TUCoPS :: Dialup BBSes :: real_ra.txt

Remote Access: The REAL way to Hack RA Boards

             Why the "Fun with RA boards" hacking method is LAME!
                     (The REAL way to hack RemoteAccess)
                       Knocked up by ByTe RyDeR of the
                      ┌┬── ──  ─ ˙˙ ˙
                     ─│┼── FundeMńNTAL CoNNeCtiON ─│───
                      :├── ──  ─ ˙˙ ˙

                         "Saving the Brain Forest"

Well dewdz, ya seen the file text about hacking RemoteAccess and you wanna 
crack that H/P or warez RA board for mega ratios?  Get Real!  

RA *CAN* be hacked but only in the same way as any other BBS sox...  no 
sysop reading that file was shat themselves .. here's why not:

Basically the technique outlined involved you writing a trojan and 
disguising it as some program the sysop is really gagging for in the hope 
is he'll run it on his system.  Wot it'll really do is copy his USER.BBS 
onto the filebase so you can call back later and d/l it... neat idea, and 
one that in *theory* will work with most BBS sox (most are EVEN easier coz 
they don't encrypt the users file like RA) but their execution of it sucks!

Firstly, their compiled batch file relied on the sysop running RA off their 
C: drive from the directory \RA...  Yeah, maybe some lame PD board they
hang out on is like that but most sysops I know run multiple drives and 
many have more complex directory structures...       Lame Hacker 0 - Sysop 1

Okay... letz assume they got on some lame fucking board and the users file
*is* C:\RA\USERS.BBS - next step is to copy the file into the filebase and 
make it d/lable.  How do they do that? (patronising Dez Lymon voice) <g>.

Their idea was to copy the file into D:\FILES\UPLOAD ..  Yeah sure guyz...
EVERY board uses the D: drive for the filebase and happen to have a file
area in \FILES\UPLOAD - NOT!!!!!!                    Lame Hacker 0 - Sysop 2

Right, so they got better odds than winning the national fucking lottery and
all the above worked (yeah man, we're dreamin' but let's give 'em a chance).
What next?  The file has to be d/lable...  you found a sysop that makes
UNCHECKED & UNSCANNED files available for download?  Fuck off!  Get a life!
                                                     Lame Hacker 0 - Sysop 3

So...  okay....  we got a sysop that's so fucking lame he doesn't deserve
to to breath the same air as the rest of the human race and uses all the 
above paths and makes unchecked uploads d/lable.  RA by default won't allow 
files to be d/led UNLESS they're in the file database.  Unless the USERS.BBS
destination ALREADY EXISTED in that area and was previously in the area 
database there's NO WAY you can d/l it.

The way they "solved" this was to add an entry to FILES.BBS in the file
DATABASE.   Unless you happen to be lucky enough that the sysop does an 
import from FILES.BBS to the REAL file database before checking out your 
planted file (most RA sysops only import from FILES.BBS when adding CDROMs) 
the addition of this entry will do FUCK ALL!         Lame Hacker 0 - Sysop 4
To quote from the author "This is a generic program and you will have to 
tailor it so it will meet your needs." - yeah man, fucking rethink, redesign
and rewrite it more like!

Oh yeah... EVEN IF YOU DO get a copy of the USER.BBS file downloaded THE
PASSWORDS ARE ENCRYPTED!!!                       Lame Hacker :(  -  Sysop:-)

So how can U hack RA?  Well, the idea was okay but, like hacking any system, 
you gotta KNOW the system ya gonna hack b4 U stand a chance.

Most sysops will use the DOS environment variable RA set to the RA system 
directory so that external doors can find the system files...  that's very 
helpful of the sysop, to show us where we can find his config files. <g>

In the RA system directory should be the file CONFIG.RA.  You might want to 
include a check for this file within your program and possibly do a disk 
and directory scan for the file if RA isn't defined or is set incorrectly.

I'm not *entirely* sure about other versions of RA, but in the current 
release (2.02) the CONFIG.RA offset &h3E4 is where the name of the mail 
directory starts.  This is the path where USERS.BBS will be found.

Next you need to know for SURE the name of a directory which stores the 
files for a filearea from which you are able to download.

I suggest you do this in one of three ways:

1)  Interogate the file FILES.RA in the RA system directory which contains 
    the filebase area configs.  You *could* just search the directory for a 
    valid path but you'd wouldn't know if you had d/l access to the area.  

