This page is a wiki. Please login or create an account to begin editing.


21 posts / 0 new
Last post
Offline
Joined: 2013 May 6
CharisMac Anubis Utility 3.5.2 (SCSI Hard Disc tools)

Hi all,

I've come a little unstuck trying to track this down! Anyone have a copy? I already have v3.0 which is suitable for MacOS 8.5, but later versions are necessary for newer OSs like 9.1 and also offer support for Firewire which would be useful. Any info tracking this down would be much appreciated.

Thanks!

Comments

Offline
Joined: 2013 Apr 14

Fortunately and unfortunately i have that file, however, charismac had the "smart" idea to put passwords on their downloads, so i can't decompress it. I've never used that utility so that went to my "unusable files" storage. Maybe after 10 years of its creation somebody knows the password and can share it with us.

Offline
Joined: 2013 May 6

Brilliant! That's promising... I think. I wonder how difficult it is to get past the pw? Would you mind emailing me the file to I could see if my existing pw works? Thanks!

Offline
Joined: 2011 Oct 31

Well if that don't work you can give me a mail and I can dust off the skills to give it a go...Smile

Offline
Joined: 2013 May 6

Thanks for that!

And Thank you MacJames, I got your files OK. Will try it later tonight and see how I get on!

Offline
Joined: 2013 May 6

oh well, no dice Sad

whatever the pw is for the stuffit archives it's not the one I already had.

Radius, is it really possible to hack into these? Could I send them to you to try? Thanks.

Offline
Joined: 2011 Oct 31

Well that stinks guess its the long way then.....Its not hacking its more of a modification...In some cases of the older mac software you don't need a password...You just make the software think it does have the correct password.....
macjames has sent these to me and they are on my mac and ready for processing.....

Offline
Joined: 2013 May 6

Oh OK. All a bit beyond my skills! I hope it's a fairly quick and easy task. Thanks a heap for having a go.

Offline
Joined: 2011 Oct 31

You are welcome digichick.....I dusted off the skills but I still got the rust...hehe....
I did manage to find and change the passwords for both archives so that would allow me to work with them and try to unstuff them with my own password.........They will unstuff but only partial so I got to figure out why that happens....Might be another instance of a password hidden that does not fully release the archive.....Here they are when unstuffed partially....
http://www.mediafire.com/view/?obxuu1wxvkt8zvp

Offline
Joined: 2013 May 6

wow, seriously impressive! Is that anubis 3.52 archive launch'able? Or is it just an icon. Looks like you're almost there. Fingers crossed..

Offline
Joined: 2011 Oct 31

Unfortunately these are just icons that unstuff.......Been thinking more about this thou and there could be several reasons why that happens....The number one thing is the above that I mentioned...Or could be that the archive becomes corrupt after changing what I change. Or could be that the stuffit engine gets goofy with the changes to the archive....
I'll post when I get some more news....

Offline
Joined: 2013 May 6

Just checking in for progress.

No joy I guess? Must be a challenge and a half..

Offline
Joined: 2011 Oct 31

Yep no progress yet.....I have not had any time to work any further on this one....If it was a .sit file then I would be done already..Wink........I checked my methods with that SoundRecorder in another thread and came up with the same results as above......

Offline
Joined: 2013 May 6

OK, thanks very much for trying! There was a glimmer of hope, but now I'll try to think of alternative options. At least I have v3 working and seems OK so far. Cheers!

Offline
Joined: 2011 Oct 31

With the help of Bob Kiwi one of these is now done and I have uploaded it here....
http://www.mediafire.com/download/3lqd5vt7p17e80u/Anubis_Utility_V3.52.sit

A big thanks goes to Bob Kiwi for getting this one to unstuff with his research, tools
and sweat...Smile
http://code.google.com/p/kasper/

Offline
Joined: 2013 Apr 14

OMG so you did use kasper.. congratulations!!

Offline
Joined: 2011 Oct 31

Well Bob used kasper..Wink He wanted to give it a go so he did the heavy lifting on this one.........I just checked the numbers on the old mac to see if they worked....
Still working on that other archive as well...Smile

edit.....
Here is the other version of Anubis...
http://www.mediafire.com/download/aokfgyre3dj7jbk/Anubis_Utility_V3.10.sit

Bob Kiwi's picture
Offline
Joined: 2010 Jun 16

Glad to be of help. It's been great having some protected stuffit archives to try to recover passwords to that aren't just test research archives! A good three weeks of massive crunching until both fell to Kasper ;3

If anyone gets more, do let me know. I've learned a lot with radius81110 and hope to make some more tweaks, edits, and videos to help others out with this wildly niche password recovery system.

Offline
Joined: 2013 May 6

wow! this is frankly mind-blowing, I'm speechless! Fascinating process. So is this some kind of heuristic brute force process which just tries thousands of combinations until something works?? Either way, I'm really grateful for your efforts. Thank you! I've unstuffed the archive OK but haven't tried running the installer yet, so will give that a go after the weekend. Really exciting.

Offline
Joined: 2011 Oct 31

Hopefully they will work for ya.....I have tried them on OS 9.2.2 and on 7.6......They do not work running with sheepshaver since their is no real hardware to support....(obviously)...Smile

Bob Kiwi's picture
Offline
Joined: 2010 Jun 16

Brute forcing the password hash used in Stuffit 5-era passwords is possible. I was getting 90k tries a second per core, but after some work got it to 600k tries per second per core, so that broke the hash much more quickly. Previous versions of Kasper used either the Stuffit CLI or The Unarchiver CLI tools to attack the file, which was extremely slow. Unfortunately, this method is the only path for old Stuffit 4 or Stuffit X files, for now.

If you're interested, and until I get some documentation/videos up, here's my blog entry on the process. Comments welcome ;3

http://kiwidget.com/kasper-stuffit-5-password-recovery/

It's actually really interesting to me- we aren't recovering the original password usually, but a second/third/fourth password that hashes to the same, and can decrypt the file just as well!