) in reply to HitScan
    HitScan:
    CDarklock:

    ParkinT:

    Now you make me feel *really old*.

    Just like me. Why, I remember being EXCITED when I got my first 1200 baud modem! And even MORE excited when it didn't need the phone receiver strapped onto it!

     

    My first modem was also 1200 baud, but I wasn't very excited about it, because it was 1994! :( (once it got zapped in a thunderstorm it's 14.4k replacement was much more warmly recieved.)


    My first modem was 300 baud, with no autodial/autoanswer.  In fact, you had to flip a switch to switch from originate/answer-mode carrier tone.  And, you had to dial manually on a telephone, then when you heard the carrier from the other computer, you had to unplug the headset and plug it into the modem.  It was great fun manually redialing a one line BBS for hours while busy.  It was called a HesModem.  You can probably google it.  And all this for a data transfer rate where you could read the words faster than the host could send them.  This was back probably around the mid 80's.  Great times, though.
  • (cs)
    Anonymous:
    <FONT face="Times New Roman">Hehe. This is much more "user friendly" -- tell the user what the issue is, and how to fix it. It's great! Think how helpful this design could be for lost passwords:</FONT>
    <FONT face=Arial>An incorrect password was entered.
    Was: p@ssw0rd
    Expected: pa$$word</FONT>


    PASSWORD OVERRIDE

    Captcha: 1337 (spelled correctly -- sw337!)

    Microsoft Bob had a "feature" whereby if you entered your password wrong three times it would just say something along the lines of: "have you forgotton your password? [Yes]/[No]". click yes - "Please enter a new password" - that is security

  • (cs) in reply to oggiejnr
    oggiejnr:

    Microsoft Bob had a "feature" whereby if you entered your password wrong three times it would just say something along the lines of: "have you forgotton your password? [Yes]/[No]". click yes - "Please enter a new password" - that is security



    Of course, we can presume that anybody who installed Microsoft Bob didn't really have anything worth hiding anyway.

    The minute I typed "Microsoft Bob," hives broke out on my arms.
  • SomeCoder (unregistered) in reply to Benjamin Smith

    Anonymous:
    There are lots of posts about poorly written authentication - as though the authentication really HAS TO BE PERFECT AND UNCRACKABLE in order to work. The truth, however, is quite different. Stupid schemes such as writing "RunsRemaining=30" in an ini file is PERFECTLY SUFFICENT to stop most users. There are a very few people who will actually look into an obscure file in the Windows directory to look for this. 99.99% of everybody else will call and get an updated license, and pay the $50 to not have to see the message. CAPTCHA=stfu

     

    I agree to an extent.

    Once I had to write a key/licensing logic piece to some software that was going to be deployed to various workstations.  The software had a very small user base and it was designed before the internet became quite so ubiquitous.  Anyway, I don't remember all the details but essentially, it stored time information in a file on the user's hard drive to determine if the clock had been tampered with and such.  It worked really well but if you thought about it for a few minutes, you could easily get it to give you access forever.  No, I didn't store time information in plain text format - it was hashed in some way.  I don't really remember.  Anyway I didn't feel too bad about it because the client never wanted to pay me and kept reminding me that they were "non-profit" to which I kept reminding them that I was "for profit" and I'm not giving my services away for free so I can get into heaven.

    The client may or may not have been affiliated with a certain large religious group most often associated with one of the western states :)

    The topic is still a WTF though.

     

  • (cs)
    Alex Papadimoulis:
    ...

    [image]

    This problem looked like it just might be as difficult to solve as Aunt Josie's "please insert the second disk to continue the installation" dilemma of 2004. Noah called up Brian and was greeted with a simple "Hello." He inquired about renewing the Legalese Pro software and received this terse reply:

    "Sorry bud, I don't do that any more. Can't offer ya' any help with it, either. Gotta run. Adios!"

