[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: MS story



From: 	Rich Graves[SMTP:[email protected]]
Sent: 	Tuesday, January 16, 1996 2:00 PM
To: 	Simson L. Garfinkel
Subject: 	Re: MS story

   Peter explained a bit about what he *could have* done when he provided
   the source code, and Frank Andrew Stevenson also had some ideas. The
   people below are working on an independent hack that will pop up stored
   passwords for Windows 95, again whether you have the 128-bit RC4 patch
   applied, and have turned off persistent password caching to disk, or
   not. Brian Gorka described the exploit they're working on (but have not
   finished, no) on in a message to cypherpunks:

A friend and I discovered this 'feature' accidentally. (now that I checked 
c2's Hack MSoft page I see someone else exploited it in WFW)  Using 
heapwalker on WFW, we noticed the password cache was not encrypted.  I 
wanted an official C2 I hacked Micro$oft Tee-Shirt and we wondered if this 
was still true after the Windows 95 password cache 'fix'.  We fired up h  
eapwalker and found nothing.  It won't let you look in that area.  BUT, 
After firing up SoftICE for Windows 95, we found the area in less than 5 
minutes.  It is in the C000 0000 memory area (the system area), and the 
password information is ALWAYS a constant offset from some text. (IFSMGR I 
think)  Dumping it out is pretty easy, and as soon as we get some free 
time, the rest of the code will flow, we have something in the way of 
output, but it's not pretty.