Important information: this site is currently scheduled to go offline indefinitely by end of the year.

.wz archive

The Original Forum. Game archives, full of resources. How to open them? Get help here.
Fiel
advanced
Posts: 46
Joined: Sun Dec 16, 2007 6:29 pm
Has thanked: 2 times
Been thanked: 2 times

Post by Fiel »

maststef wrote: Scan the exe with PEiD and ProtectionID and report the results please.
http://img.photobucket.com/albums/v132/ ... 5/PEID.jpg

And it's not detected at all by ProtectionID

EDIT:

http://forum.cheatengine.org/viewtopic.php?t=85163
Rheini
Moderator
Posts: 652
Joined: Wed Oct 18, 2006 9:48 pm
Location: Germany
Has thanked: 19 times
Been thanked: 46 times
Contact:

Post by Rheini »

May you upload the exe (and if possible also all dlls)?
Fiel
advanced
Posts: 46
Joined: Sun Dec 16, 2007 6:29 pm
Has thanked: 2 times
Been thanked: 2 times

Post by Fiel »

The contents of this post was deleted because of possible forum rules violation.
kornto
advanced
Posts: 61
Joined: Sat Jun 23, 2007 9:53 pm
Has thanked: 6 times
Been thanked: 37 times

Post by kornto »

The blocks from the new file are encrypted strings. I will check it later.
The new encryption is a crap.
But if you find it, please don't leak it, so they won't change it to an hard encryption.

Anyway, i found the encryption of the packets too(by dissembling), i tried to do a litte server on my computer. Just a little ss, http://www.2send.us/uploads/32c1ca2113.jpg
Rheini
Moderator
Posts: 652
Joined: Wed Oct 18, 2006 9:48 pm
Location: Germany
Has thanked: 19 times
Been thanked: 46 times
Contact:

Post by Rheini »

kornto wrote:But if you find it, please don't leak it, so they won't change it to an hard encryption.
There's always a new challenge :)
Fiel
advanced
Posts: 46
Joined: Sun Dec 16, 2007 6:29 pm
Has thanked: 2 times
Been thanked: 2 times

Post by Fiel »

Rheini wrote:There's always a new challenge :)
Indeed.

I tried to dump the MSEA exe but to no avail. Invalid pointers. I'll keep poking around.
Rheini
Moderator
Posts: 652
Joined: Wed Oct 18, 2006 9:48 pm
Location: Germany
Has thanked: 19 times
Been thanked: 46 times
Contact:

Post by Rheini »

Yeah strange stuff, the tools detect yoda's cryptor and after unpacking detect ASProtect.
kornto
advanced
Posts: 61
Joined: Sat Jun 23, 2007 9:53 pm
Has thanked: 6 times
Been thanked: 37 times

Post by kornto »

Rheini wrote:
kornto wrote:But if you find it, please don't leak it, so they won't change it to an hard encryption.
There's always a new challenge :)
Disassembling the game to get the packet encryption was enough, I don't want more :(.
My hint is, that there is a way to figure out the new wz encryption without disassembling.
kornto
advanced
Posts: 61
Joined: Sat Jun 23, 2007 9:53 pm
Has thanked: 6 times
Been thanked: 37 times

Post by kornto »

I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.
maststef
beginner
Posts: 37
Joined: Thu Aug 30, 2007 8:19 am

Post by maststef »

kornto wrote:I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.
What do you mean by "not all folders are encrypted"? All the *.img files in all the wz's are packed and encrypted in the same way (if it would be not this way, then my WZextract tool [and also Maplext and the Python script] wouldn't work ;) ).

And like kornto said: Yes, the new string encryption must be crackable without disassembling (just imagine somone is sending you encrypted strings, but not the tool to decode them).
But again: The question still is, if Wizet used a fixed key (--> trial-and-error on finding all needed bytes) or a fixed calculation (--> finding out the math behind it).
kornto
advanced
Posts: 61
Joined: Sat Jun 23, 2007 9:53 pm
Has thanked: 6 times
Been thanked: 37 times

Post by kornto »

maststef wrote:
kornto wrote:I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.
What do you mean by "not all folders are encrypted"? All the *.img files in all the wz's are packed and encrypted in the same way (if it would be not this way, then my WZextract tool [and also Maplext and the Python script] wouldn't work ;) ).

And like kornto said: Yes, the new string encryption must be crackable without disassembling (just imagine somone is sending you encrypted strings, but not the tool to decode them).
But again: The question still is, if Wizet used a fixed key (--> trial-and-error on finding all needed bytes) or a fixed calculation (--> finding out the math behind it).
No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.
Fiel
advanced
Posts: 46
Joined: Sun Dec 16, 2007 6:29 pm
Has thanked: 2 times
Been thanked: 2 times

Post by Fiel »

kornto wrote:No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.
Yes, but how long did it take you to figure out the encryption, and is the encryption overly difficult or relatively simple (both for KMS[T] and MSEA)?

EDIT: Oh wow... I think I just figured out some of the encryption. Koolk, check your PM's on Sleepywood.

EDIT2: Yeah, I just checked. What we're working with is KMST encryption. It's the exact same.
Rheini
Moderator
Posts: 652
Joined: Wed Oct 18, 2006 9:48 pm
Location: Germany
Has thanked: 19 times
Been thanked: 46 times
Contact:

Post by Rheini »

kornto wrote:Disassembling the game to get the packet encryption was enough, I don't want more :(.
My hint is, that there is a way to figure out the new wz encryption without disassembling.
Did you unpack the exe before doing so? If so, may you tell me what protection it is? The tools detect yoda and after unpacking AsProtect, but that can't be cause of CRC checks and so on.
kornto
advanced
Posts: 61
Joined: Sat Jun 23, 2007 9:53 pm
Has thanked: 6 times
Been thanked: 37 times

Post by kornto »

Fiel wrote:
kornto wrote:No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.
Yes, but how long did it take you to figure out the encryption, and is the encryption overly difficult or relatively simple (both for KMS[T] and MSEA)?

EDIT: Oh wow... I think I just figured out some of the encryption. Koolk, check your PM's on Sleepywood.

EDIT2: Yeah, I just checked. What we're working with is KMST encryption. It's the exact same.
That what i said from start.

The long part was to understand that the images are just encrpyted with XOR. But than it was very fast.
Did you unpack the exe before doing so? If so, may you tell me what protection it is? The tools detect yoda and after unpacking AsProtect, but that can't be cause of CRC checks and so on.
No, I took an unpacked exe.(from GMS, not SEA)
And i think that it can be yoda and AsProtect
maststef
beginner
Posts: 37
Joined: Thu Aug 30, 2007 8:19 am

Post by maststef »

Are we talking about the same thing?
We talk about decrypting the text strings. They are simply XOR'd, yes, but that was known like already 2 years.
Our problem now is to find out what they changed from old to new encryption.
Old one was: Every character was XOR'd with another value. The calculation of this "key" was "old_key + 1", starting with the key 0xAA.
New one is: Every character is XOR'd, key starts with 0x01, calculation of the following keys unknown.

Can you PM me, if you don't want to make your ideas public?
Post Reply