nIGHTmAYOR
Registered User.
- Local time
- Today, 11:04
- Joined
- Sep 2, 2008
- Messages
- 240
Ok so here goes:
In my hunt of securing my access application I was confrunted only 1 challenge. And hopefully nobody would even try and think of System.mdw Security permissions to solve it
Now the one and only hole that cant seem to be solved by any conventional mean is (Drum Rolls):
MSysObjects (Connect field to be specific)
Well I wouldnt expect a differance realy if they had it encrypted to cover up back end db/user password because for a mysterious reason Microsoft Encription Algorythms are marked the fastest to decode by internet underground community.
Listed are part of how geeks thought to secure it (knowingly that microsoft believes that all to it is setting up a security permission - yes right and give the exploiter the hassel of another 5 minutes to download and install another System.mdw passwords recovery pack):
1-Linking Tables Dynamicaly upon firing of front end
- Buzz Sound -
** Exploiter can still use "Link Table Manager" to connect to table from external database and retrieve connection string
2-Linking Tables Dynamicaly upon firing of front end and then locking the table access via DAO call
- Buzz Sound -
** Exploiter can still use "Link Table Manager" to connect to table from external database running a timer loop retrieve connection string upon first lock release for utilization
3-Linking Tables Dynamicaly on each and every call and deleting it post call execution
- Buzz Sound -
** Ok I'll try not to think of you as crazy , have you tried this before ? ok not commenting the rediculious time it takes a table to link programatically for a misterious reason , all it takes is to End Task application while in the middle of a call causeing the delete procedure to fail then you know the drill..
Now through my experimentations the issue could only be resolved through hex editing the database , which I am not realy sure if it would be fine with microsoft as ownership of database file vary to ownership of database structure (Now if someone could elaborate on this I'd be glad the line is thin here).
Waiting for your thoughts in anticipation.
Best regards,
nIGHTmAyor
In my hunt of securing my access application I was confrunted only 1 challenge. And hopefully nobody would even try and think of System.mdw Security permissions to solve it

Now the one and only hole that cant seem to be solved by any conventional mean is (Drum Rolls):
MSysObjects (Connect field to be specific)
Well I wouldnt expect a differance realy if they had it encrypted to cover up back end db/user password because for a mysterious reason Microsoft Encription Algorythms are marked the fastest to decode by internet underground community.
Listed are part of how geeks thought to secure it (knowingly that microsoft believes that all to it is setting up a security permission - yes right and give the exploiter the hassel of another 5 minutes to download and install another System.mdw passwords recovery pack):
1-Linking Tables Dynamicaly upon firing of front end
- Buzz Sound -
** Exploiter can still use "Link Table Manager" to connect to table from external database and retrieve connection string
2-Linking Tables Dynamicaly upon firing of front end and then locking the table access via DAO call
- Buzz Sound -
** Exploiter can still use "Link Table Manager" to connect to table from external database running a timer loop retrieve connection string upon first lock release for utilization
3-Linking Tables Dynamicaly on each and every call and deleting it post call execution
- Buzz Sound -
** Ok I'll try not to think of you as crazy , have you tried this before ? ok not commenting the rediculious time it takes a table to link programatically for a misterious reason , all it takes is to End Task application while in the middle of a call causeing the delete procedure to fail then you know the drill..
Now through my experimentations the issue could only be resolved through hex editing the database , which I am not realy sure if it would be fine with microsoft as ownership of database file vary to ownership of database structure (Now if someone could elaborate on this I'd be glad the line is thin here).
Waiting for your thoughts in anticipation.
Best regards,
nIGHTmAyor
Last edited: