There is at least one password "discovery" service on the net but my past experience has been negative with them. Each file that I could not crack they were also unable to. If you have the executable file that uses the data and it has not been EXE compressed then you may be able to see it clear text with a binary file viewer. If you have no success post back and we can see if there is something further to do.
Ok,
I have viewed the EXE with an Hex editor but are unable locate the File I require. I even tried this on an exe i know the ownername of and searched for the Ownername in both text and hex formats but to no avail.
When i search for a file, i assume you are searching for the file label right?
Okay, First just let me thank you all for helping me out with this.
Now, let me see if i get this pretty simple procedure right.
1) open the exe with an Hex editor - I'm using XVI32.
2) Search for the clear text string of the password - in the case were i actually used know the password (ownername) it didnt worked- not case sensitive
3) Search for a clear text string of the filename - I used the label name as specified in the dic - again no success.
What will happen if the exe is setup not generate the File declarations but this is instead done in a bottom layer DLL.
Will this still work?
You didn't say anything about a data DLL<g>, in that case no. As to the variable there generally is still an assignment someplace that you can find. Unless of course the developer knows about this and tries to make the assignment character by character at several different point in the program. Finally if an algorithm is used to set the variable value it will be most difficult. A sure fire way (if you have the patience) is to load the application and then crash it getting a memory dump, the password can be seen in the dump. I have not tried this with a data DLL, let me know if it works.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.