    ...
    <font size="5">B</font>rian is missing out on a real cash cow.  He could easily sell yearly, or longer, licenses for the software and email people a new <font face="Courier New">licence.key</font> file.
  • (cs) in reply to rmr
    rmr:
    ...
    Not quite a hack, but I was pretty proud of cracking the save game feature in the Lord of the Rings game for the Super Nintendo.  It required you to type in a long string of letters and numbers (and to write down the string in order to "save" the game).  My friends and I realized that different substrings of the save string represented the members of the fellowship, their levels, and their inventories.  There was also a section that indicated the progress through the game of the fellowship, and the last part was the group inventory.  So it was pretty easy to change the section of the string that specified the location of the group and teleport around the world.  Or you could add all the members of the game to your group from the very beginning (along with high levels and the best equipment).  Good times.
    Don't be so modest.   That is a perfectly good hack.  I hope you shared it with other people.
  • (cs)

    I was using some trial software a while back of a very popular photoediting suite that ran out after 150 days. Unfortunately for the first 160 days of the trial i didn't use it due to other commitments.

    When I finally did get around to using it, I found that my trial was over and I needed to register. I thought to myself, I wonder if just turning back the system clock a year would let me at least trial the program, and to my surprise, worked like a charm.

  • (cs) in reply to HitScan

    You kids and your fancy 1200 baud modems!

    I started with a 300 baud accoustic-coupled, manualy switched Heathkit modem!

  • (cs)

    Any registration scheme based on dates is going to fail, ultimately. As I see it, there are three levels of cleverness in determining the date. All of them can be broken:

    1. Just trust the system date. Any moron can fiddle with the date. Weakest method.

    2. Get the date from an Internet time server. A little stronger, but anyone with skill could configure their network to spoof the time server and give bogus timestamps.

    3. Get a CRYPTOGRAPHICALLY SIGNED timestamp from a well-known, trusted public server. This guarantees the timestamp can't be spoofed. Again though, it would be possible to configure the network to delay delivering the timestamp so that it is stale by the time it reaches the program. Or the binary itself could be hacked to return a bogus timestamp, or the entire dependence on timestamps could be chopped out.

    Ultimately the battle is hopeless.

  • (cs) in reply to Your Ma
    Anonymous:
    So here was me with what appeared to be a useless copy of VS6, so I decided to try a few guessed product keys just for fun. The second one I tried was all zeros, and lo-and-behold, it worked! My guess is that whoever wrote the installer left it as a back door for testing and never thought to remove it, or it accidently fell out of the code for validating keys.


    No, it wasn't a backdoor, it was just a very poor mechanism. IIRC, the way it worked was that they added all the numbers in the CD key you presented and took it modulo a constant; if and only if it was 0, the key was accepted. In this era, a CD key such as 123-123456 would also work. (Once they moved to the ([A-Z0-9]{5}-){4}[A-Z0-9] keys they use now, that trick no longer worked.)
  • (cs) in reply to Isuwen
    Isuwen:
    That 1337 ?p34k article was hillarious. And it totally failed to address the form's real orgins in gaming. The point was that you could type stuff in a game without taking your hand off the mouse. Most 1337 ?p34k can be typed with the left hand using the number pad and characters near the arrow keys.


    Gaming?  I thought l33t predated online gaming, and the main purpose was to defeat keyword searches.
  • Bob Jones (unregistered)

    "Legalese Pro" doesn't exist.  Is this article a hoax?

  • Anti-Tester (unregistered) in reply to smxlong

    smxlong:
    Ultimately the battle is hopeless.

    Duh. Of course it is going to be hopeless. As long as all of the code is executed on the client machine, the executable can be changed (checks cut out, stuff can be spoofed, etc.) and all of that good stuff. The point is that the protection only needs to be good enough to keep out "normal" users (the problem gets a little worse when you're selling software for techies). In the article, this did keep out the "normal" user, so even a check this sad still worked.

  • (cs)
    Anonymous:
    I did a "accidentally hack" on a game.

    The game was carmagedoom. A driving game with a good phisic engine. I whas hacking the vehicles description data (that whas encoded) to create a new vehicle with more mass and acceleration. Because the enconding was somewhat hard. But I notice that you can feed some data to carmageddom, and he will encode it, I tried with encoded data and the result whas clear text!... so the carmageddom encoding whas very good with a fatal error: work like rot13, double encoding result on the source text.

