Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Weird and The Wonderful
  4. Hardcoded Teacher Passwords

Hardcoded Teacher Passwords

Scheduled Pinned Locked Moved The Weird and The Wonderful
sysadminsecurityhelptutorialquestion
13 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • 1 Offline
    1 Offline
    1215drew
    wrote on last edited by
    #1

    So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

    if pw = "gnipyt"
    then DoTeacherLogin();
    else BadTeacherLogin();

    This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

    Z R B P D 8 Replies Last reply
    0
    • 1 1215drew

      So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

      if pw = "gnipyt"
      then DoTeacherLogin();
      else BadTeacherLogin();

      This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

      Z Offline
      Z Offline
      ZurdoDev
      wrote on last edited by
      #2

      Quote:

      A simple google search yields the password in the search results.

      I wonder which sites have posted the password? :)

      There are only 10 types of people in the world, those who understand binary and those who don't.

      H 1 Reply Last reply
      0
      • 1 1215drew

        So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

        if pw = "gnipyt"
        then DoTeacherLogin();
        else BadTeacherLogin();

        This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

        R Offline
        R Offline
        Ron Beyer
        wrote on last edited by
        #3

        Back in high school they installed a security package called "fortress". It locked a computer down pretty tight, didn't allow access to the desktop and only let us run a certain web browser and 3 office products (word, excel, powerpoint). It took me about a week to figure out that I could get shell access through Word (Word's About dialog used to allow to bring up a task manager that would let me run any command). Took another week to figure out the admin password (wasn't hard coded, but the teacher responsible for setting it up was a Pascal programmer, so his password was, of all things, "pascal"). Kids are inventive, if the manufacturer can't fix these problems then I would bring them up to school officials and tell them that a new solution needs to be found.

        S 1 Reply Last reply
        0
        • 1 1215drew

          So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

          if pw = "gnipyt"
          then DoTeacherLogin();
          else BadTeacherLogin();

          This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

          B Offline
          B Offline
          Brisingr Aerowing
          wrote on last edited by
          #4

          For a product like that, these kind of security holes are completely unforgivable. That is a big product. And they should know better. I agree with Ron. Alert the manufacturer, and if they don't respond quickly, or do respond with something like 'That is a by-design limitation of the school version', get something else!

          Keep Clam And Proofread -- √(-1) 23 ∑ π... And it was delicious.

          1 1 Reply Last reply
          0
          • 1 1215drew

            So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

            if pw = "gnipyt"
            then DoTeacherLogin();
            else BadTeacherLogin();

            This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

            P Offline
            P Offline
            PIEBALDconsult
            wrote on last edited by
            #5

            :-D As to the password part, a program I wrote for an employer many years ago presented the user with a welcome screen, at the bottom it had a "Press RETURN to continue..." line, if you typed SUPER before pressing RETURN, it turned on some "advanced features". :cool:

            1 Reply Last reply
            0
            • 1 1215drew

              So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

              if pw = "gnipyt"
              then DoTeacherLogin();
              else BadTeacherLogin();

              This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

              D Offline
              D Offline
              Dave Kreskowiak
              wrote on last edited by
              #6

              That's because Mavis doesn't know anything about security, or "best practices". They just know, well, typing.

              A guide to posting questions on CodeProject[^]
              Dave Kreskowiak

              1 Reply Last reply
              0
              • B Brisingr Aerowing

                For a product like that, these kind of security holes are completely unforgivable. That is a big product. And they should know better. I agree with Ron. Alert the manufacturer, and if they don't respond quickly, or do respond with something like 'That is a by-design limitation of the school version', get something else!

                Keep Clam And Proofread -- √(-1) 23 ∑ π... And it was delicious.

                1 Offline
                1 Offline
                1215drew
                wrote on last edited by
                #7

                So I called their technical support, and after finally getting the "Support Specialist" to understand that I was not calling with an Error Code but rather a problem in the functionality of the program, I was told that they might add changeable passwords to their wishlist for the next version of the software. What I would like to know is how they made it 21 versions already without someone thinking about this. Since the Administration has already paid for the software they are set upon using it, requiring that staff keep a close eye on students. Well I tried.

                N 1 Reply Last reply
                0
                • 1 1215drew

                  So I called their technical support, and after finally getting the "Support Specialist" to understand that I was not calling with an Error Code but rather a problem in the functionality of the program, I was told that they might add changeable passwords to their wishlist for the next version of the software. What I would like to know is how they made it 21 versions already without someone thinking about this. Since the Administration has already paid for the software they are set upon using it, requiring that staff keep a close eye on students. Well I tried.

