Cracking Cleanersoft Free Hide Folder Security
Introduction
Cleanersoft Free Hide Folder is a "security" tool used to hide your folders. The program uses a simple interface that is protected by a password that lets you hides and unhides selected folders. Our target objectives here will be to find where it is hiding the information about what folders are hidden and recover the password.Finding where the folder information is stored
Well, We will use the easiest approach, see what files and registry keys the program (fhide.exe) writes to using Process Monitor while hiding a folder (in this case C: est). This should show us where it is writing to and it seems this approach worked out well.

Well, What have we here. We see a file operation on my C: est folder, it renamed the folder "CHKDSK.100��" and that is followed by a registry key creation at "HKCUSoftwareMicrosoftWindowsCurrentVersionNamespacegetPrefix0".
First lets confirm the folder was renamed. since it is hidden I will run the command line command "DIR /A:SH CHKDSK.*" (the /A:SH will show hidden and system files and folders). Wow... Its right there, great hiding trick.... is it accessible? Run a "cd CHKDSK.100��". Looks like we can.
Okay, Lets see whats hidden here with a "Dir" command and we see private.txt. Okay, well it should be encrypted right? guess again... "Type private.txt".
Well We are off a bad start for security. But how do we know where these are hidden if we didnt hide them? How can we find them? Well lets check out that registry key. Okay. Lets take a look at the keys here.
The last is the getPrefix key. I had one folder unhidden when I was working and the key value changed to "W". So it seems that "E" means it is hidden, "W" means not hidden. So Id Say we have this down now.
Last thing to attack is the password for the program (in this case it is "Password"). Lets check more into the registry. There is one more key here:

Well, What have we here. We see a file operation on my C: est folder, it renamed the folder "CHKDSK.100��" and that is followed by a registry key creation at "HKCUSoftwareMicrosoftWindowsCurrentVersionNamespacegetPrefix0".
First lets confirm the folder was renamed. since it is hidden I will run the command line command "DIR /A:SH CHKDSK.*" (the /A:SH will show hidden and system files and folders). Wow... Its right there, great hiding trick.... is it accessible? Run a "cd CHKDSK.100��". Looks like we can.
Okay, Lets see whats hidden here with a "Dir" command and we see private.txt. Okay, well it should be encrypted right? guess again... "Type private.txt".

- getPrefix0 = E
- Declaration0 = X:*XSPWHP.377��
- Javax0 = X:*gvhg
- getPrefix1 = E
- Declaration1 = X:*XSPWHP.373��
- Javax1 = X:*gvhg321
- C:abcdefghijklmnopqrstuvwxyz1234567890
- X:*zyxwvutsrqponmlkjihgfedcba3215894067
The last is the getPrefix key. I had one folder unhidden when I was working and the key value changed to "W". So it seems that "E" means it is hidden, "W" means not hidden. So Id Say we have this down now.
Finding The Password
Last thing to attack is the password for the program (in this case it is "Password"). Lets check more into the registry. There is one more key here:
- BAR - Kzhhdliw
Resources
CleanerSoft Free Hide Folder:
http://www.cleanersoft.com/hidefolder/free_hide_folder.htm
Substitution cipher:
http://en.wikipedia.org/wiki/Substitution_cipher
Substitution cipher solver:
http://www.purplehell.com/riddletools/applets/cryptogram.htm
Free Unhide Folder (Source[vb.net 2008] and Binary):
http://packetstormsecurity.org/1010-exploits/FreeUnHideFolder.zip
http://www.cleanersoft.com/hidefolder/free_hide_folder.htm
Substitution cipher:
http://en.wikipedia.org/wiki/Substitution_cipher
Substitution cipher solver:
http://www.purplehell.com/riddletools/applets/cryptogram.htm
Free Unhide Folder (Source[vb.net 2008] and Binary):
http://packetstormsecurity.org/1010-exploits/FreeUnHideFolder.zip
alternative link download