Hi Rheini,
thank you for response. Long years ago i was doing some very simple reverse engineering with the software W32Dasm. Which software did you use?
I already find out that there 2 4 Byte long data are the same, the same in demo, sadk full version and 10th anniversary. look at:
Hex.jpg
What do your programm do with the 4 Bytes in Line 2 (10h). Is this still some part of a header, or a checksum?
I read on your page that the (mostly text)files first compressed by a simple LZSS compression and after this it will be encrypted. So that we can find out how the encryption works its neccesary to know how the file lokks after LZSS encryption.
In your software for 10th Anniversary you first decrypt the file and then unpack the LZSS compression, right?
Are you agree with me if i would go this way:
1. Coding or find a tool which uses LZSS compression.
2. packing the unpacked and decrypted copypaste.lua from 10th Anniversary cause I want to find out how the data looks like if its just packed and not even crypted.
3. find out (maybe debugging helps, i dont know it was so long time since i did this the last time) how the encryption changed in view of 10th Anniversary
Can you give me some more info about your programm, especially how you decrypt the data.
Example: Filename: copypaste.lua. Your program do the following:
1. Byte + Ascii(c) = encryptet 1. Byte
2. Byte + Ascii(o) = encryptet 2. Byte
3. Byte + Ascii(p) = encryptet 3. Byte
4. Byte + Ascii(y) = encryptet 4. Byte
5. Byte + Ascii(p) = encryptet 5. Byte
...
10. Byte + Ascii(.) = encryptet 10. Byte
11. Byte + Ascii(l) = encryptet 11. Byte
12. Byte + Ascii(u) = encryptet 12. Byte
13. Byte + Ascii(a) = encryptet 13. Byte
EDIT:
Rheini wrote:Or they only changed the header, so the programs don't work anymore.
No i tried this already. It would be to easy.
I hope you understand how i mean this.
Btw: Do you like the new settler?
Looking forward to hear for you.
Greetings
Eddy
You do not have the required permissions to view the files attached to this post.