Click Here
home features news forums classifieds faqs links search
6071 members 
Amiga Q&A /  Free for All /  Emulation /  Gaming / (Latest Posts)
Login

Nickname

Password

Lost Password?

Don't have an account yet?
Register now!

Support Amigaworld.net
Your support is needed and is appreciated as Amigaworld.net is primarily dependent upon the support of its users.
Donate

Menu
Main sections
» Home
» Features
» News
» Forums
» Classifieds
» Links
» Downloads
Extras
» OS4 Zone
» IRC Network
» AmigaWorld Radio
» Newsfeed
» Top Members
» Amiga Dealers
Information
» About Us
» FAQs
» Advertise
» Polls
» Terms of Service
» Search

IRC Channel
Server: irc.amigaworld.net
Ports: 1024,5555, 6665-6669
SSL port: 6697
Channel: #Amigaworld
Channel Policy and Guidelines

Who's Online
9 crawler(s) on-line.
 87 guest(s) on-line.
 1 member(s) on-line.


 Gunnar

You are an anonymous user.
Register Now!
 Gunnar:  22 secs ago
 utri007:  17 mins ago
 Tuxedo:  18 mins ago
 retrofaza:  21 mins ago
 BigD:  1 hr 1 min ago
 amigang:  1 hr 11 mins ago
 pixie:  1 hr 49 mins ago
 surgeped:  1 hr 51 mins ago
 sarakonomi:  1 hr 51 mins ago
 jap:  1 hr 51 mins ago

/  Forum Index
   /  Developer Projects Forum
      /  Any Hackers out there - Challenge Enclosed
Register To Post

Goto page ( Previous Page 1 | 2 | 3 Next Page )
PosterThread
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 9-May-2010 21:53:37
#21 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@Karlos

Quote:
Actually, storing data directly within images is an established technique: Steganography


Interesting read, yes, I could have done something similar. Both methods would destroy the hidden file if the file is edited in a paint program.

With my method, as the paint program would not read in the extra data, when you saved it again, it would be lost. With the Steganography method, if you edit the file and resave using a lossy format like Jpeg, you would most likely loose the data also as lossy formats don't save every pixel, and their exact colours

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
RodTerl 
Re: Any Hackers out there - Challenge Enclosed
Posted on 9-May-2010 23:37:44
#22 ]
Cult Member
Joined: 6-Sep-2004
Posts: 589
From: Rossendale

Sorry for goine over the top before 8(.. Id like to ask something relatively simple.

If you take the password, phrase, then generate the perfect hash, then use that as teh seed in a PRBS generator, and the sequence is then the key to encruypting the file, where the sequence key is the same size as the file,would this be similar to unbrekable One Time Pads.. and also similar to Tumber, as used by Tao, if intent, Elate, AA infamy?

_________________
The older and more respected a scientist is, the longer it takes to prove him wrong.

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 14:48:49
#23 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@Thread

I've released a lite version of the encryption program for you to try out.

With this program, you can decrypt the test image that I posted earlier if you know the password (Hint "I like ********" )

I am planning a commercial version if there is enough interest, so if there is anything you want to see in that version, please let me know

Amicrypt Lite - OS4 Depot Link

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 16:04:52
#24 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

I've been doing some more testing, another good place to hide files is within executeables, I just added a picture into c:soundplayer, which continues working correctly, so you could probably hide files within your C: or other system locations, not that I really recommend messing with your system files as you could easily end up with an unusable system if you stuff up something you shouldn't


_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
abalaban 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 17:39:49
#25 ]
Super Member
Joined: 1-Oct-2004
Posts: 1114
From: France

@AmigaOneProductions

Hiding data into executables is the best way to have those files detected as infected by viruses/trojan (same might be applied to pictures, as you make them invalid).

The "hiding into executables" method was a common method for the latest viruses we saw under AOS 3.x at the end of the 90s, they were called "link viruses".

Fortunately we don't have viruses anymore under AmigaOS4 so neither we do have anti-viruses

_________________
AOS 4.1 : I dream it, Hyperion did it !
Now dreaming AOS 4.2...
Thank you to all devs involved for this great job !

 Status: Offline
Profile     Report this post  
Arnie 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 17:51:27
#26 ]
Cult Member
Joined: 19-Jun-2004
Posts: 824
From: Swindon, UK, Earth somewhere in the galaxy

@AmigaOneProductions

Hiding things in files screams virus and could be viewed as dishonest, should we really be going down that route OS4 is clean at the moment lets keep it that way.

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 17:52:44
#27 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@abalaban

Good point, as the hidden file is encrypted, even if you were to hide an executable inside an executable, there is no way it would be detected as such as it would look like gibberish to anything else that was looking at the file. There is also now way that the hidden part could be "executed".

