Tag: encryption

18 Analyzing encrypted Android apps (.asec)? 2013-04-21T03:48:04.687

11 Totally unknown file analysis approaches 2013-09-01T11:06:17.497

11 Howto clone Android RSA SecurID Software Token 2013-10-17T09:37:37.237

10 AirPlay Mirroring decryption (FairPlay) 2014-11-21T18:40:16.403

9 Protect data stored in binary 2015-05-02T18:53:15.877

8 Reversing Apple Airport Express firmware updates 2014-01-05T22:51:35.283

8 ZTE encrypted backup config file 2015-12-24T16:19:59.533

8 Is there a way to find out which hash standard by studying the source code? 2017-03-18T02:20:50.507

7 Virus uses a custom XOR encryption and need help possibly cracking it / Reversing EXE 2014-05-03T04:08:38.690

6 Tracing to a function during debugging? 2013-08-02T07:24:48.597

6 Reverse Engineering of a packet encryption function of a game 2015-05-05T00:48:58.650

5 Find out whether additional keys are being used when encrypting data 2013-08-27T12:45:00.983

5 Reverse Engineering XORed string 2013-12-10T15:59:55.703

5 Retrieving encryption/encoding logic from dll 2014-01-26T13:53:41.097

5 Reverse engineering an hydrometer's Bluetooth communication 2015-11-17T22:53:10.923

5 Question about Keeloq - A car remote control standard 2016-02-10T16:35:36.533

4 What does this Generate_Key_IV assembler routine? 2013-10-30T04:38:09.367

4 Well-known JSON obfuscator that puts the string "Salted12" in front of obfuscated files? 2014-12-28T17:33:13.787

4 What can I do with a SSH certificate? 2015-03-17T21:54:06.517

4 Obfuscated AES decryption assembly 2016-02-09T11:52:12.073

4 Help deciphering binary that creates 3 passwords 2016-05-29T00:24:12.737

4 Reversal of unknown obfuscation or encryption with known plaintext 2016-06-30T19:52:27.940

4 Having keys and binary, how do I reverse/decrypt a stream encryption? 2016-09-10T15:35:36.460

4 Identify password generation algorithm 2017-10-08T11:11:38.660

4 Obtaining the decryption keys for Super Mario Run (Android/iOS Game) 2017-10-11T18:32:42.743

4 TP-Link encrypted backup file TX-VG1530 2017-11-09T12:10:55.460

3 Identifying an algorithm used to sign iCloud payload 2014-10-07T16:14:17.847

3 Identify a decryption scheme 2015-01-03T03:42:35.620

3 What key is being using to encrypt the key transport in this Zigbee capture? 2015-06-17T09:40:39.083

3 Reversing encryption by analysing executable 2015-06-17T22:03:20.707

3 How can I determine if a piece of code is an encryption algorithm? 2016-09-09T12:17:26.873

3 Finding the encryption key in a binary - IDA Pro and how an S-box might be represented in the binary 2018-01-06T08:52:08.990

2 Steps for determining the hash algorithm used 2013-08-09T08:37:04.350

2 Attack on wireless interconnection 2013-10-26T16:24:56.680

2 Unpacking and disassembling mach-o binary 2014-07-09T11:41:28.107

2 Understanding a messengers protocol encryption 2014-07-29T12:44:55.600

2 Decoding New Jersey Driver's License Codes 2014-10-13T21:26:49.570

2 Identify decompiled decryption algorithm 2014-10-29T16:01:15.253

2 How to retrieve stored information, NAND filesystem with VB.Net 2014-11-30T16:49:05.543

2 SHA + Mersenne Twister 2015-01-16T06:53:20.547

2 finding a RC4 Encryption function in obfuscated assembly code with no symbols 2015-02-01T14:55:11.593

2 Declaring block as a string in IDA 2015-03-23T19:18:23.907

2 Reimplementing the x86 AESENC instruction in python 2015-07-22T06:49:58.237

2 How would I go about finding an encryption key or cipher by decompiling a program? 2015-12-31T07:03:24.927

2 Debug an application for analyzing file decryption 2016-01-20T09:03:40.150

2 create pem from ecc signature bytes 2016-04-05T16:26:45.783

2 help getting at encrypted firmware [includes .SMIME and .gz.aes files] 2016-05-12T02:25:24.357