    Other people figure out how to decipher the code, but I use the carma.exe to decode his on protected files and hack it :D

    [image]
    <align=left><align=left><font size="-1"></font></align=left></align=left>














    And that was the long way around entering the cheat code of 'IBETYOUCANTPRINTCUNT' which would decode the control files for editing.  I don't know how many hours I wasted playing that in the college computer labs.  That and Starcraft.  Ah the good old days.


  • JoeBloggs (unregistered) in reply to Bob Jones
    Anonymous:
    "Legalese Pro" doesn't exist.  Is this article a hoax?

    "Names have been changed to protect the guilty"

  • (cs) in reply to ParkinT
    ParkinT:

    Anonymous:
    i remember the first time i 4ax0red a program--i was like 12, i heard rumours that on aol it was required to put the serial number somewhere within the program but obviously not tell the public...so one program (i think it was lprint or something) and i just typed in my name and typed in their zip code for the cd-key and lo and behold it actually worked.  it was the only program  i was ever able to do this trick with so i dunno how true this rumour was.        

    Now you make me feel *really old*.

    When I was 12 AOL did not exist yet.  Actually, the Internet did not exist.  DARPA had not started a network.  There were no personal computers.

    However, I could play PONG at the local arcade (or bowling alley) for a quarter!


    Neat trick, seeing as PONG couldn't have been in a local arcade until 1972, while the first ARPA network was up in 1969 (between four universities).  It became DARPA in 1971.

  • Charles Perreault (unregistered)

    Almost too simple...  I remember, in the good old days, when almost all shareware / demo software were also checking the system clock for license expiration.  One of my first personnal project was a wrapper calling an "exec" system call to launch any program after changing the date for 1990 then setting it back to the correct value after the program quitted.  And I don't think that is/was illegal :)

    Ahhh souvenirs, souvenirs...
    ----
    P.S. (souvenirs is memories in French)

  • Me (unregistered)

        My favorite go at being a 'h4x0r' was CD Keys for games. Using the CD filled with just 2's or 3's installed Quake 3. Starcraft worked with 12345678901234... or somthing similar.

  • (cs) in reply to John Bigboote

    <FONT face=Tahoma>

    John Bigboote:

    The minute I typed "Microsoft Bob," hives broke out on my arms.
    </FONT>

    <FONT face=Tahoma>lol</FONT>

  • Bigwig (unregistered) in reply to Me

    The battle against Crackers can't be won with most methods. A committed cracker can change the bytecode without problems and thus render 99.99% of protections useless, unless strong cryptography and trusted verification servers are used.

    captcha: batman

  • rob_squared (unregistered) in reply to John Bigboote
    John Bigboote:
    Anonymous:

    I've got a much better registration WTF than any of yours.

    Back when I was at my first job, I was double-jobbing at my day job as a programmer and my night job in a fast food place. The fast food job was one that I had in college, and was only meant to tide me over until the company I'd started working for had enough money to start paying me properly.

    Only, two months into the job, they still hadn't payed me squat.

    At this point, I was a little pissed, so I talked to my bosses to get them to pay me something, anything. I couldn't get them to budge, so I suggested that I'd take ownership of my dev workstation until such time as they paid me the money I was owed. They weren't even slightly happy with the idea, and I left the company at the end of the week.

    When I was leaving, I decided I'd might as well get some recompense for my work, so I grabbed the Visual Studio 6 installation CDs along with the rest of my stuff. Little did I realise that the discs didn't come the product key on the jewel case as well as the box.

    So here was me with what appeared to be a useless copy of VS6, so I decided to try a few guessed product keys just for fun. The second one I tried was all zeros, and lo-and-behold, it worked! My guess is that whoever wrote the installer left it as a back door for testing and never thought to remove it, or it accidently fell out of the code for validating keys.



    Using all "1"s would work too, IIRC.

    Not that I ever DID that.


    Yeah, worked with Office 97 or anything released thereabouts.  Everyone did that at my school until I brought in a copy of 2K.  That's one of 2 product codes I ever memorized because I installed it so many damned times.

    As for "security" measures.  I had a program that let you adjust the size limit for doing a certain activity, but since it communicated with a central server, I never tried it for fear of being bitch-slapped over TCP/IP.

    camptcha: stfu (fine, I will)
  • M (unregistered) in reply to Bigwig

    That "unless..." is also wrong...

