Using the Pandora v4 Offline program
------------------------------------

Pandora v4 Offline is a program for extracting and cracking one-way
hashes used in the password authentication process within Novell Netware
versions 4.x and 5.x.

The GUI is divided into 4 sections, top to bottom:

   * Menu bar
   * Input section
   * Selected target
   * Results section

General application behavior (guides, not rules):

   * Anything loaded in via the File menu will display in the Input
     section after loading.
   * Headers will appear at the top of the Input section. The far
     right field is a numbering field, useful for setting up dictionary
     attacks.
   * Right-clicking in the Input section gives you context-sensitive
     sorting.
   * Double-clicking in the Input section gives you more detail or
     selects a target.
   * Results of cracking and other various actions will be displayed
     in the Results section.
   * Double-clicking in the Results section will allow you to erase a
     single line.

Description of Menu Selections
------------------------------

-- File

Under the File menu are the selections for manipulating files, along
with the Quit selection.

-- File->Browse NDS...

This selection allows you to browse all objects (read-only) in an NDS
tree. A dialog box lets you select either a Netware 4.x (*.NDS) or
5.x (*.DSD) NDS tree by selecting one of the files with those 
extensions. Pandora assumes all of the NDS files are in the same
directory. You can right-click in the Input section and sort the data. 
Double-clicking on an object will give you detailed information about 
that object (and an option to save that data).

-- File->Load->Password file...

You can load in a previously-saved password file.

-- File->Load-> Restore file...

You can load in an interrupted Brute Force cracking session for an
individual crack against a single account.

-- File->Extract and load->Passwords from *.NDS/*.DSD...

By selecting either files with the NDS or DSD extension, you can extract
the one-way hashes for password cracking. PASSWORD.NDS is automatically
created. Once loaded, it is displayed in the Input section, and you can
right-click for sorting options. Double-clicking on an item will show
detail and set up that item for password cracking by displaying it on
the "Selected target" line.

-- File->Extract and load->NDS&Passwords from BACKUP.DS/NDS or DSREPAIR.DIB

By selecting the appropriate file, you can recreate NDS files from any
one of the maintenance-created files used by DSMAINT or DSREPAIR. Once
the files are created, the password hashes are extracted and a PASSWORD.NDS
file is created. The PASSWORD.NDS file is loaded and displayed in the
Input section, and you can right-click for sorting options. Double-clicking
on an item will show detail and set up that item for password cracking by 
displaying it on the "Selected target" line.

-- File->Save->Password file...

Saves the current PASSWORD.NDS data in native Pandora format for future
use. You can use an alternate name for the file. This will also save any
cracked passwords as well.

-- File->Save->Input list to text file...

Saves the current sorted contents of the Input section to an optional. 
text file. The headers and the numbering field (on the far right) are not
saved.

-- File->Save->Result list to text file...

Saves the current contents of the result section to a text file.

-- Crack

Various parameters and selections for cracking passwords, as well as 
initiating cracking sessions all happen under the Crack menu.

-- Crack->Password Crack Settings...

This selection brings up a dialog box that allows you to set a number
of options:

   * Refresh/Save rate - This is the number of crack attempts that will
     be made against an account before the Results section is updated and
     before the current account is saved. The default is 3,000,000.
   * Save path - This is the base path for saving the restore files for
     crack events. Click on select for a dialog box for navigation to the
     directory where you wish to save your cracking progress.
   * Two radio buttons which allow you to select single account dictionary
     attacking (against the currently selected target) or dictionary 
     attacking against a range of objects.
   * Roll Your Own(tm) key space - You can enter your own keyspace as
     you see fit. For example, if you suspect a password is numeric
     only, you can enter a keyspace of 0123456789.   

-- Crack->Manual crack...

This selection allows you to try a single password guess at the selected
target account. Comes in kind of handy, especially if you are simply
verifying things are working.

-- Crack->Decipher remote...

TheRuiner's REMOTE.NLM decryption routine for the encrypted remote console
password. Enter the ciphertext and you are returned the plaintext.

-- Crack->Brute force...

Brute force the selected target. A dialog box comes up and allows you to
enter specific information regarding the selected target. You can select
your keyspace, define a first, current, and last password to try within
that keyspace, and the filename to save your progress (the default is the
defined "Save path" from Crack->Password Crack Settings..." with the
file name being the object ID with a .PAN extension). Clicking on OK
starts the brute force attack. The current status will appear in the
Results section, and once a password is cracked it will appear in the
Results section as well as update the PASSWORD.NDS file displayed in the
Input section.

-- Crack->Dictionary attack...

Dictionary attack to get a password. If you've selected "When dictionary
attack, crack selected object" then the currently selected target will
be used. If you selected "When dictionary attack, crack range of objects",
then you will be given a range of objects to crack (the default is all)
based upon the numbering of the objects in the Input list (far left
field). Next will be a dialog box for selecting your dictionary word
list.

-- Help

Various help files and other documentation for Pandora v4.