2)  If you want to be a bit more clever you could interpret the file and 
    find out the minimum security level required to d/l from each area and 
    dump your copy of USERS.BBS in the area with the lowest access level, 
    pretty much guaranteeing that you'll be able to get to the file.  This
    doesn't take security flags into account so there's still a SLIM 
    possiblity you won't be able to d/l the file unless you also write flag 
    testing into your program.

3)  My favourite technique is to have the program read a small config file 
    which is uploaded with your archive.  This file just contains the name 
    of a file you KNOW you have d/l access from.  You can then either do a 
    global search for that filename or, preferably (coz it's faster) read 
    FILES.RA for the paths used by the filebase and search those.

So now you have the location of the USERS.BBS and the destination directory 
you simply need to copy the file.  However, even though the file is sitting 
in a filebase directory it STILL isn't available for d/l... why?  Because 
it's not in the filearea database.

You could get clever and find amend filearea database files directly if you 
get the fileareas path from CONFIG.RA (offset &hC12) and write to the files 
HDR\FBD#####.HDR (header) IDX\FDB#####.IDX (index) and, if you want to add 
a description, TXT\FBD#####.TXT, where ##### is the RA file area number.

There *is* an easier way.  Shell out to DOS and execute the RAFILE utility 
from the RA program path, passing the arguments "ADOPT filename #####".

E.g. the BASIC command would be:

             SHELL "RAFILE ADOPT "+filename$+STR$(areanum)

Where filename$ contains the name of your USERS.BBS copy and areanum is the 
RA filearea number.  If your filename was USERTEST.ZIP and you'd copied it 
to the directory used for RA file area 10 you'd be executing:


This will "adopt" the file, adding it to the RA file database, making it 
available for d/l (assuming you have the appropriate rights to the area).

All you need to do now is to package this trojan file to entice the sysop
into running it...  In the LAME method for hacking RA the author used DSZ 
as an example.  That was about the most realistic part of the file and the
only bit worth leaching!  <g>

Your archive:
                DSZ.EXE (your program)
                DSZ.DAT (the *real* DSZ.EXE)
                DSZ.CFG (small file containing the name of a *known* 
                         d/lable file - preferabbly encrypted)
                + any other files that normally come with DSZ

Flow diagram for DSZ.EXE trojan:

                           /       \
                          |  Start  |
                      | Read enviroment |
                      |   variable RA   |
                              / \
                            /     \
                          /CONFIG.RA\          +---------------------+
                        /  exist in   \___>____| Scan drives & paths |
                        \  that path  / No     | search for the file |
                          \    ?    /          +----------+----------+
                            \     /                       |
                              \ /                         |
                           Yes |                          |
                      | Read CONFIG.RA  |
                      | to get location |
                      |   of USERS.BBS  |
                      | Read DSZ.CFG to |
                      | get a filename  |
                               |                          |
                      +--------+--------+                 |
                      | Read FILES.RA to|                 |
                      | get name of the |                 |
                      |  next filearea  |                 |
                      +--------+--------+                 |
                               |                          |
                               |                          |
                              / \                         |
                            /     \                       |
                          /does area\                     |
                        / contain the \________>__________|
                        \     file    / No
                          \    ?    /
                            \     /                       
                              \ /                         
                           Yes |                          
                      | Copy USERS.BBS  |
                      | to the filearea |
                      |    directory    |
                      | Run RAFILE with |
                      | ADOPT to update |
                      |   RA database   |
                      | Delete DSZ.EXE  |
                      |   and DSZ.CFG   |
                      | Rename DSZ.DAT  |
                      |   to DSZ.EXE    |
                           /       \
                          |  Stop!  |
Once you've uploaded the file, preferably using a pseudonym, post the sysop 
a message telling him how c00l your upload is.  Wait a day or so and dial 
back.  Do a filename search using the name you decided to use for your copy 
of USERS.BBS and d/l it.  

The next step, now you have the USERS.BBS file is to crack the passwords.  
I only know of ONE crack program out there which has the RA password 
encryption algorythm, a program based on the popular Unix CRACKERJACK 
program called RA-CRACK.  This simply takes a given word, encrypts it, and
compares it to the USERS.BBS file to find a user with a matching password.

RA-CRACK takes it's source words from a text file so it would be possible 
to either:

 a)  Use a TXT dictionary file as the source.  All passwords that are 
     normal words will be found.  This method will usually find about 90% 
     of the user passwords.

 b)  Write a "brute force" cracker using a small routine that "counts" 
     through valid ASCII character combinations from "!" (ASCII 33) upto 
     a string containing 25 (max length of a RA password) null characters 
     (ASCII 255), passing these via a text file to RA-CRACK.  This SHOULD 
     be _100%_ successful, but SLOW!



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH