-
-
[求助]真想知道这是什么算法。。类拟RC4但又好像不是。。。
-
发表于: 2013-10-5 02:17 7332
-
KEY
0xd4, 0xa9,0x2b,0x4f,0x00,0x24,0xec,0x9c,0xda,0x54,0xf2,0xaf,0x7c,0xc5,0x7b,0xbb
加密过的数据
0x29, 0x57, 0xE2, 0xDD, 0xCE, 0x42, 0x91, 0xCC, 0x5E, 0xB0,
0x75, 0x0E, 0x34, 0x14, 0xFE, 0x15, 0x5C, 0x58, 0xAD, 0x08,
0x91, 0x92, 0x71, 0x28, 0xE0, 0xE1, 0x01, 0xF9, 0x30, 0x25,
0x22, 0xC5, 0xBA, 0x78, 0x8C, 0x4A, 0x84, 0xB4, 0x41, 0x9F,
0x36, 0xEA, 0xC5, 0xB9, 0x29, 0xA1, 0xC0, 0x49, 0x84, 0x19,
0xFB, 0x58, 0x3B, 0xFA, 0xBF, 0x80, 0xFA, 0xF5, 0xCF, 0x46,
0x53, 0xCC, 0x87, 0xA7, 0x7C, 0x47, 0x7E, 0x05, 0x42, 0x5A,
0x48, 0x1D, 0x4A, 0x84, 0x97, 0x5B, 0x77, 0x37, 0xF3, 0x35,
0xA0, 0x2C, 0x39, 0xD2, 0xBC, 0xF0, 0x6C, 0xBB, 0xB9, 0x52,
0x5A, 0xCF, 0xFB, 0x5E, 0xA0, 0x1F, 0xB3, 0xA5, 0x4F, 0xBE,
0x18, 0xB4, 0x29, 0xF6, 0x05, 0x87, 0x54, 0x82, 0x23, 0x09,
0x85, 0xD3, 0x73, 0x02, 0xDB, 0xC8, 0x46, 0xE3, 0x4D, 0x6C,
0x2F, 0x09, 0xC8, 0xD9, 0x5B, 0x34, 0x83, 0x97, 0x47, 0x6F,
0xE3, 0x61, 0x15, 0xE0, 0x6F, 0xAA, 0x92, 0x45, 0xAC, 0xE0,
0x62, 0xE9, 0x50, 0x7C, 0x95, 0x0B
通过上面的数据调用一种解密方式,解出来为
0x08, 0x07, 0x42, 0x8A, 0x01, 0x0A, 0x09, 0x65, 0x68, 0x74,
0x65, 0x73, 0x74, 0x30, 0x30, 0x31, 0x12, 0x28, 0x36, 0x61,
0x65, 0x66, 0x61, 0x36, 0x64, 0x39, 0x38, 0x31, 0x30, 0x32,
0x34, 0x38, 0x63, 0x31, 0x34, 0x32, 0x63, 0x63, 0x35, 0x33,
0x37, 0x63, 0x34, 0x32, 0x34, 0x34, 0x35, 0x35, 0x35, 0x36,
0x38, 0x66, 0x62, 0x37, 0x37, 0x38, 0x37, 0x64, 0x1A, 0x24,
0x63, 0x63, 0x36, 0x62, 0x64, 0x61, 0x31, 0x63, 0x2D, 0x35,
0x65, 0x63, 0x32, 0x2D, 0x34, 0x66, 0x37, 0x37, 0x2D, 0x38,
0x31, 0x34, 0x35, 0x2D, 0x30, 0x63, 0x34, 0x37, 0x38, 0x63,
0x62, 0x30, 0x32, 0x66, 0x32, 0x30, 0x4A, 0x08, 0x79, 0x79,
0x6D, 0x61, 0x6E, 0x64, 0x2C, 0x33, 0x52, 0x0F, 0x70, 0x72,
0x6F, 0x78, 0x79, 0x5F, 0x70, 0x72, 0x6F, 0x74, 0x6F, 0x5F,
0x34, 0x5F, 0x31, 0x60, 0x00, 0x72, 0x05, 0x32, 0x2E, 0x30,
0x2E, 0x31, 0x78, 0x01, 0x80, 0x01, 0x01, 0x88, 0x01, 0x01,
0x90, 0x01
贵求高人告诉这是什么算法。。我确定这是通用算法。。类拟RC4的算法。。。
0xd4, 0xa9,0x2b,0x4f,0x00,0x24,0xec,0x9c,0xda,0x54,0xf2,0xaf,0x7c,0xc5,0x7b,0xbb
