[8481] in bugtraq
Re: FoolProof for PC Exploit
daemon@ATHENA.MIT.EDU (Erik Soroka)
Tue Nov 10 14:47:57 1998
Date: Mon, 9 Nov 1998 15:48:36 -0500
Reply-To: Erik Soroka <erik@kirenet.com>
From: Erik Soroka <erik@KIRENET.COM>
X-To: Krish Jagannathan <krisjag@JUNO.COM>
To: BUGTRAQ@NETSPACE.ORG
On Wed, 4 Nov 1998 15:55:09 -0500, Krish Jagannathan wrote:
>I figured this much out -- if you are running on FoolProof for the PC
>(Win9x) and you boot up in safe mode (with or without network support) it
>will bypass the FoolProof TSR and enable full privileges, even deleting
>the FoolProof directory.
Another point of reference dealing with this program (and a much cleaner
approach) -- FoolProof for Windows 9x stores the administrator password in
plaintext in the Windows Swap file. All you have to do is boot up into safe
mode (as mentioned above), copy the swap file to a temporary filename, reboot
into windows and use a hex editor to search the swapfile for the string,
"FOOLPROO" and right after will be the actual password.
foolproof - adj. (1) "so simple, plain, or reliable as to leave no opportunity
for error, misuse, or failure..."
The name of this "security" program doesn't seem to fit the numerous bugs and
glitches it has -- however it is a neat program with some nice features that
might come in handy on systems accessible to the public.
Enjoy.
______________________________________________________________
Erik M. Soroka (NIC: ES2600) | Voice/Fax: 508.669.5208
KIREnet Communications Inc. | Page/Beep: 978.629.3322
Web: http://www.kirenet.com | E-Mail: erik@kirenet.com
______________________________________________________________