������������ͻ � [XiT] v2.0 � (C) Copyright 1993, 1994 XCrypt Productions ������������ͼ Written by Roche'Crypt / Feb.

94 QUICK START ����������� Ok, you have your 'passwd' and a dictionary files, right? From the DOS prompt, just type: XIT PASSWD MYDICT.TXT No need to say that you are to substitute PASSWD and MYDICT.TXT for the appropiate filenames you are going to use. XIT is a batch file that will do the following: - Extract all encrypted passwords from the passwd file, and save them on a temporary file. - Sort this file (to speed up the cracking process and take advantage of different passwords using the same salt). - Run the cracker program (XITx.EXE) - Create a STATUS and REPORT files, showing results and statistics of the session. This information will also be displayed on the screen. NOTES ����� * XiT creates some temporary files. While these files are generally small, make sure there is enough space in your drive, i.e. don't run XiT on a floppy with only a few K free. No need to say that running XiT from a HD is highly reccomended. A disk cache will also help to improve speed, although there is no big deal of difference if you don't use any. XiT will get rid of those files before exiting the program. * To restore a previously aborted session, just write down the last word processed in the last session (which is also in the STATUS file) and use the option -S when calling XIT.BAT. If, for example, the last word processed was 'foobar', you would call XIT like: XIT passwd dictio -Sfoobar This will make XiT to skip all words in the dictionary until it finds 'foobar', and continue cracking from that point. Note there are NO spaces between the -S switch and the word. * XIT2.EXE is for 286 computers, and XIT3.EXE is for 386 or better. By default, XIT.BAT calls the 386 version. If you have a 286, edit XIT.BAT and change XIT3 to XIT2 in the line 19. WHAT'S NEW? ����������� - Got rid of all the crappy, useless docs. If you still want them (they explain step by step what each module does and how), send me mail. - Added the SPACEBAR option to display status line.

- Optimize the code for better speed. - Full C source code of the main executable file (XIT*.EXE) released And that's all. If you happen to know how to create a global/static table of more than 64k using Borland C 3.1, and know how to contact me, I would appreciate you let me know. That's all I need to speed up XiT to incredible limits! Hmm... I've gotta get my hands on that GNU compiler. WHY ANOTHER PASSWORD CRACKER? ����������������������������� I wrote this program for just one reason: as a small programming challenge and study of the UNIX crypt(3) function. By releasing full source code of the main module (xit.exe), I expect that others will learn (some will laught), study the code, play with it, critizise, and maybe improve it. I'm not really releasing XiT for sysadms to test the security of their systems, although they can do so if they want. And I am not releasing my work for other people to crack passwords with obscure purposes in mind neither. Being an encryption worshipper, I respect both, the rights to access free information, and the rights for privacy. However, I know that some people will use it to crack password files. This is something that can't be avoided (these losers trying to crack some poor user's account are truly pathetic, anyway). But since there are similar public domain programs out there already doing this (and they have been for years), I know I'm not jeopardizing any system or account by releasing XiT. COMPILING THIS �������������� Use Compact memory model. Compile and link XIT.C & CRYPT.C, with XIT.C as the main module. That's it. I used Borland C/C++ 3.1 to compile it, and there should be no problems there. Minor changes might be neccesary for other compilers. DISCLAIMER ���������� I expect you to use this program wisely, and for honest purposes only. If you mess up with other people's accounts and get in trouble, don't blame me. You asked for it. Next time be more mature and use your time in more productive ways. Fortunately, nowadays more and more sysadms are using shadowed passwd files. Leaving the passwd file out there for everyone to see is like asking "Crack me, please!" and speaks by itself about the sysadms of that particular site. If XiT burns out your computer, erases your hard drive or installs Windows in it, again, don't blame me. Anytime you run XiT or any of its modules, you assume all the responsibility of whatever might happen. Any results from manipulating the code and recompiling it are your absolute responsibility as well. All XiT modules, documentation and source code are copyright under the US and international laws. You are welcome to modify the code, send comments, try to improve it, post public and private notes about it (with or without source) and release your own versions (under a different name of course) but you MUST CLEARLY include credits where applicable in both, the program and the documentation (if you release your code, include it there as well), stating that the original code was obtained from XiT 2.0 (c) copyright 1993,1994 XCrypt Productions, and written by Roche'Crypt. And blah blah blah...

HOW TO CONTACT THE AUTHOR ������������������������� I remain anonymous to the general public because I have decided to do so. Period! If you want to send comments, post them in alt.2600, with the word XiT in the subject. I read the group on a weekly basis, and even you probably won't know who I really am, you migth as well be talking to me already. I might as well answer people's questions throught third parties using anonymous services and such. If you have something to say about XiT, post it in alt.2600 and it will get to me. Roche'Crypt