开发者

How to recognize this string encrpytion? [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. Closed 12 years ago.

server=837858331746934658232248630236935288281180421

database=33860713488693开发者_如何学编程02078373769320683350673360583083

username=3275115374797048

password=830105037835230605335414837835034204884870173

program using config.ini, it written by delphi. how can i decrypt this code, sorry for my bad english :(


As Asaph suggests in a comment, sniffing the network traffic with something like WireShark may yield the information you need.

Additionally (and I've never done this or used this tool yet, so this is mostly a guess), you may be able to use WinDbg or something like it to see raw strings in the application's memory space.

Edit: Ah, based on your recent comment, you want to supply new encrypted strings for the application. That's a whole different ballgame. Am I to assume that this application is in plain old Delphi and not Delphi .NET? If the latter, disassembling the code is trivial. But if the former, you may be out of luck.

Unless you can find something in the application that you haven't shared with us, or unless you can find a decompiler for Delphi, it sounds like an undocumented feature is preventing the application from being configured properly. Can you contact the developer who wrote it? Is it still supported? Any documentation at all?


Building on David's answer... You should be able to attack the program at the point where the strings are decrypted, and discover the values. Use a debugger or cracking tool, similar to the way that they go after shareware registration keys. There used to be an excellent tutorial on how to crack ClipMate5 and discover the key generation, and the cracker spoke highly of ClipMate 5 and how useful it was to him. (I wrote ClipMate5 so I remember that pretty well). But anyway, when you get to that point, you should be able to devise a patch where you can modify the code slightly to ignore the decrypted values and inject your own. Of course, you should only do this if you are legally allowed to use the software, etc., etc., and there are unusual circumstances (programmer is dead, out of business, etc..). Finally, consult with your lawyer, and your mother. If both agree that you're in the clear, you should be ok.

0

上一篇:

下一篇:

精彩评论

暂无评论...
验证码 换一张
取 消

最新问答

问答排行榜