Foolproof information for version 3.7
Relevant information for Foolproof 3.8
Relevant information for Foolproof 3.9
Another way to circumvent Foolproof
Yet some more ways to circumvent Foolproof
First of all, the security system for Windows 95/98 known as FoolProof does nothing that can't be circumvented. Second, besides there being FoolProof hacking methods here, there is also general information on the product itself (not that you should ever consider buying it). Continue.
Ok, here's all you have to do. When the computer starts up hit F8 and choose step by step confirmation. When you see the command line in the AUTOEXEC.BAT for FoolProof, DO NOT tell the computer to execute it. Then, when you have file read/write access, just edit the AUTOEXEC.BAT and CONFIG.SYS and REM out the commands. When you're done, make sure and un REM them so that the school doesn't catch on.
This was given to me in an e-mail message.
How to Circumvent FoolProof
There is usually a hotkey to turn off FoolProof. One young hacker reports his school uses shift-alt-X (hold down the shift and alt keys at the same time, then press the “x” key.) Of course other schools may have other arrangements.
If you get the hotkey right, a sound may play, and a lock in the lower-right corner should open for 20-30 seconds.
Dante tells how he managed to get out of a hot spot with an even better hack of Fool Proof. “My computer science teacher asked me to show her exactly HOW I managed to print the ‘the universe revolves around me’ image I made to all the network printers in the school...” So he had her watch while he did the deed.
************************************************************
You can get punched in the nose warning: Dante was lucky that his teacher was understanding. In some schools a harmless joke like this would be grounds for expulsion.************************************************************
Here is how Dante -- and anyone -- may disable FoolProof.
You are now the school hero security expert.
All of number two was ripped straight out of the GUIDE TO HARMLESS HACKING, Volume 3. To subscribe to Happy Hacker and receive the Guides to (mostly) Harmless Hacking, please email hacker@techbroker.com with message "subscribe happy-hacker" in the body of your message. Copyright 1997 Carolyn P. Meinel. You may forward or post this GUIDE TO (mostly) HARMLESS HACKING on your Web site as long as you leave this notice at the end.
And that's exactly what I have done.
This was stolen from a posting on a news group.
This was also stolen from a posting on a news group. It is the follow up post from the above post.
To: km@hackersclub.com
Subject: FOOLPROOF FOR MAC HAK
Date: Tuesday, March 02, 1999 5:17 PM
Heres how to disable Foolproof Controls on MACS-
From macsux_14@hotmail.com
The preceding instructions in yellow are instructions for the MAC hack.
FoolProof provides you with control over how much access various users have to the data and applications on your computer. You can set up passwords for individuals or groups to have tightly restricted or completely free access. You can also restrict the locations at which files are stored for each user.
Sounds like a pain. Why use it?
Sometimes, inexperienced users may inadvertently erase or alter your important data. In addition, hackers may attempt to purposely destroy your files (HACKERS PURPOSELY DESTROYING DATA......NO REAL HACKER DOES THIS). FoolProof, when used correctly, can eliminate most of these problems.
How does it work?
Very well - as long as you don't share passwords with people who don't need to know them. It's important that you understand the three types of FoolProof passwords.
Quisit
"Foolproof information for version 3.7" was submitted by Quisit.
There are a few updates with version 3.8 that are worth mentioning. First of all, there is a new feature in 3.8 that can "lock a dangerous program". I have no idea what this means, but it most likely is referring to programs such as viruses and trojans that can damage the computer. All this means is that you need to use discretion in case you wish to install a keylogger or any other rogue program.
Secondly, there are two new "Foolproof" policy options available in the Network settings. The first one is the ability of Foolproof to make the network validate the user login name and password before allowing access to the system. I don't know when the authentication is presented to the user. It could either be when the computer is in DOS or Windows mode. If it is in DOS mode, then that might suggest that whenever the computer starts, the user has to put a valid username and password into a login prompt and then and only then will Windows start up. If that is the case, then that is the only way you can get access to Windows. If the authentication is presented in Windows, then that simply means that a valid username and password must be entered for access to the Desktop and the Windows network. These two possibilities are entirely possible, but there is a third and much more likely possibility. The loophole that Foolproof is probably attempting to close here is this:
Whenever someone starts up the computer, DOS runs and then DOS will automatically load Windows. When Windows boots up it will want a valid username and password before anyone can access the desktop and network (and more importantly, the contents of the hard drive). You might notice that if you are on a LAN and you need access to the Windows environment from a Windows login prompt, all you have to do is press ESCAPE and you are automatically kicked into a default Windows desktop. Foolproof is probably just preventing you from doing that, but I should say that I don't know for sure because I don't have version 3.8 which means I haven't been able to test it. You will have to see for yourself.
The third new feature that is worth mentioning is simply the "Foolproof" policy option in the Network settings that can disable password caching. This option in Windows can also be accomplished through the policy editor or registry editor. I describe how to do this manually in the glide.htm document. All Foolproof has done is made this a "point and click" feature.
Improvements in release 3.9.3 (released 1/21/00):
Modifications have been made to make FoolProof Security compatible with the LabExpert network management and Vision classroom demonstration and remote control applications.
Improvements in release 3.9 (released 9/1/99):
The preceding information was taken from http://www.insecure.org
Besides what has already been mentioned here, there are many other ways to circumvent Foolproof.
If you would like the version history on FoolProof, then go to http://www.smartstuff.com. There might be some relevant information there if you need to find out what version of Fool Proof you are running.
Make a note that you don't necessarily need to disable FoolProof in order to access a network server. Even if FoolProof is running, you can access network resources. However, FoolProof does provide a small amount of network security. The FoolProof program has the ability to prevent any user from mapping or disconnecting a network drive, however, this feature is only available in the My Computer, Network Neighborhood, and Windows Explorer windows (the map and disconnect options are under the TOOLS menu in the window). The loophole here is that if you have access to the run feature or a dos window, it is possible to run the file manager (otherwise known as C:\WINDOWS\WINFILE.EXE). You can still map and disconnect to network resources via the file manager (the map and disconnect options are under the DISK menu in the file manager window (Alt-D)). Remember that FoolProof's intended design is to only prevent idiots from doing malicious damage to the computer where FoolProof is installed. Only in special cases will you need to disable foolproof to access a certain network resource.
If you're an admin reading this, then now you know how to configure your FoolProof settings properly. There is one thing to remember about Windows 95/98. If there is one way to do it, there are at least ten more ways. Take that into consideration when you are setting up FoolProof.
Finally, there is something to remember about the hot key feature of FoolProof. Even if there is one set, even if you successfully find out what the hot key combination is, this will only disable FoolProof for a limited amount of time. At the most, you might have around one minute to do whatever it is you need to do. After one minute or less, FoolProof kicks back in. When it kicks back in again, all you need to do is press the hot key combination again and FoolProof will be disabled for another short amount of time. If you are an intruder, I recommend mapping a network drive before FoolProof turns back on. That is all for now.
Date: Sat, 21 Feb 1998 22:58:42 EST
From: Mark M Marko