RTFC Posted August 25, 2017 Posted August 25, 2017 (edited) On 8/25/2017 at 2:24 PM, fopetesl said: So the resultant exe file before enCryption is easily reverse engineered? Expand Yes. Codecrypter extracts as decryption key(s) whatever you define from the script's sanctioned work environment (a user name, a VPN-bound server response, a hardware ID, your own function(s), or any combination you can think of). So anyone can make a copy of your executable or give it to others, but when that copy is run anywhere else, the environment-dependent queries you set up at the encryption stage will return different user names, hardware IDs, or whatever else you decided to use. A determined attacker might be able to find out what queries your script is sending to its work environment to construct the decryption key(s) with, but without unfettered access to the original authorised environment, the keys themselves remain completely secure (and your "decrypted" script would be utter garbage that immediately crashes). Of course, if an attacker has physical access to your machine(s), that would represent a grave security risk, but then they might as well steal your entire harddrive to obtain your data (if that's what they are after). See the CodeCrypter FAQ for additional explanation and examples. Edited August 25, 2017 by RTFC My Contributions and Wrappers Reveal hidden contents BitMaskSudokuSolver BuildPartitionTable CodeCrypter CodeScanner DigitalDisplay Eigen4AutoIt FAT Suite HighMem MetaCodeFileLibrary OSgrid Pool RdRand SecondDesktop SimulatedAnnealing Xbase I/O
fopetesl Posted August 28, 2017 Posted August 28, 2017 I immediately noticed "hardware ID" which took me four hours to resolve from BIOS number: $DOS = Run(@ComSpec & " /c wmic bios get serialnumber >biospin.csv", "", @SW_HIDE, $STDERR_CHILD + $STDOUT_CHILD) ; BIOS code which is easy once you know how. However, I'll go with Codecrypter but still interested in just what 'Build' actually does in generating an 'exe' file. Looking at an 'exe' with Hexedit there seems nothing to easily reverse engineer. None of the raw text shows up so there's some obfuscation already? The 'exe' has the "cannot run in DOS mode" in readable text but nothing else. The most powerful number in the Universe. Zero.
Moderators Melba23 Posted August 28, 2017 Moderators Posted August 28, 2017 fopetesl, Quote interested in just what 'Build' actually does in generating an 'exe' file Expand Basically, the script is stripped of all comments and blank lines, tokenised (converted to .a3x format), and then inserted into the resource table of a precompiled interpreter stub. This means that the original script is not easily visible when looking at the exe, but is readily accessible by anyone with a little knowledge - so your little sister cannot easily see the passwords you have stored in your script, but your computer literate friend can get at them without too much problem. M23 Any of my own code posted anywhere on the forum is available for use by others without any restriction of any kind Open spoiler to see my UDFs: Reveal hidden contents ArrayMultiColSort ---- Sort arrays on multiple columnsChooseFileFolder ---- Single and multiple selections from specified path treeview listingDate_Time_Convert -- Easily convert date/time formats, including the language usedExtMsgBox --------- A highly customisable replacement for MsgBoxGUIExtender -------- Extend and retract multiple sections within a GUIGUIFrame ---------- Subdivide GUIs into many adjustable framesGUIListViewEx ------- Insert, delete, move, drag, sort, edit and colour ListView itemsGUITreeViewEx ------ Check/clear parent and child checkboxes in a TreeViewMarquee ----------- Scrolling tickertape GUIsNoFocusLines ------- Remove the dotted focus lines from buttons, sliders, radios and checkboxesNotify ------------- Small notifications on the edge of the displayScrollbars ----------Automatically sized scrollbars with a single commandStringSize ---------- Automatically size controls to fit textToast -------------- Small GUIs which pop out of the notification area
RTFC Posted August 28, 2017 Posted August 28, 2017 On 8/28/2017 at 10:18 AM, fopetesl said: "hardware ID" which took me four hours to resolve Expand Four hours?! Maybe use this instead? My Contributions and Wrappers Reveal hidden contents BitMaskSudokuSolver BuildPartitionTable CodeCrypter CodeScanner DigitalDisplay Eigen4AutoIt FAT Suite HighMem MetaCodeFileLibrary OSgrid Pool RdRand SecondDesktop SimulatedAnnealing Xbase I/O
fopetesl Posted August 28, 2017 Posted August 28, 2017 Wish I'd known that a month ago! MUCH better than 'wmic' The most powerful number in the Universe. Zero.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now