TUCoPS :: Macintosh :: mac_hack.txt

Mac Hack FAQ!

Archive-name: mac-hack-faq
Last-Modified: 11/22/1994
Version: 0.1


                ---=====++++++++++++++++++++++=====---
	  	   --===+    Mac Hack FAQ:   +===--
	  	      -=+ Defeating Security +=-
			++++++++++++++++++++++

			       Compiled				
				  by
			    	 AX1P
			   an149689@anon.penet.fi
		   AX1P.Styrene%bbs@corrupt.sekurity.com

		     with extra-special thanks to:
		   Bubba "Anderson" Sanchez, III esq.
		  SwordSlinger(an146315@anon.penet.fi)
		          pbradley@lclark.edu
		               MacHacker
		                 Chaos
		               Imbellis
		    Numerous anonymous contributors...
	
===============================================================================
		 -==**< THE MACINTOSH HACK FAQ INDEX >**==-
===============================================================================
*******************************************************************************

A. Notes 
B. What are the general techniques for bypassing mac security measures?
C. What do I do after I get to the finder?
D. How do I bypass HD driver protection? [Bubba "Anderson" Sanchez,esq. III]
E. Miscellaneous hacks and info
F. Related anonymous ftp sites

*******************************************************************************

A. NOTES
===============================================================================
	This FAQ deals primarily with defeating security programs for
the Macintosh, but there is a lot of room for expansion. If you have
any hacks for Mac security programs, ideas for extending the scope of
the FAQ or any other feedback, send mail to the faq-maintainer, AX1P
at: an149689@anon.penet.fi. Right now I am interested in steering the FAQ
towards defeating password protection for various compression programs and
defeating copy protection so send in those submissions. I also would
like to thank Bubba "Anderson" Sanchez, III esq. for writing the entire
article on bypassing HD driver protection. And thank you to everyone
who submitted their hacks and encouragement.

COMMON SENSE DISCLAIMER:
I can not held responsible for any damage that might occur from
experimenting with the techniques herein. Some may be completely wrong,
others may only work on certain macs and particular versions of
software. If you screw something up, it's your ass. Run like hell and/or 
play computer illiterate. I do not support breaking laws of any
race, creed or short-sightedness... 
-
--
B. WHAT ARE THE GENERAL TECHNIQUES FOR BYPASSING MAC SECURITY MEASURES?
===============================================================================
*** Disable System Extensions by holding down the Shift-key during
    start-up. This is one of the easiest techniques but you would be
    surprised how often it works! On Classics, try booting up off the
    ROM disk by holding down Command-Option-x-o during boot-up.
*** Find the Finder. On some "secured" systems, you can gain access to
    locked folders if you now the name of an unlocked file within. For
    example, here is a FoolProof hack:
	1) Search for the word 'finder'(a file we know is in the locked system
	   folder).
	2) The locked file opens to display the Finder file. From
	   here, you can now move the FoolProof Preferences and
	   Extensions out of the system folder.
	3) Reboot.
*** Break into the debugger by hitting the programmer's switch or the
    Command-Power key combo. Then type 'G FINDER', or 'G F'. You can
    also get to the debugger by holding down the control-command-power
    key combo and restarting.
*** Crash the system! In some older security programs, you can get to the
    finder by repeatedly opening applications until all the RAM is consumed.
    Older versions of At Ease will open a dialogue box that asks if you
    would like to quit At Ease to free up RAM. Click yes! 
*** Boot from a floppy. Even if your sysadmin has floppy startup
    disabled, you should be able to force it by holding down the
    command-option-shift-delete key combo to boot the floppy. This key
    combo won't let the internal hard drive mount 
*** Plug an external hard drive into the SCSI port. Even if your
    sysadmin has disabled floppy access and starting up without extensions you
    can copy any programs on the drive if you know any of the passwords.
*** Social engineering is almost too obvious (and cliche) to mention,
    but it seems to work. Remember to act computer stupid and/or get
    really pissy.
--

C. WHAT DO I DO AFTER I GET TO THE FINDER?
===============================================================================
	So you have finally found the finder...now what? Now you can
run any programs you want, but why not make things easier on yourself
for your next trip to the finder. If you know that your sysadmin keeps
logs:
	1) Copy the system folder to the hard drive.
	2) Rename the original system folder.
	3) Reboot without At Ease.
	4) When you are done, put the real system folder back and
	   delete the second one.

