[identity profile] hoffman-log.livejournal.com posting in [community profile] techrecovery
Hey guys. Haven't posted here in a long time, but I have a good one for ya. Now, I know this isn't about bitching about crappy customers, but it's an interesting chance to test your skills, and possibly make some money too. My network teacher last year seems to enjoy doing these "challenges" where he sets up a system to be "unhackable" and offers a reward to anybody that can hack the system. Here's the specks.

  • The machine is protected by Hard-Guard. Read up on it. The basics are that any changes you make on the computer are lost once you reboot.

  • The system has a BIOS password. I have successfully passed this. The system setup password, however, is different. I have not yet cracked this.

  • The computer is a Dell Optiplex Gx1, BIOS version A07.

  • The computer will not boot into the OS. You must get past Hard-Guard first (so technically anything after this would be pretty much easy to do).

  • The CD-ROM is disabled (in the sense that the power cable is unplugged)

  • Same thing for the floppy drive, also the zip drive

  • Wake on LAN is disabled

  • I cannot make any hardware changes (like opening the case and removing the card)


  • Last year I was able to get around this simply by popping in a CD and re-installing the OS. Going by the above information, that's not possible this time around. So I've been trying a few other things, like hoping the "human" factor plays into it (i.e.: His windows password is the same as the hard-guard password). Thus far, however, I haven't been able to connect L0pht Crack successfully to the domain controller (from a different computer on the same network).

    The ultimate goal is to boot into the OS, install Kazaa, place a folder on the desktop titled "HACKED", reboot, and have the installed changes remain (because hard-guard is supposed to wipe all changes clean).

    I'm smacking my brain on the wall over this one and I gotta say, this one is really difficult... Any suggestions would be appreciated, and I will gladly split the reward money with anybody who provides any suggestions that help lead to a successful hack.

    _MaH

    Date: 2003-06-04 11:20 am (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    from the site faq: "When your computer is set up and operating exactly the way you want it, you save the hard drive image using HardGuard's BACKUP feature. BACKUP is on your startup menu, along with RESTORE and NORMAL. You may have guessed by now that you can select BACKUP, or RESTORE when you start your system. BACKUP saves everything about your computer the last time you used it. If you select RESTORE, your system is restored to the last BACKUP image you saved. If you just want to use your computer the way you did last time, select NORMAL and you get the same software you had last time."

    so if you can get into the hard guard startup menu you can boot the system, install your stuff, reboot, and hit backup to save your changes.

    i assume that your issue is getting a password to access that menu of hard guard?
    You've got me all intrigued now.

    Date: 2003-06-04 11:34 am (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    I've been googling it hard, there's remarkably little out there about it.
    I feel like there was a 2600 article on it (or a similar hunk of hardware) awhile back, but I could be wrong. They don't have articles posted on their site, it pisses me off.
    "Yeah rah rah free software, free information, but not ours. :P "

    Date: 2003-06-04 11:51 am (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    hmm... random though.
    Could you lock out that card from being loaded? maybe create an IRQ conflict in the BIOS by manually assigning them? disable slots?
    I know some BIOS's I've seen you could do some pretty low leve stuff in, it'll depend what that one's set up like.
    Worth a try though.

    Re: Hmmm....

    Date: 2003-06-04 11:59 am (UTC)
    From: [identity profile] wesmills.livejournal.com
    Is popping the case allowed at all? If so, you could pull the power jumper.. Even if it's not OK, you could still try to put a coat hanger through the air vents and short the battery. ;)

    What info do they need to give you the master password?

    Re: Hmmm....

    Date: 2003-06-04 11:59 am (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    ah, you just bypassed it. I see. thought you broke through it.
    and no physical access to internals to short out the bios settings... ugh.
    2600 is here, used to be the most respected hacker zine around, but it's gotten very lame of late with it's increased public profile. most of the stuff in there now is common sense or script kiddie-ish. used to be a great resource for geekly knowledge.

    Re: Hmmm....

    Date: 2003-06-04 12:26 pm (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    ah, no. just always bugs me that you can't search for something you remember from an old mag.

    good luck with your attacking it, it'll be bouncing around my head for awhile. ;o)

    Re: Hmmm....

    Date: 2003-06-04 12:37 pm (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    it is possible with newer computers/bioses and some USB drives. it's a pretty iffy prospect in the best of circumstances though.
    Worth a try, but don't hold your breath.

    Re: Hmmm....

    Date: 2003-06-04 12:46 pm (UTC)
    inahandbasket: animated gif of spider jerusalem being an angry avatar of justice (Default)
    From: [personal profile] inahandbasket
    keep us updated.
    ;o)

    Re: Hmmm....

    Date: 2003-06-04 01:41 pm (UTC)
    From: [identity profile] oddball42.livejournal.com
    also something to think about you can have apps and such ready to run set up on your little usb device. then you could do something from there and have the apps there, but if you can actually log in to the internet, that would only mean you could save info, wich in and of itself could be useful.

    Date: 2003-06-05 01:16 pm (UTC)
    From: [identity profile] akage.livejournal.com
    I'm still curious how this fraggin' thing works.

    I'm slowly making my way through the technical FAQ now. Interesting...the supervisor password is stored in the boot sector. Might be a crack there, though I'm not sure what at the moment.

    It's too bad it won't boot into the OS. One potential way to at least crash it, if not hack it, would seem to be attempting tons of minute file changes, perhaps eventually overloading the Hard-Guard's onboard buffer.

    Side note: This thing must play hell with a defragger.

    The two routes I see are:

    1. Cracking the Hard-Guard supervisor password. Obviously, that gives you pretty much free reign.

    2. Somehow getting in enough to either wipe or hex-edit the boot sector. Is this FAT, NTFS, Ext2 or what? Also, what OS?

    Date: 2003-06-05 01:59 pm (UTC)
    From: [identity profile] akage.livejournal.com
    Norton DiskEdit, or a shareware clone called PTS Disk Editor (http://www.geocities.com/thestarman3/tool/de/PTS-DE.htm)

    However, those are somewhat older apps that may not work with NTFS. My idea was that you could use hex edit to scan the first two sectors and see if the password shows up (I used to use this approach on Commodore programs back in the day). However, I'd be a little surprised if they didn't encrypt the password. Still, you never know.

    You could also just wreak havoc in the boot sector, but then you end up with a machine which likely won't boot. If your goal was to crash, not hack, that would be fine.

    Frhed is another option that might work with newer systems. (http://www.geocities.com/thestarman3/tool/frhed/FRHED.htm)

    Date: 2003-06-12 10:27 pm (UTC)
    From: [identity profile] daerlyn.livejournal.com
    Any updates? I have no advice, but I'm quite curious about how this is going.

    Profile

    techrecovery: (Default)
    Elitist Computer Nerd Posse

    April 2017

    S M T W T F S
          1
    2345678
    91011121314 15
    16171819202122
    23242526272829
    30      

    Most Popular Tags

    Style Credit

    Expand Cut Tags

    No cut tags
    Page generated Mar. 19th, 2026 11:06 pm
    Powered by Dreamwidth Studios