💾 Archived View for spam.works › mirrors › textfiles › programming › xit.txt captured on 2023-11-14 at 11:52:39.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

??????????????
? [XiT] v2.0 ? (C) Copyright 1993, 1994  XCrypt Productions
?????????????? Written by Roche'Crypt / Feb.94


 QUICK START
 ???????????

   Ok, you have your 'passwd' and a dictionary files, right? From the DOS
   prompt, just type:

   XIT PASSWD MYDICT.TXT

   No need to say that you are to substitute PASSWD and MYDICT.TXT for
   the appropiate filenames you are going to use.

   XIT is a batch file that will do the following:

   - Extract all encrypted passwords from the passwd file, and save them
     on a temporary file.
   - Sort this file (to speed up the cracking process and take advantage
     of different passwords using the same salt).
   - Run the cracker program (XITx.EXE)
   - Create a STATUS and REPORT files, showing results and statistics of
     the session. This information will also be displayed on the screen.
   

 NOTES
 ?????
 * XiT creates some temporary files. While these files are generally small,
   make sure there is enough space in your drive, i.e. don't run XiT on a
   floppy with only a few K free. No need to say that running XiT from a HD
   is highly reccomended. A disk cache will also help to improve speed,
   although there is no big deal of difference if you don't use any.
   XiT will get rid of those files before exiting the program.

 * To restore a previously aborted session, just write down the last word
   processed in the last session (which is also in the STATUS file) and use
   the option -S when calling XIT.BAT. If, for example, the last word 
   processed was 'foobar', you would  call XIT like:

      XIT passwd dictio -Sfoobar

   This will make XiT to skip all words in the dictionary until it finds 
   'foobar', and continue cracking from that point. Note there are NO
   spaces between the -S switch and the word.
  
 * XIT2.EXE is for 286 computers, and XIT3.EXE is for 386 or better. By
   default, XIT.BAT calls the 386 version. If you have a 286, edit XIT.BAT
   and change XIT3 to XIT2 in the line 19.


 WHAT'S NEW?
 ???????????
   - Got rid of all the crappy, useless docs. If you still want them
     (they explain step by step what each module does and how), send
     me mail.
   - Added the SPACEBAR option to display status line.
   - Optimize the code for better speed. 
   - Full C source code of the main executable file (XIT*.EXE) released

 And that's all. If you happen to know how to create a global/static table
 of more than 64k using Borland C 3.1, and know how to contact me, I would
 appreciate you let me know. That's all I need to speed up XiT to incredible
 limits! Hmm... I've gotta get my hands on that GNU compiler.


 WHY ANOTHER PASSWORD CRACKER?
 ?????????????????????????????
 I wrote this program for just one reason: as a small programming challenge
 and study of the UNIX crypt(3) function. By releasing full source code of
 the main module (xit.exe), I expect that others will learn (some will
 laught), study the code, play with it, critizise, and maybe improve it.
 I'm not really releasing XiT for sysadms to test the security of their
 systems, although they can do so if they want. And I am not releasing my
 work for other people to crack passwords with obscure purposes in mind
 neither. Being an encryption worshipper, I respect both, the rights to
 access free information, and the rights for privacy. However, I know that
 some people will use it to crack password files. This is something that
 can't be avoided (these losers trying to crack some poor user's account
 are truly pathetic, anyway).  But since there are similar public domain
 programs out there already doing this (and they have been for years), I
 know I'm not jeopardizing any system or account by releasing XiT.

 COMPILING THIS
 ??????????????
 Use Compact memory model. Compile and link XIT.C & CRYPT.C, with XIT.C as
 the main module. That's it. I used Borland C/C++ 3.1 to compile it, and
 there should be no problems there. Minor changes might be neccesary for
 other compilers.


 DISCLAIMER
 ??????????
 I expect you to use this program wisely, and for honest purposes only. If
 you mess up with other people's accounts and get in trouble, don't blame
 me. You asked for it. Next time be more mature and use your time in more
 productive ways.  Fortunately, nowadays more and more sysadms are using
 shadowed passwd files. Leaving the passwd file out there for everyone to
 see is like asking "Crack me, please!" and speaks by itself about the
 sysadms of that particular site.
 
 If XiT burns out your computer, erases your hard drive or installs Windows
 in it, again, don't blame me.  Anytime you run XiT or any of its modules, 
 you assume all the responsibility of whatever might happen. Any results
 from manipulating the code and recompiling it are your absolute 
 responsibility as well. All XiT modules, documentation and source code are
 copyright under the US and international laws. You are welcome to modify
 the code, send comments, try to improve it, post public and private notes
 about it (with or without source) and release your own versions (under a
 different name of course) but you MUST CLEARLY include credits where
 applicable in both, the program and the documentation (if you release your
 code, include it there as well), stating that the original code was 
 obtained from XiT 2.0 (c) copyright 1993,1994 XCrypt Productions, and
 written by Roche'Crypt. And blah blah blah... 


 HOW TO CONTACT THE AUTHOR
 ?????????????????????????
 I remain anonymous to the general public because I have decided to do so. 
 Period! If you want to send comments, post them in alt.2600, with the word
 XiT in the subject. I read the group on a weekly basis, and even you
 probably won't know who I really am, you migth as well be talking to me
 already. I might as well answer people's questions throught third parties
 using anonymous services and such. If you have something to say about XiT,
 post it in alt.2600 and it will get to me.

 Roche'Crypt