                  N Offline
                  N Offline
                  NeverJustHere
                  wrote on last edited by
                  #8

                  I would request a refund. The software, by any reasonable definition, is not fit for the purpose it's intended. Check out your local consumer rights definition - or better yet, consult a laywer, get a letter drafted stating you position and requesting a refund.

                  1 Reply Last reply
                  0
                  • 1 1215drew

                    So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

                    if pw = "gnipyt"
                    then DoTeacherLogin();
                    else BadTeacherLogin();

                    This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

                    S Offline
                    S Offline
                    Silvabolt
                    wrote on last edited by
                    #9

                    Wowww... terrible software. They clearly don't CR their work, or their company is run by kids. Regarding that setting file though, I believe there are 3rd party file lock tools, but its probably not your biggest concern at the moment.

                    1 Reply Last reply
                    0
                    • R Ron Beyer

                      Back in high school they installed a security package called "fortress". It locked a computer down pretty tight, didn't allow access to the desktop and only let us run a certain web browser and 3 office products (word, excel, powerpoint). It took me about a week to figure out that I could get shell access through Word (Word's About dialog used to allow to bring up a task manager that would let me run any command). Took another week to figure out the admin password (wasn't hard coded, but the teacher responsible for setting it up was a Pascal programmer, so his password was, of all things, "pascal"). Kids are inventive, if the manufacturer can't fix these problems then I would bring them up to school officials and tell them that a new solution needs to be found.

                      S Offline
                      S Offline
                      Sentenryu
                      wrote on last edited by
                      #10

                      i still get access to the shell on my university labs by running oracle's "start database" utility, for some reason, that thing keeps the console open after it closes :-\

                      I'm brazilian and english (well, human languages in general) aren't my best skill, so, sorry by my english. (if you want we can speak in C# or VB.Net =p) "Given the chance I'd rather work smart than work hard." - PHS241 "'Sophisticated platform' typically means 'I have no idea how it works.'"

                      1 Reply Last reply
                      0
                      • 1 1215drew

                        So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

                        if pw = "gnipyt"
                        then DoTeacherLogin();
                        else BadTeacherLogin();

                        This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

                        S Offline
                        S Offline
                        Sentenryu
                        wrote on last edited by
                        #11

                        Does it require R/W access to that file for students? if not, you can always set individual file permissions.

                        I'm brazilian and english (well, human languages in general) aren't my best skill, so, sorry by my english. (if you want we can speak in C# or VB.Net =p) "Given the chance I'd rather work smart than work hard." - PHS241 "'Sophisticated platform' typically means 'I have no idea how it works.'"

                        1 Reply Last reply
                        0
                        • 1 1215drew

                          So has anyone run into this before? Was just installing the school version of Mavis Beacon 21 and found two large security holes in it. The first is it requires I give students full Read/Write access to its network folder, which contains its settings file. Now this settings file controls some key behaviors, such as the ability to use backspace on tests and quizzes, guide hands, and their WPM goal. With Read/Write access students can easily edit this file. However if I only give them Read access, the program throws an exception. The second security nightmare is a hardcoded admin password. A hex dump of the software yields the statement:

                          if pw = "gnipyt"
                          then DoTeacherLogin();
                          else BadTeacherLogin();

                          This is a bit of a problem in an environment with high school students who actively try to discover admin passwords for the various services. While I could change this in the hex dump, the school administrator is against the idea. A simple google search yields the password in the search results. It looks like the teachers will just have to keep a close eye on students via the monitoring software for now.

                          G Offline
                          G Offline
                          GuyThiebaut
                          wrote on last edited by
                          #12

                          1215drew wrote:

                          if pw = "gnipyt"

                          I always find with these sorts of issues that it is best to gnipyt in the bud...

                          “That which can be asserted without evidence, can be dismissed without evidence.”

                          ― Christopher Hitchens

                          1 Reply Last reply
                          0
                          • Z ZurdoDev

                            Quote:

                            A simple google search yields the password in the search results.

                            I wonder which sites have posted the password? :)

                            There are only 10 types of people in the world, those who understand binary and those who don't.

                            H Offline
                            H Offline
                            H Brydon
                            wrote on last edited by
                            #13

                            Besides this one you mean?

                            Windows 8 is the resurrected version of Microsoft Bob. The only thing missing is the Fisher-Price logo. - Harvey

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups