469,271 Members | 1,322 Online
Bytes | Developer Community
New Post

Home Posts Topics Members FAQ

Post your question to a community of 469,271 developers. It's quick & easy.

How did they Hack my VB6 EXE passwords inside my APP???

I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!

Any thoughts out there?
Thanks
-stone
Jul 17 '05 #1
5 11787
"Stone" <x@y.com> wrote in message
news:wL********************@news4.srv.hcvlny.cv.ne t
I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!


any EXE can be disassembled but from what you describe it probably wasn't
required. Even viewing the compiled EXE in notepad you can see text
literals from the source so those passwords are probably plainly visible.
At the very least you need to have some sort on encoding or encryption on
the embedded passwords.

Jul 17 '05 #2
On Tue, 29 Jul 2003 19:30:42 -0700, "Bob Butler"
<ti*******@nospam.com> wrote:
"Stone" <x@y.com> wrote in message
news:wL********************@news4.srv.hcvlny.cv.n et
I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!


any EXE can be disassembled but from what you describe it probably wasn't
required. Even viewing the compiled EXE in notepad you can see text
literals from the source so those passwords are probably plainly visible.
At the very least you need to have some sort on encoding or encryption on
the embedded passwords.


So what would be a good encoding method? What about doing a bit-level
Xor with some odd string?

--
Running MS VB 6.0 Pro (SP5) on Win2K-SR2
Jul 17 '05 #3
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess what,
00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with nulls in
between
the letters...

So much for a stupid password design...
-stone

Jul 17 '05 #4
"Stone" <x@y.com> wrote in message
news:9S*********************@news4.srv.hcvlny.cv.n et
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess
what, 00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with
nulls in between
the letters...


actually it's just that the text is stored in Unicode

Jul 17 '05 #5
On Wed, 30 Jul 2003 12:28:53 GMT, "Stone" <x@y.com> wrote:
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess what,
00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with nulls in
between
the letters...

So much for a stupid password design...
-stone


Yup - that is Unicode - or IMO 'Unicrud'

I suggest that you use this cracking 'experience' to have some fun

Obviously, as I and others have pointed out, the password protection
is easy

However, you could have some 'plain text' passwords in your system,
clearly in view for a text or hex editor ....

And when one of those is entered something frightening could happen
- nothing destructive ... but nicely terrifying
- Red screen - Warning ... Entering System Edit Mode
... Revert Registry ... Re-Assign Drive Mapping

You could even delete the EXE
.... copy to a c:\temp\xxx.tmp run that to delete the first EXE
Jul 17 '05 #6

This discussion thread is closed

Replies have been disabled for this discussion.

Similar topics

3 posts views Thread by Haines Brown | last post: by
15 posts views Thread by Dino Vliet | last post: by
5 posts views Thread by Macca | last post: by
7 posts views Thread by VK | last post: by
19 posts views Thread by Cord-Heinrich Pahlmann | last post: by
reply views Thread by zhoujie | last post: by
reply views Thread by suresh191 | last post: by
By using this site, you agree to our Privacy Policy and Terms of Use.