2 is it possible to decrypt Enigma and RC4 encryptions? 2016-06-03T01:25:02.340

2 Unkown Swap Encoding 2016-09-03T12:53:55.627

2 What encryption/compression is this, and how to encode/decode from it? 2016-11-27T08:16:12.220

2 How to get file back from generated sha256 checksum? 2017-06-14T15:35:39.987

2 How can I identify how this string is being encoded so I can replicate it? 2017-08-15T16:57:50.783

2 Help me understand how to actually break an XOR/Vigenère cipher 2017-08-22T15:12:15.127

2 Emulation Project - GameGuard Protected Client 2017-10-24T19:32:08.337

2 How do Enigma, Themida and VMProtect compare to each other? 2017-11-12T13:31:36.607

2 reverse checksum algorithm 2017-11-27T14:49:32.443

2 Arm hex firmware reverse 2018-02-08T15:02:14.130

2 How can I generate the recovery password on a legacy system (Original company is out of business) running on my local machine? 2018-05-16T14:59:06.067

2 How to identify known encryption algorithm? 2018-07-03T15:22:26.813

2 How should I got about working out the format for this psp game? 2018-08-11T16:17:15.343

1 Reverse Engineering an Encryption Algorithm 2013-10-24T03:49:17.583

1 Facing encryption 2013-12-27T14:07:19.497

1 How to decrypt this file? 2014-02-12T08:05:31.770

1 How to remove SimplePack signature so it won't be detected by AVs 2014-12-28T16:50:53.490

1 identify packer compression or encryption algorithm 2015-05-15T20:10:44.757

1 How to find compressed or encrypted parts in a packed executable? 2015-05-20T19:03:47.843

1 File reverse engineering - .tbl format 2015-06-13T15:21:00.720

1 Assistance in Decrypting Lua script that is obfuscated with Base64 > SSL 2015-08-12T20:48:37.067

1 Help on 7zip PW cracker / Reverse engineering question 2015-10-25T13:53:13.543

1 Understanding decoding communications over interfaces 2015-11-19T22:43:39.773

1 Java - Decipher encrypted classes in a jar file 2016-01-12T11:35:21.080

1 Isolating encrypt/decrypt instructions in an execution trace 2016-01-13T11:34:49.107

1 Extract decrypted token from EXE 2016-02-03T07:34:35.640

1 Figuring out the CRC part of a packet 2016-02-17T02:35:54.353

1 Find encryption algorithm used by a program? 2016-02-17T16:18:43.527

1 Driver's Licence Last Name Numbering Format (Ontario, Quebec, New Jersey)? 2016-06-27T19:18:54.857

1 Overwatch Sombra ARG community asking for Cryto/Steg help 2016-08-28T05:04:23.890

1 Which encryption/decryption algorithm is used in Synology Cloud Sync format 3.0 session key and data encryption? 2016-10-12T11:40:42.950

1 Decrypting/Decoding encrypted/encoded data 2016-12-27T00:50:29.147

1 Encryption (AES-128) in automatic meters reading 2017-02-25T21:59:16.523

1 Do TPMs Send Stored Keys in Plaintext? 2017-07-01T05:10:47.723

1 What does this sequence of numbers mean? 2017-07-08T00:21:39.510

1 Defeat RSA hash verification - QNX working example 2017-08-03T16:41:44.427

1 How to decrypt .jpg files of comics app in a C Program? 2017-11-02T03:53:29.587

1 Unable to find Send/Recv type calls in Network Application 2017-11-12T23:32:50.583

1 Need Help decrypting .luac files 2017-12-01T02:11:34.613

1 Binary encryption 2018-02-24T12:00:42.523

1 Decrypting SQLite Database with key 2018-05-11T14:56:09.113

1 Reversing a Java digest function, with known public key and source code 2018-11-02T20:34:18.337

0 How does iOS hash and salt passwords on its secondary-storage? 2014-09-26T19:50:35.323

0 Question about interaction between some message-functions() 2014-10-31T15:23:07.163

0 How to identify the encryption in packet data using OLLYDBG 2015-07-20T03:45:36.023

0 How to find out what encryption/encoding has been used 2015-08-25T04:46:21.633

0 Locate compressed section of executable 2015-11-18T13:34:54.267

0 Reverse engineering parameter value on subroutine call 2015-12-30T18:19:26.763

0 How would you protect this Crypter? 2016-01-28T09:12:23.703

0 Possible to Bypass V-Safe100 USB encryption? 2016-02-10T19:07:15.153

0 Is this anti-tamper solution fool-proof? 2016-10-13T06:03:04.517

0 Finding out hash type having initial string and hash 2016-12-08T19:41:01.953