473,395 Members | 1,974 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

How did they Hack my VB6 EXE passwords inside my APP???

I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!

Any thoughts out there?
Thanks
-stone
Jul 17 '05 #1
5 12071
"Stone" <x@y.com> wrote in message
news:wL********************@news4.srv.hcvlny.cv.ne t
I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!


any EXE can be disassembled but from what you describe it probably wasn't
required. Even viewing the compiled EXE in notepad you can see text
literals from the source so those passwords are probably plainly visible.
At the very least you need to have some sort on encoding or encryption on
the embedded passwords.

Jul 17 '05 #2
On Tue, 29 Jul 2003 19:30:42 -0700, "Bob Butler"
<ti*******@nospam.com> wrote:
"Stone" <x@y.com> wrote in message
news:wL********************@news4.srv.hcvlny.cv.n et
I have a compiled Pcode VB6 application with 1 published and 9
never-published
alphanumeric string contants embedded in the program for passwords.

The code simply has lines like this in a FORM to use as a cheap access
match.
A(1)= "sbddy-ttqxfg
A(2)= "hidvh-deehg

I started getting 50 downloads an hour and traced this back to a site
that listed ALL 10 strings on the web, and my site URL.

I work at home and this source code has NEVER been out of my office.
How was this cracked? How how how? I thought VB6 could not be
disassebled!


any EXE can be disassembled but from what you describe it probably wasn't
required. Even viewing the compiled EXE in notepad you can see text
literals from the source so those passwords are probably plainly visible.
At the very least you need to have some sort on encoding or encryption on
the embedded passwords.


So what would be a good encoding method? What about doing a bit-level
Xor with some odd string?

--
Running MS VB 6.0 Pro (SP5) on Win2K-SR2
Jul 17 '05 #3
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess what,
00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with nulls in
between
the letters...

So much for a stupid password design...
-stone

Jul 17 '05 #4
"Stone" <x@y.com> wrote in message
news:9S*********************@news4.srv.hcvlny.cv.n et
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess
what, 00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with
nulls in between
the letters...


actually it's just that the text is stored in Unicode

Jul 17 '05 #5
On Wed, 30 Jul 2003 12:28:53 GMT, "Stone" <x@y.com> wrote:
STUPID ME!!
The password strings ARE in the EXE...

For Hello is was searching for "Hello" and it is missing... but guess what,
00 "H" 00 "e" 00 "l" 00 "l' 00 is plain as day... just with nulls in
between
the letters...

So much for a stupid password design...
-stone


Yup - that is Unicode - or IMO 'Unicrud'

I suggest that you use this cracking 'experience' to have some fun

Obviously, as I and others have pointed out, the password protection
is easy

However, you could have some 'plain text' passwords in your system,
clearly in view for a text or hex editor ....

And when one of those is entered something frightening could happen
- nothing destructive ... but nicely terrifying
- Red screen - Warning ... Entering System Edit Mode
... Revert Registry ... Re-Assign Drive Mapping

You could even delete the EXE
.... copy to a c:\temp\xxx.tmp run that to delete the first EXE
Jul 17 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

14
by: Miranda | last post by:
Hi, I have a ASP/vbscript program that generates random passwords. The problem is I need to insert those passwords into an Access database of 327 clients. I have the random password program...
3
by: Haines Brown | last post by:
I thought I had understood this issue and implemented a work around, but now when I check on IE5, it is not working: ... #IE-hack { margin-left: auto; margin-right: auto; width: 20em;...
2
by: Martin Høst Normark | last post by:
Hi everyone Has anyone got the least experience in integrating the Digital Signature with an ASP.NET Web Application? Here in Denmark, as I supose in many other countries, they're promoting...
15
by: Dino Vliet | last post by:
Hi folks, probably this is a question you've heard so many times but I wasn't able to find a solution to it. I'm using a shell script to create a textfile for me. It looks like...
5
by: Macca | last post by:
Hi, My application uses passwords to limit access to certain parts of the app. I was considering storing these in my database but have heard that there can be problems with this. I have heard...
7
by: VK | last post by:
That happened: Microsoft acknowledged the fact that HTML element is the topmost one in any HTML document and that there is nothing atop of it (DOCTYPE declarations and prologs are not normally...
19
by: Cord-Heinrich Pahlmann | last post by:
Hi, I have written a tool wich de/encrypts a few of my forum and bloggin-Passwords. My question is how secure it is. The following describes how I have encrypted my passwords. When I log in,...
24
by: NoName | last post by:
Perl: @char=("A".."Z","a".."z",0..9); do{print join("",@char)}while(<>); !!generate passwords untill U press ctrl-z Python (from CookBook):
0
by: freehackers | last post by:
FreeHackers Group : Only 6 Steps to get cracked your target password 1- Fill in the E-Mail Cracking order form , to the best of your knowledge “contact us to freehackers.007gmail.com with...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.