If you aren't concerned about logs, just move the At Ease Preferences
out of the System Folder:Extensions folder and reboot. Remember to put
them back when you are done. The logs have been bypassed but you really
don't care to be rebooting over and over while the lab monitor glares
at you. It would be much better to have the system supervisor's
password so you can switch back and forth between At Ease and the
finder at will. The easiest way is to install a keygrabber, which is a
system extension that logs and captures all the keystrokes on the
computer. Oasis is a good keygrabber for the mac that can be found on
the internet or alt.2600. Unfortunately it has no documentation. To
use it:
	1) Get into the Finder and copy Oasis into the folder:
	   	System Folder:Extensions
	2) Wait a few days. 
	3) Look for the logfiles in:
 		System Folder:Preferences:~Temporary Folder.

Another keygrabber that is easier to find is MacLifeInsurance. You will have
to weed through several hundred pages of inane poetry, reports and e-mail
to Grandma but eventually one will have the password. If there are large 
number of users, you may be able to add your own account and password
with the supervisor's password. Use your discretion. And look for
those keygrabbers on local boards and ftp sites.
--

D. HOW DO I BYPASS HARD DISK DRIVER PROTECTION (for example: FileGuard's
   Volume Protection)? 
===============================================================================
	Hard disk protection lies in a hard disk's driver code, at a
very low level on the disk. This protection is provided by most third
party hard disk formatting software or elaborate security
software(like FileGuard). Here's a quick guide to permanently removing
this protection:
	1) Get a high density disk. Install some startup software for
	   the machine in question. Install some disk formatting software that
	   lets you install new drivers (like Gold Triangle; maybe
	   even 'Apple HD SC Setup').
	2) Reboot machine. Quickly insert the floppy disk and then
	   hold down command-option-shift-delete. This prevents the
	   SCSI Bus from trying to mount the internal hard disk.
	3) When the finder loads, run disk formatting software. If you
	   want to trash the contents of the hard disk, just re-format
	   the disk. If you want to get at the contents, install a new
	   driver over the old driver (consult your software manual).

	If you need to diasable additional security at the hard disk,
	go to 4). Else, go to 5).

	4) Reboot machine; boot from floppy again. This time, let the
	   hard disk mount. If all went well, no password will be prompted for
	   here. When finder loads, remove the security inits/cdevs/programs.
	5) Reboot machine; boot from hard disk. No password should be
	   prompted for, and life should go on as usual.

NOTE: This process will probably cause the hard disk to crash severely
in the future!!! Only do this if there is something you really need on
the disk. After you copy the needed files to a different place, you
should REFORMAT THE HARD DISK.

This has been tested with FileGuard protection using Golden Triangler.
The tester backed up the source code he was working on, and then continued
using the machine(llsi). The machine crashed within an hour.
-

E. MISCELLANEOUS HACKS AND INFO
===============================================================================
Q: HOW DO I COPY A READ-ONLY FILE?
A: Many utilities allow you to copy read-only files, including
StuffIt, Compact Pro, etc.

Q: HOW DO I ACCESS THE CHOOSER WHEN IT IS PROTECTED ON FOOLPROOF?
A: First try the default password 'foolproof'; Yes, some sysadmins are
that dumb. If it doesn't work, try this:
   1) Make a copy of the chooser.
   2) Use ResEdit or another resource editor to change the creator
      code from 'dfil chzr' 'dfil keyc'.
   3) The default password is reset to 'foolproof'.
   4) Swap the original chooser with the modified copy. Remember to
      cover your tracks and replace the original chooser when you are done.
NOTE: Make sure you work on copies when using ResEdit, especially when
you are using someone else's computer.