    Especially when that works as a "wrapper" for the program itself, you just dump it to a file, and have it load up again later. I believe methods like this were popular against use-preventers (otherwise known as copy protection - copies needing protection indeed!) for games a while ago.

  • /dev/random (unregistered) in reply to OOB
    OOB:

    Haha... sad really because anything that looks at the date for anything can be fooled by setting you system clock back. Unless of course they go out to the internet to get the time but who would use that?



    I suspect you could even fudge that by dropping a packet sniffer to see which NTP server the connection goes to. Change your /etc/hosts(or whatever windows uses) file and point the ip/dns name to your local machine running NTP at your desired date and time.
  • jbange (unregistered) in reply to Zid

    "<font size="5"><font size="3">I do tricks like this practicly every week, had a few that were just change 0x74 to 0x75 (single jz / jnz) and it'd work beautifuly."

    I'm a fan of 0x90 (NOP), personally. Make it forget the whole thing.
    "you don't need to see his identification"
    "we don't need to see his identification..."
    </font></font>

  • Ken (unregistered)

    This reminds me of a major sale of big budget product X on license to an Arabic country.  The license key was generated to expire a year hence and sent to the client.  Some time after the expiry software vendor X contacted them and asked them why they did not renew.  They had no idea it was expired, they were running a totally different calendar and had a few more hundred years to go.

  • maths?? (unregistered) in reply to Isuwen
    Isuwen:
    That 1337 ?p34k article was hillarious. And it totally failed to address the form's real orgins in gaming. The point was that you could type stuff in a game without taking your hand off the mouse. Most 1337 ?p34k can be typed with the left hand using the number pad and characters near the arrow keys.

    ... that's not the origin at all.
  • Sch3lp (unregistered)

    Was "3773" a deliberate mistake? :) (I don't know about you guys, but I haven't heard of "ette-speak" up until now)

    Anyways, stuff like this doesn't surprise me anymore.
    Sad really, I can only hope these things only happen in older software. (although some WTF's prove the opposite)

  • Sch3lp (unregistered) in reply to Sch3lp
    Anonymous:
    Was "3773" a deliberate mistake? :) (I don't know about you guys, but I haven't heard of "ette-speak" up until now)

    Anyways, stuff like this doesn't surprise me anymore.
    Sad really, I can only hope these things only happen in older software. (although some WTF's prove the opposite)


    Disregard my first remark. I knew I should have ctrl+f'ed on 3773 in the comments first :)
  • sriku (unregistered) in reply to Sch3lp

    I actually have a cousin who was smart enough to pull the system date back to the 90's to get a software to work...sadly, where i'm from (india), nothing is sacred...license-key's are bypassed without even the slightest tug on the conscience....as a developer myself, that depresses me...but as a hacker...hehe welcome to india, have a nice day...:)

  • benjamin disraeli (unregistered)

    This post made me reminisce my elite hacking. As a 12 year old I cracked Duke Nukem 3D.

    As a piece of history, Duke Nukem 3D's original release was censored in Australia. It just so happened that shortly after the release of the (uncensored) shareware release, a gunman run amok and massacred a bunch of people, meaning the government was overly sensitive and when it came time to rate the full game, it was banned.  Instead of working around the problem or editing out certain elements, the game's distributor just decided to turn the games built-in "Kids Mode" function on which censored the game to a ridiculous degree.

    The duke3d.ini file just contained something like AdultMode=0, Password=FjCxlas8x, but I found that if duke3d.exe found adultmode=1, it would set it back to 0 and tell you to run it again. I fired up DOS edit (not even a hex editor) and changed the first "0" i found to a 1. Suddenly it enforced adultmode=1. It wasn't very glamorous, and 2 days later I found a real patch that removed it properly on some BBS, but even as a 12 year old I laughed at their lack of security.

    It also turns out that within 2 weeks pretty much everyone in Australia was playing the full cracked game, and the government tried to pull it off store shelves. But because the distributor had explained that the full content was on the disc and the only censoring was in the game engine (sort of like an inverse of "Hot Coffee") it was deemed illegal to do so and the couldn't. Within a few months they released the proper version anyway.