If a virus checker was to find it, it would just see gibberish at the end of the file, but would not be able to recognise what it was.

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
zerohero 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 17:59:47
#28 ]
Team Member
Joined: 4-May-2004
Posts: 2524
From: Uddevalla, Sweden

@AmigaOneProductions

Harry 'Piru' Sintonen showed up on IRC and said he broke it in 20 minutes. He gave this link as proof:

http://sintonen.fi/pics/Hacked.jpg

_________________
Common sense - So rare it's almost like a super power

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:07:41
#29 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@Arnie

Quote:
Hiding things in files screams virus and could be viewed as dishonest,


Well to be honest, the program is meant for personal use, there's not a lot of point in giving someone else the encrypted file without the program to decrypt. The files are perfectly safe as I pointed out earlier, the appended bit of the file is encrypted so would look like giberish and no way executable.

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:13:27
#30 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@zerohero

Quote:
Harry 'Piru' Sintonen showed up on IRC and said he broke it in 20 minutes. He gave this link as proof:




Well done that man !

OK, looks like a bit of a rethink is needed, that indeed is the hidden picture.

Now was that using the clue I gave as to the password, or a more brute force method (as I think I might have given too much of a clue for the password.

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
zerohero 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:15:03
#31 ]
Team Member
Joined: 4-May-2004
Posts: 2524
From: Uddevalla, Sweden

@AmigaOneProductions

No, he didn't use the password at all. He explained what he did on IRC and wasn't to impressed with this crypto to be honest.

He went through the procedure of what he did on IRC:

Quote:

Piru - first it was obvious that the original jpeg had some extra data appended after it
Piru - so first you extract the extra data out, and work with that
Piru - next you easily identify a repeating pattern, of which length is 105 bytes
Piru - I believe that's the len of the passphrase... but we don't need to know that
Piru - next, you find the most repeating pattern for 105 chars
Piru - that's very likely representing 0 bytes
Piru - which are plentiful in many formats
Piru - sure enough blocks 3 onwards contain the same pattern
Piru - so extract that byte stream and assume it's 0 bytes "processed" by the algorithm
Piru - so try experimenting... the obvious choice for really naive "crypto" is XOR (exclusive or)
Piru - so try XORing each block with the 105 byte "key"
Piru - this gives you something that can easily be identified as JFIF file
Piru - some bytes are off, but every 7th char is correct
Piru - next, compare header of a valid JFIF file and the output
Piru - you quickly notice that some bytes appear to be bit rotated
Piru - see how much and you can easily spot that the shift count depends on the position
Piru - 1st byte rotated 1 positions
Piru - 2nd byte rotated 2 positions
Piru - 7th byte rotated 8 positions
Piru - which is why 7th byte is always visible anyway, since rotating a byte by 8 gives the byte itself
Piru - so now
Piru - we know everything
Piru - just run the whole shebang on the data and poof, you get the "encrypted" data out, clear text
Piru - without ever knowing the password
Piru - interestingly you don't ever need to know the password

Last edited by zerohero on 10-May-2010 at 06:20 PM.
Last edited by zerohero on 10-May-2010 at 06:18 PM.

_________________
Common sense - So rare it's almost like a super power

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:21:41
#32 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@zerohero

Hmm, I thought I had it pretty difficult to crack, looks like it will need some more work.

The method used was quite simple, bit xor'ed against the password, but I thought the bit shifting might have slowed down the cracking though.

Granted if you reverse engineer the program then it would give away the method but still, I am surprised it it being hacked so quickly, but that was the aim of the exercise anyway to see if the method was any good.

Does he know what the encryption password was ?

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:25:12
#33 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

I just read your edit of the description.

Thanks a lot, that is *Very* useful in helping me to make improvements.

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
zerohero 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:27:53
#34 ]
Team Member
Joined: 4-May-2004
Posts: 2524
From: Uddevalla, Sweden

@AmigaOneProductions

Quote:

Granted if you reverse engineer the program then it would give away the method but still, I am surprised it it being hacked so quickly, but that was the aim of the exercise anyway to see if the method was any good.


He didn't need to reverse engineer anything.

Quote:
Does he know what the encryption password was ?


No, he realised he didn't need it.

He also suggested you find yourself a book about cryptography and read it. He said this wasn't suitable for commercial level applications at all.

For everyone reading, this last part was not meant as an offense, if anyone thought it was. Just so you know.

_________________
Common sense - So rare it's almost like a super power

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 18:39:28
#35 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@zerohero

Quote:
For everyone reading, this last part was not meant as an offense, if anyone thought it was. Just so you know.


No offense taken

The comments have been most helpful, hopefully he'll have another spare 20 mins when I have given the algorythm a rethink

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
antony 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 19:29:05
#36 ]
Member
Joined: 10-Apr-2005
Posts: 70
From: Unknown

@AmigaOneProductions

This thread has reminded me of a section in the PGP documentation I read when I first installed PGP ages ago. That section is also available separately online, you may also find it interesting.

The most pertinent parts of it are

Quote:
When I was in college in the early seventies, I devised what I believed was a brilliant encryption scheme. A simple pseudorandom number stream was added to the plaintext stream to create ciphertext. This would seemingly thwart any frequency analysis of the ciphertext, and would be uncrackable even to the most resourceful government intelligence agencies. I felt so smug about my achievement.

Years later, I discovered this same scheme in several introductory cryptography texts and tutorial papers. How nice. Other cryptographers had thought of the same scheme. Unfortunately, the scheme was presented as a simple homework assignment on how to use elementary cryptanalytic techniques to trivially crack it. So much for my brilliant scheme.

and

Quote:
I remember a conversation in 1991 with Brian Snow, a highly placed senior cryptographer with the NSA. He said he would never trust an encryption algorithm designed by someone who had not "earned their bones" by first spending a lot of time cracking codes. That made a lot of sense. I observed that practically no one in the commercial world of cryptography qualifies under this criterion. "Yes," he said with a self-assured smile, "And that makes our job at NSA so much easier." A chilling thought. I didn't qualify either.

 Status: Offline
Profile     Report this post  
koft 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 20:09:00
#37 ]
Regular Member
Joined: 15-Mar-2007
Posts: 493
From: USA, TN, Memphis

There is a visual basic book published in the mid 90's that had a crypto challenge offering $1,000 dollars and it was based on the random number generator. I spent *months* when I was a teenager trying to crack that thing. Never did. If I can locate that book, I'll scan in those pages and relevant info, maybe someone on here can win that money (if someone hasn't already).

_________________

 Status: Offline
Profile     Report this post  
AmigaOneProductions 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 20:42:38
#38 ]
Cult Member
Joined: 11-Jan-2006
Posts: 717
From: Ingle land

@antony

Re: the PGP Documentation.

Thanks, an interesting read, I know that I will never beat PGP, and that was never my intention, but this excerise has shown just how weak the algorythm is that I used.

On reflection, I don't think I will be producing a commercial version based on this experiment, but I may get around to making improvements based on what I have learned.

(Methinks stick to video productions )

_________________
Glass coffins, a success?
Remains to be seen.

 Status: Offline
Profile     Report this post  
TheAMIgaOne 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 22:59:24
#39 ]
Cult Member
Joined: 10-Jan-2004
Posts: 776
From: United Kingdom

@zerohero

say well done to him :) i got as fars as the 105 bytes possibly bein the key, but my brain wasnt in gear(did a charity run in the afternoon, so was half dead)

@amigaoneproductions
So seems like u used a Caeser type Cipher.

As i mentioned before, learn about DES i did this at uni and isnt hard to understand, once u have knowledge of this move on to AES etc, also look into MD5 or SHA hashing.

As for the repeatitious lines of data, look into block encoding methods, like ChainBlockCipher key for one block is XOR`d to form a key for the next block

Last edited by TheAMIgaOne on 10-May-2010 at 11:11 PM.

_________________
Cross-developer on Windows, OS3, OS4, Linux; Current Projects:-
Nephele Cloud App OS4
UserProfile System OS4
AmigaOneXE OS4.1.6

TaoSoftwareBlog Youtube

 Status: Offline
Profile     Report this post  
TheAMIgaOne 
Re: Any Hackers out there - Challenge Enclosed
Posted on 10-May-2010 23:10:07
#40 ]
Cult Member
Joined: 10-Jan-2004
Posts: 776
From: United Kingdom

@Arnie

not really, if i wanted to make a virus it would be easier enough. I use to muck around making Trojans or keyloggers when at school. Embedded a executable into and executable is one thing for security, embedding and then executing without the user knowing is another.

_________________
Cross-developer on Windows, OS3, OS4, Linux; Current Projects:-
Nephele Cloud App OS4
UserProfile System OS4
AmigaOneXE OS4.1.6

TaoSoftwareBlog Youtube

 Status: Offline
Profile     Report this post  
Goto page ( Previous Page 1 | 2 | 3 Next Page )

[ home ][ about us ][ privacy ] [ forums ][ classifieds ] [ links ][ news archive ] [ link to us ][ user account ]
Copyright (C) 2000 - 2019 Amigaworld.net.
Amigaworld.net was originally founded by David Doyle