Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Decompilation of encrypted VFP EXE
Message
General information
Forum:
Visual FoxPro
Category:
Project manager
Miscellaneous
Thread ID:
00589707
Message ID:
00592357
Views:
51
>> Took me 17 machines and about 50 total hours to break this one...
>
>Mhmm, do you mean you actually bored through the safe door instead of walking around it? Impressive. ;-) Anyway, that's an awful lot of CPU cycles. And it is a lot more than the 15 seconds that a P3 class machine needs to brute-force an app that uses the Refox runtime-file branding (all the other Refox branding levels can be decompiled directly because they only leave some marks in the app that tell other Refoxes to back off).


Yes, it's a lot of CPU time to hack around this way, and I think this is a much better approach than refox. HOWEVER...3 obvious problems:

1. It takes an extra sec or two to load the .exe since it has to decompress it first.

2. It IS possible to brute force attack it, which means anyone with something like AZPR could get the zip password. (eventually)

3. With a process/memory viewer and a few other goodies you could get the password from memory as it uses it, and once you found the memory address it used it would take you just a couple of seconds to defeat this every time!

This is better, but still.....very hackable.
ICQ 10556 (ya), 254117
Previous
Reply
Map
View

Click here to load this message in the networking platform