    (I also seem to recall that UNIVBE (remember that?)'s registration program (register.exe) had hard-coded serial numbers in it for Pro, Ultra, and Lite, or something like that. All you had to do was unpack it and read the number out. I wonder if they were just backdoor serial numbers for testing or if everyone who bought UNIVBE got that same serial number.

  • Martijn (unregistered)

    The real WTF is all the people deriding this simplistic security scheme, that apparently fooled somebody who could use the words "extract", "database" and "excel" correctly in a single sentence, whilst they spend many days, weeks or even months on implementing security schemes which are NOP'ed out by hackers in a few minutes.

    The truth is; unless you're willing to spend a lot of time and money on stopping hackers, this simple security scheme works just as well as any other for 99% of the user-base. Or you could spend that same time and money on improving or marketing the product.

  • RichNFamous (unregistered)

    Hahahaha...this one made the other folks in the office wonder what I was chortling about for 3 whole minutes...

    So I guess Brian's out of a job because of that?

  • Zlodo (unregistered) in reply to RichNFamous

    I always like poorly designed protections.
    I remember a shareware Amiga app that used a keyfile-based protection. The keyfile was basically some encrypted data, and some function checked whether it was good and returned some flags.
    This would already be very easy to crack, but the decryption and verification function was in the keyfile... The keyfile was basically a shared library loaded at runtime, with a function called by the application to ask whether the registration data was good.
    I made a library to put in place of the keyfile, with a function that just returned what the app expected, and that was it.

    The app was so good that I ended up paying for it anyway (althought it may have been caused by the fact that the author, for some reason, stopped distributing demo versions of it altogether at some point)

  • Anon (unregistered) in reply to Isuwen
    Isuwen:
    That 1337 ?p34k article was hillarious. And it totally failed to address the form's real orgins in gaming. The point was that you could type stuff in a game without taking your hand off the mouse. Most 1337 ?p34k can be typed with the left hand using the number pad and characters near the arrow keys.


    Actually, thats completely wrong. As any BBS user from the early 90s will know, 1337 speak has always been a way for kids online to try and be "cool" and "different". It was in use well before there were online games, back in the days when you played games with joysticks and loaded them from floppy disk. Player 2 was the guy next to you with the other joystick, not someone else around the world. So not only were your hands not even near any number keys, there wasn't anyone to send 1337 speak to.
  • (cs) in reply to [ss]

    Anonymous:

    Anonymous:
    <FONT size=5><FONT size=3>I do tricks like this practicly every week, had a few that were just change 0x74 to 0x75 (single jz / jnz) and it'd work beautifuly.</FONT>
    </FONT>

    oh yeah, you are real "krakzor". try to make a keygen instead of patching conditional jumps.

    i don't understand how this type of protection like "bpx MessageBoxA, here's your serial number" will stop anyone.

     

    *yawn* + LOL (if that's possible)

    If you put any kind of cracking reference into a computer geek forum, you inevitably get beef between a couple of guys desperately trying to be kewl by showing that they know how to type "cracking tutorial" into google... and that they can read.   Great WTF Alex, really made me giggle and hopefully these 2 will carry on thrashing it out for a while demonstrating their mega-trega-1337 skillz.

    Giant who cares to both of you.

  • Rudy (unregistered)

    Makes me remember of two of my most brilliant kr4kz.

    1. I ran Windos 3.1 and wanted to install a famous wysiwyg editor. It asked me the serial number. I had a computer magazine on my desk, with that program's review inside. There was a screenshot of the "about" screen with a tiny serial number. It worked.

    2) I came across a copy of Windos 3.1 update. It didn't want install on the empty hard drive: it complained about not finding any Windos 3 on the drive. I had no 3.0 either. I just mkdir'ed C:\WIN and echoed some characters into WIN.COM. The update worked.