加密过的数据
0x29, 0x57, 0xE2, 0xDD, 0xCE, 0x42, 0x91, 0xCC, 0x5E, 0xB0,
0x75, 0x0E, 0x34, 0x14, 0xFE, 0x15, 0x5C, 0x58, 0xAD, 0x08,
0x91, 0x92, 0x71, 0x28, 0xE0, 0xE1, 0x01, 0xF9, 0x30, 0x25,
0x22, 0xC5, 0xBA, 0x78, 0x8C, 0x4A, 0x84, 0xB4, 0x41, 0x9F,
0x36, 0xEA, 0xC5, 0xB9, 0x29, 0xA1, 0xC0, 0x49, 0x84, 0x19,
0xFB, 0x58, 0x3B, 0xFA, 0xBF, 0x80, 0xFA, 0xF5, 0xCF, 0x46,
0x53, 0xCC, 0x87, 0xA7, 0x7C, 0x47, 0x7E, 0x05, 0x42, 0x5A,
0x48, 0x1D, 0x4A, 0x84, 0x97, 0x5B, 0x77, 0x37, 0xF3, 0x35,
0xA0, 0x2C, 0x39, 0xD2, 0xBC, 0xF0, 0x6C, 0xBB, 0xB9, 0x52,
0x5A, 0xCF, 0xFB, 0x5E, 0xA0, 0x1F, 0xB3, 0xA5, 0x4F, 0xBE,
0x18, 0xB4, 0x29, 0xF6, 0x05, 0x87, 0x54, 0x82, 0x23, 0x09,
0x85, 0xD3, 0x73, 0x02, 0xDB, 0xC8, 0x46, 0xE3, 0x4D, 0x6C,
0x2F, 0x09, 0xC8, 0xD9, 0x5B, 0x34, 0x83, 0x97, 0x47, 0x6F,
0xE3, 0x61, 0x15, 0xE0, 0x6F, 0xAA, 0x92, 0x45, 0xAC, 0xE0,
0x62, 0xE9, 0x50, 0x7C, 0x95, 0x0B
通过上面的数据调用一种解密方式,解出来为
0x08, 0x07, 0x42, 0x8A, 0x01, 0x0A, 0x09, 0x65, 0x68, 0x74,
0x65, 0x73, 0x74, 0x30, 0x30, 0x31, 0x12, 0x28, 0x36, 0x61,
0x65, 0x66, 0x61, 0x36, 0x64, 0x39, 0x38, 0x31, 0x30, 0x32,
0x34, 0x38, 0x63, 0x31, 0x34, 0x32, 0x63, 0x63, 0x35, 0x33,
0x37, 0x63, 0x34, 0x32, 0x34, 0x34, 0x35, 0x35, 0x35, 0x36,
0x38, 0x66, 0x62, 0x37, 0x37, 0x38, 0x37, 0x64, 0x1A, 0x24,
0x63, 0x63, 0x36, 0x62, 0x64, 0x61, 0x31, 0x63, 0x2D, 0x35,
0x65, 0x63, 0x32, 0x2D, 0x34, 0x66, 0x37, 0x37, 0x2D, 0x38,
0x31, 0x34, 0x35, 0x2D, 0x30, 0x63, 0x34, 0x37, 0x38, 0x63,
0x62, 0x30, 0x32, 0x66, 0x32, 0x30, 0x4A, 0x08, 0x79, 0x79,
0x6D, 0x61, 0x6E, 0x64, 0x2C, 0x33, 0x52, 0x0F, 0x70, 0x72,
0x6F, 0x78, 0x79, 0x5F, 0x70, 0x72, 0x6F, 0x74, 0x6F, 0x5F,
0x34, 0x5F, 0x31, 0x60, 0x00, 0x72, 0x05, 0x32, 0x2E, 0x30,
0x2E, 0x31, 0x78, 0x01, 0x80, 0x01, 0x01, 0x88, 0x01, 0x01,
0x90, 0x01
贵求高人告诉这是什么算法。。我确定这是通用算法。。类拟RC4的算法。。。
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- 不知道ObReferenceObject意思 3458
- [求助]当驱动编程需要用到ntos导出函数时 3131
- [讨论]为什么打开三个进程,得到的进程句柄相同? 3687
- [求助]为什么读取不了pml4e 3131
- [讨论]关于64位寄存器赋值 4920
看原图
赞赏
雪币:
留言: