NAME:		VMS Crack V1.0 security program
COPYRIGHT:	Coded by Davide Casale
		Coded and optimized by Mario Ambrogetti in June 1994 
		Original algorithm by Shawn Clifford in February 1993

START:		VMSC [Options]
LANGUAGE:	Englisch
OS:		UNIX


INSTRUCTIONS:
 (Sorry in advance if English Language is not so good in this 
 README file, but I've no time and I don't feel like making a very
 good translation of Italian version of this README file ... and
 perhaps I don't know where is my good old English Dictionary ...)
                                                              D.C.

 This program, in its concept, is very close to the Crack for UNIX
 by Alec Muffet, and it moves that idea into the VMS' world and so
 VMSC is an encryption/comparison program.
 Like its UNIX partner, a SYSTEM ADMINISTRATOR can, with VMSC, check
 the security level of the password that the users use in a specific
 machine running VMS operative system from version 2.0 (if it exists!)
 to version 6.0. The main difference, from a theoretic point of view,
 between a Unix' Crack and a VMS' one is that in the first one the 
 PASSWD (the file that contains every encrypted passwords) can be
 read by all the users (not always, but very near to that), instead
 in the second one the SYSUAF.DAT file can be read only by the SYSTEM
 (or by users with similar privileges). In this way it's more difficult
 that our VMSC will be used by third party to find passwords over a 
 VMS machine.
 This version of VMSC is just built and optimized to run over
 INTEL 386/486 machine, easy available around the world. You must
 to copy the VMS' SYSUAF.DAT file that you want to analyze over your
 DOS machine, remembering that SYSUAF is an INDEXED BINARY and so
 you must copy it with attention (on the contrary over Unix there
 is an easy moving ASCII PASSWD).
 The ZIP archive with VMSC should be compund of : all the sources,
 various makefiles for some C compilers under MSDOS, the exe's files,
 two README with some instruction and some ascii dictionary.
 The list of options that you can use into the line command with VMSC 
 is callable running VMSC with '-h' or '-?' option (ex: VMSC -h) and
 you will see this output :

 VMS Crack V1.0 security program
 Coded by Davide Casale in June 1994
 Coded and optimized by Mario Ambrogetti in June 1994
 Original algorithm by Shawn Clifford in February 1993

 VMSC [Options]
   Options :
  
     -?,-h,-H : Show this help page.
     -s       : Single word mode.
     -u       : Single user mode.
     -l       : Look all users' record.
     -c       : Create a namelist from a SYSUAF to use as words.
     -k       : Don't skip user account disabled.
     -t       : Test crypt result for proper encryption.
     -d       : Debug mode.
     -q       : Quiet mode.
     -S file  : Specific SYSUAF file.
     -V file  : Specific vocabulary file.
     -O file  : Specific output file.
     -P pass  : Specific password for single word mode.
     -L user  : Look a specific user's record.
     -U name  : Specific name for single user mode.


 Usually you must give to the program the name of your SYSUAF, the
 name of a dictionary file (a word under the previous one, look the
 dictionary enclosed for example) and the name of the OUTPUT file.
 The specific options are:

 '-s' : with that you can give to the program only a word as password,
 instead using a dictionary file;

 '-u' : with that you can check all a dictionary over a single user;

 '-l' : show all users' record;

 '-c' : make a text file, that you can use as dictionary, with all
 the usernames into the analysed SYSUAF;

 '-k' : usually the program don't analyse user with DISUSER flag setted
 on, with this option VMSC does it;

 '-t' : check that all encryptions are good;

 '-d' : debug mode, every single step of encryption/comparison of
 every user with all the words is showed over your screen;

 '-q' : no output over your screen;

 '-S file' : name of the SYSUAF.DAT file (if not selected, the program
 will ask for that without problem);

 '-V file' : name of the dictionary file (if not selected, the program
 will ask fot that);

 '-O file' : name of the output file (if not selected, the program will
 ask for that);

 '-L user' : show datas of an user into the SYSUAF.DAT;

 '-U name' : name of the user for single user mode.

 You can stop VMSC with CTRL+C, or it stops itself when all words are
 checked with all users.

 Into the output file there will be every users with hit password, in this
 form :

 User : [USER], Password : [PASS]

 and at the end of the file there will be some statistic about the analyse :

*=============================================================================*

Users                  : 546
Password found         : 72
Comparisons            : 546
Time elapsed in seconds: 14
Comparisons/seconds    : 39.00
Encryption performance : 13.19%

*=============================================================================*

 VMSC is a FREEWARE program and it goes out with all its sources, if
 anybody finds a way to optimize all that or if anybody writes down
 a good version of VMSC for VMS or UNIX with a speed at least faster
 than a 486DX2 at 66Mhz under DOS, we will very happy to receive that.
 If any commercial 'entity' (or institution) finds a way to make money
 with our program will be nice that it contacts us.
 That's all, good work with VMSC V1.0.


 If you want to contact us for anything :

 DAVIDE CASALE      email : CASALE@PMN.IT 
 MARIO AMBROGETTI   email : s65710@galileo.polito.it


*=============================================================================*