    Rudy
    (Italy)

  • (cs) in reply to Rudy
    Anonymous:
    2) I came across a copy of Windos 3.1 update. It didn't want install on the empty hard drive: it complained about not finding any Windos 3 on the drive. I had no 3.0 either. I just mkdir'ed C:\WIN and echoed some characters into WIN.COM. The update worked.
    Heh, that reminds me when I was installing Office 97 on my first job - the company bought upgrade for all their computers, but a few of them had to be completely reinstalled, so Office wanted diskette from older version. I found out that it was enough to point the Office97 setup to the first floppy of it's own install on the network drive (the one from which I was running the installation).
  • (cs) in reply to ender

    I agree that a good security algorithm isn't really worth the effort (except it can be fun to see just how obscure you can be!), but seriously, telling the user what the key ought to have been? WTF?

    I think you ought to go slightly beyond a plaintext date in an INI file, even for ordinary Joe. A slightly hashed registry key/user info file is probably good enough for any product under $100, though (unless it's for developers/kids).

  • (cs) in reply to oggiejnr
    oggiejnr:
    Microsoft Bob had a "feature" whereby if you entered your password wrong three times it would just say something along the lines of: "have you forgotton your password? [Yes]/[No]". click yes - "Please enter a new password" - that is security


    A coworker has a bootable floppy disk that resets all Windows passwords. The Ophcrack Live CD has the advantage, though, of allowing you to read encrypted files because the password that Windows stores using one or more different insecure hash algorithms is the same that's used to generate the file encryption key.

    smxlong:
    3. Get a CRYPTOGRAPHICALLY SIGNED timestamp from a well-known, trusted public server. This guarantees the timestamp can't be spoofed. Again though, it would be possible to configure the network to delay delivering the timestamp so that it is stale by the time it reaches the program. Or the binary itself could be hacked to return a bogus timestamp, or the entire dependence on timestamps could be chopped out.


    Actually, that would be very similar to a replay attack, and such attacks are easily thwarted using a proper challenge-response technique.

    Ultimately, though, a hacker with sufficient resources can just remove all the cryptographical copyprotection stuff from your application. That's why we need "Trusted Computing" so that big brother Microsoft can just turn off users not abiding to the wise and just Oceanian laws.

  • (cs)

    Well, duh, "no, stupid, the password isn't 'soy bean', that's yesterday's password. Today's is 'pancake'. ...oops..."

    When I was in school, we had some educational programs. For DOS. Written in QuickBasic or something. Got bored in the computer class* and found out that the licence key and some sort of checksum was in a file. Changing the name made the program display "A rather sorry end" in Finnish, and nothing else. I stuck in an anagram of the licencee name and the program run just fine. If I had been bored enough, I might have figured out the checksum system, but in no way I will admit I was geeky enough to WaReZ educational software from school and it's probably rotting somewhere in an awful huge stack of floppies somewhere. ...oops... (well, actually, I can't remember if I did, maybe I just have a hazy memory =)

    * weird how I could get temporarily bored on a computer class. At least we had programming too (GW-BASIC and PC Logo, and the l33test kids in the class programmed in Turbo Pascal in home!). Nowadays, they only seem to teach kids how to start up Word or double-click that Internet icon thing...

  • (cs) in reply to Bob Janova
    Bob Janova:
    I agree that a good security algorithm isn't really worth the effort (except it can be fun to see just how obscure you can be!)


    I guess that depends on why you make the effort.

    One prime example is Skype. Their code is encrypted, obfuscated and armed-against-debuggers six ways from Sunday. :-(
  • cavemanf16 (unregistered) in reply to Dazed

    And how many 12 year olds do you know using "Legalese Pro"? The point remains that this was "good enough" security when the program was written. Obviously stumped the lady who was using the program!

    And you would be amazed at the number of solo, small, and even medium-sized law firms out there with some of the most abysmal computing policies, procedures, and software that I have ever seen in business. My wife got a 3.5" floppy disk with one .doc file on it from a medium-sized firm less than 6 months ago for a case she was working on. Guess who was able to hex-edit that entire disk to find out all kinds of info about other cases they had worked on?  (They were even so cheap as to use a Gateway backup floppy that had been erased (not reformatted) for reuse to send these electronic docs around. I only found this out because my wife and I were unable to read the FAT8 blocks on that stupid thing with Windows XP and I had to 'hack' the thing just to find the .doc file she needed. In the process I found out all kinds of other fun stuff on that disk. Stupid!)

Leave a comment on “Lock In Key Security”

Log In or post as a guest

Replying to comment #:

« Return to Article