Jump to content

Recommended Posts

Posted (edited)

I have need of a method to convert an ecrypted document into plaintext. I have an example of an encrypted document and what I feel is the plaintext version of the encrypted document. Can anyone point me in the direction how to unencrypt this information? (I have no previous experience)

encrpyted:

e46f9b0f1926b3827bfadf65156ba9ef6065E09C2BEE86BF47CEDBAF64BCFFF4827D07B4CC2473F5085314B20FCDB0230EAF
5BC3B93FB1CC9FDEB6E1944113C177B83BADA37D0B12D5F7C0B3536101E7CB27852465BD7777B30E0A15479A2A1CF9E36EF7
31A3C44F9BDA4BDB4BA936F20D292E4311DC564B2C5914FA4F7A846C771F64236BB1429D37FE0BFC3F87D7E89A5E9F093078
6F1E299A693E7B5F568D0D0679CFA9FDA11203594C112F9136035B51D564C904206BBEB242A31EDFC16952D8B2D539449B5A
D4EECC0777F36BDE34CA19203EA29E8538D388A018CC2FC99C4206E9090FBC6379EDE4ED91DC3C48476C0624FA2A0C5CF798
11EE5AFAA5B4572061F17C2A8D775827130F

There are no linebreaks in the original.

original (I believe):

[CONFIG]
DefaultDocumentFolder=\
[INSTALLED_PROGRAMS]
TOTAL=1
Program1.DisplayName=Notepad
Program1.Location=F:\WINDOWS\Notepad.exe

Since the first part of the encrypted form is in lowercase, I am not sure when the actual message begins. Does anyone here know how this might work?

Edited by this-is-me
Who else would I be?
Posted

this-is-me

I am going to assume that the first 32 characters (lowercase) are an MD5-Checksum.

Now what is it a checksum of? The encrypted or the original? I would have to say its probably the original due to the need to be sure the un-encrypted data is correct.

You can always use my plugin to help with the MD5 stuff!

JS

AutoIt Links

File-String Hash Plugin Updated! 04-02-2008 Plugins have been discontinued. I just found out.

ComputerGetInfo UDF's Updated! 11-23-2006

External Links

Vortex Revolutions Engineer / Inventor (Web, Desktop, and Mobile Applications, Hardware Gizmos, Consulting, and more)

Posted

Thanks for the info about the md5... I was not familiar with md5 enough to recognise it immediately. Anyone have any info on unencrypting the rest?

Who else would I be?
Posted

Maybe if you would post the program you used to build the cypher, or give at least 2-3 more examples, I could try..

Otherwise, it's pretty hard to find patterns..

Quote

Together we might liveDivided we must fall

 

Posted

I did not build the cypher myself, I am testing to see if it is possible to decrypt the cypher. As for other examples, do you want other encrypted examples? I have them plenty. Do you want other unencrypted examples? I have no more.

Who else would I be?
Posted

I did not build the cypher myself, I am testing to see if it is possible to decrypt the cypher. As for other examples, do you want other encrypted examples? I have them plenty. Do you want other unencrypted examples? I have no more.

Have you tried to figure out which file the MD5 check goes to? The encrypted, or unencrypted?

JS

AutoIt Links

File-String Hash Plugin Updated! 04-02-2008 Plugins have been discontinued. I just found out.

ComputerGetInfo UDF's Updated! 11-23-2006

External Links

Vortex Revolutions Engineer / Inventor (Web, Desktop, and Mobile Applications, Hardware Gizmos, Consulting, and more)

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...