Q: HOW DO I DEFEAT FILEGUARD'S ENCRYPTION?
A: 1) Use FileGuard to encrypt or copyguard a file with the password
      'test', for example.
   2) Use ResEdit to copy the resource 'high' from that file.
   3) Paste it into the file that contains the unknown password.
   4) Save changes and quit.
   5) Decrypt the modified file with FileGuard using the password
      'test'.

Q: WHERE CAN I GET THE LATEST VERSION OF MACPGP AND THE SOURCE CODE?
A: Telnet to net-dist.mit.edu and login as 'getpgp'. You will have to
answer four short questions to get the name of the file it is in(the
name changes every half hour). Then ftp there and go to the specified
directory. The current version is MACPGP2.6.2. You should also get the
README files as the interface barely follows the Macintosh Interface
Guidelines.

Q: HOW DO I SET A NULL PASSWORD FOR AT EASE(not all versions)?
A: 1) Open the file System Folder:At Ease:At Ease Preferences with
      MSWord or any other text editor.
   2) Look for the string "MFDR\     ]".
   3) Delete everything between "\" and "]".
   4) Save the changes and you have a null password.
Now you can go to At Ease Setup and change the password to whatever
you want!

Q: WHAT DO I DO IF I FORGET THE ADMINISTRATOR'S PASSWORD[in At Ease]?
A: <excerpt from the At Ease for Workgroups 2.0.1 update help files>

"IF YOU FORGET THE ADMINISTRATOR'S PASSWORD

If you forget the At Ease administrator's password, follow the
directions below instead of those in the manual. If your startup disk
is locked, you'll first need to run the Unlock application on the AT
Ease 2.0 Utilities disk to unlock the start-up disk. Consult the
manual for information about the Unlock application.

1. Start up your computer from another startup disk.
[...BS...]
2. Open the System Folder of your usual startup disk.
3. Open the At Ease Items folder inside your System Folder.
4. Drag the At Ease Preferences file into the trash.
5. Hold down the Option key while you choose Empty Trash from the
   Special menu.
6. Restart from your usual startup disk.
7. Open the At Ease Setup for Workgroups aplication.

If you are using an AppleShare server volume as the At Ease disk, your
setups may not appear until you reset the At Ease disk to this server
volume.

8. Reconnect to the server volume and use the At Ease Disk command to
reselect the volume.

Make sure you use the information on the server instead of replacing
it with the information on the startup disk.

9. Add a new password and clue.
10. Make sure the following options set correctly:
    * Allow Remote Administration checkbox
    * Lock Startup Volume checkbox
11. Turn At Ease back on.
12. Quit At Ease Setup for Workgroups."

>> Where do you get the Unlock application? Beats the hell out of me.
-

F. RELATED ANONYMOUS FTP SITES
===============================================================================
	There seems to be a serious lack of accessible FTP sites that
carry Macintosh hacking utensils, etc. I have hardly found any that I
can post. If you have a site to add to this list or you are interested
in creating a Mac Hack FTP site, please contact an149689@anon.penet.fi

* SITE: net-dist.mit.edu
* PATH: ?
* FILES: MacPGP2.6, MacPGP2.6 source code 
To get the path, you must telnet to net-dist.mit.edu and login as
'getpgp'. You will have to answer four short questions to get the name
of the directory it is in(the name changes every half hour). You
should get the README file as the interface barely follows the
Macintosh Interface Guidelines.

* SITE: ftp.netcom.com
* PATH: /pub/bradleym
* FILES: MacRedBox, VirtualQuarter, ...
Not much in the way of a Mac ftp site but it has four or five phreak
utilities.

* SITE: sekurity.com
* PATH: /pub/incoming
* FILES: unknown
Sometimes they have mac stuff. They used to have Oasis... Just look
for the familiar .hqx or .sit suffixes.


* 	  S E N D   M O R E   F T P   S I T E S ! ! !
* Sorry, that's all I can post now! Keep an eye out for MAQ HAQ FAQ
* update which I hope will come out after my mailbox is flooded with
* your voluminous submissions. I thank everyone who has already
* contributed or sent their feedback and I hope you find the above information
* useful.
--

EOT



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH