Search

Loading...

Tuesday, October 4, 2011

Excel VBA Brute Force Override v0.2a

Option Explicit
Option Private Module

Sub BruteForce_Override()
On Error GoTo ErrorHandler
  
    Dim i As Byte, j As Byte, k As Byte
    Dim l As Byte, m As Byte, n As Byte
    Dim o As Byte, p As Byte, q As Byte
    Dim r As Byte, s As Byte, t As Byte
    Dim x As Integer, PassWd_Try As String
  
    For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
    For l = 65 To 66: For m = 65 To 66: For n = 65 To 66
    For o = 65 To 66: For p = 65 To 66: For q = 65 To 66
    For r = 65 To 66: For s = 65 To 66:
    Application.StatusBar = x & "/194,560 Possible"
    x = x + 94: For t = 1 To 126: DoEvents
  
    PassWd_Try = Chr(i) & Chr(j) & Chr(k) & _
       Chr(l) & Chr(m) & Chr(n) & Chr(o) & Chr(p) & _
       Chr(q) & Chr(r) & Chr(s) & Chr(t + 31)
                
    ActiveSheet.Unprotect Password:=PassWd_Try
    If ActiveSheet.ProtectContents = False Then
        MsgBox "Overide String Located:" & Chr(13) & _
             PassWd_Try & Chr(13) & Chr(13) & _
             "The Password has been overriden." & Chr(13) & _
        "Do not save this file (with the same name)" & _
        "or your breach may be detected.", _
            vbExclamation, "Password Overridden"
        Application.StatusBar = False
        Exit Sub
    End If
  
   Next: Next: Next: Next: Next: Next
   Next: Next: Next: Next: Next: Next

Application.StatusBar = False
Exit Sub

ErrorHandler:
    Select Case Err.Number
        Case 1004 'Password Incorrect
            Resume Next
        Case Else
            MsgBox Err.Source & Chr(13) & Err.Description, vbCritical, "Unknown Error #" & Err.Number
            Application.StatusBar = False
            On Error Goto 0
            Exit Sub
    End Select
 End Sub

Saturday, October 1, 2011

Excel VBA Brute Force Override v0.11a

Option Explicit
Option Private Module

Sub BruteForce_Override()
On Error GoTo ErrorHandler
  
    Dim i As Integer, j As Integer, k As Integer
    Dim l As Integer, m As Integer, n As Integer
    Dim o As Integer, p As Integer, q As Integer
    Dim r As Integer, s As Integer, t As Integer
    Dim x As Long, PassWd_Try As String  
  
    For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
    For l = 65 To 66: For m = 65 To 66: For n = 65 To 66
    For o = 65 To 66: For p = 65 To 66: For q = 65 To 66
    For r = 65 To 66: For s = 65 To 66: x = x + 94
    Application.StatusBar = x & "/194,560 Possible"
    For t = 1 To 126: DoEvents
  
    PassWd_Try = Chr(i) & Chr(j) & Chr(k) & _
       Chr(l) & Chr(m) & Chr(n) & Chr(o) & Chr(p) & _
       Chr(q) & Chr(r) & Chr(s) & Chr(t + 31)
                
    ActiveSheet.Unprotect Password:=PassWd_Try
    If ActiveSheet.ProtectContents = False Then
        MsgBox "Overide String Located:" & Chr(13) & PassWd_Try & Chr(13) & Chr(13) & _
        "The Password has been overriden." & Chr(13) & _
        "Do not save this file (with the same name) or your breach will be detected.", _
            vbExclamation, "Password Overridden"
        Application.StatusBar = False
        Exit Sub
    End If
  
   Next: Next: Next: Next: Next: Next
   Next: Next: Next: Next: Next: Next

Application.StatusBar = False
Exit Sub

ErrorHandler:
    Select Case Err.Number
        Case 1004 'Password Incorrect
            Resume Next
        Case Else
            MsgBox Err.Source & Chr(13) & Err.Description, vbCritical, "Unknown Error #" & Err.Number
            Application.StatusBar = False
            Exit Sub
    End Select
 End Sub

Tuesday, September 27, 2011

How to Pirate Software

Disclaimer: I do not condone stealing software, this article is for informational purposes only. Stealing software is illegal, do not do it.



Illegal Software / Warez
Illegal software, also known as pirated software, or Warez is becoming increasingly easy for anyone to obtain, once someone tells them how. With the ever increasing use of torrents transfer speeds of Warez has never been faster, and with the numerous amount of torrent sharing sites, never before easier to find. One simply needs to use their favorite search engine to query “{Name of Program} + torrent”. Many people do not have the ability to download torrents, this is corrected by searching the internet for a 'torrent client', once you have chosen and installed a torrent client, you now have the ability to download from most torrents sites. Don't be fooled, if you ever come across a torrent site that is asking you to install something or to pay a fee, what's the points of stealing software if you have to pay, right? move on to the next site.

Here is a short list of search terms and what they yield.
  • “{Name of Program}" + Torrent
  • Links to sites with full version applications available for download.
  • “{Name of App}" + Warez
  • Most commonly used before torrents to find full version applications, usage is increasingly rare.
  • “{Name of App}" + Abandon Warez
  • This search term is generally used for the oldest of games. These games are generally portrayed as public domain and legal to download. They may or may not be legal.


Illegal Software / Installation
Illegal software more often than not requires a special install. It must be installed a particular way or it may not function properly. At times Warez will not come with install instructions, this is because of the communal nature of the scene, and some things you are expected to know. However, most downloads will come with install instructions, it can never be stressed enough to RTFM. For those of you who don’t know, Read The Freak'n Manual. 95% of the time the question you might have can be answered when you RTFM.

Illegal Software / Cautions
If one decides to venture into the realm of “Software Piracy” as some call it, an extreme amount of caution must be taken. One may first think the highest risk is getting caught downloading illegal software. This is not the case. Though that is one thing to worry about the primary concern should be this. Downloading illegal software comes with risks of infection from Spyware, Malware, Viruses, Trojan Horses, Rootkits, Keyloggers, and the list goes on. All of these are malicious software in one form or another that finds its way in to your computer and performs most likely a devious task. It’s a lot to keep up on. Many defenses are needed and not always effective. One of the best way to avoid such problem is to use a black site that you trust. I know, it may seem like a contradiction in terms, “A shady site that I can trust?” Well, there are some. You just have to know where to look. I won’t be giving out any names. The best way to find one is to look for a site that requires registration and has strict rules on upload and ratio, sites with the option to comment are preferred, such sites allow the downloaders & uploaders to operate as a community and quickly weed out bad software. Once you find a site that you think is safe enough to download the fact remains you can still be tracked. A widley spread claim is that a program known as Peer Guardian 2, can help dramatically reduce your chances of detection, I can neither confirm or deny this. It can be a lot of hassle to deal with Virus Scanner, Malware Cleaners, and the numerous amount of defensive programs that now seem required for anyone using a Windows operating system. I would recommend to anyone who is currently using a Windows operating system to switch to a Linux Variant. Linux does not have the same problems with viruses and malware experienced all to frequently by the Windows user.

Freeware
Applications licensed as ‘Freeware’ are programs that are available to be used by anyone free of charge. They never have limitations on the number of days you can use the app or features locked out. A wide variety of applications can be found as freeware and quite often have comparable features to commercial software. One such example is GIMP. GIMP is a freeware graphics editing tool that quite easily takes the place of other commercial image editors. Another example would be VLC. This media player is more powerful and intelligent that anything I have yet to come across, free or not. I highly recommend anyone who does not have VLC to begin using it. Just about any type of software you could need has a freeware alternative, it’s simply a matter of knowing it’s name; yep, even Windows has a freeware alternative, a great many as a matter of fact. I prefer Ubuntu Linux. One of my favorite features of Linux is the repository, a treasure chest of free programs, ready to download and install at the click of a button.