Page 30 of 35

Posted: Sun Jan 20, 2008 1:49 pm
by Fiel
maststef wrote: Scan the exe with PEiD and ProtectionID and report the results please.
http://img.photobucket.com/albums/v132/ ... 5/PEID.jpg

And it's not detected at all by ProtectionID

EDIT:

http://forum.cheatengine.org/viewtopic.php?t=85163

Posted: Sun Jan 20, 2008 2:08 pm
by Rheini
May you upload the exe (and if possible also all dlls)?

Posted: Sun Jan 20, 2008 2:24 pm
by Fiel
The contents of this post was deleted because of possible forum rules violation.

Posted: Sun Jan 20, 2008 4:36 pm
by kornto
The blocks from the new file are encrypted strings. I will check it later.
The new encryption is a crap.
But if you find it, please don't leak it, so they won't change it to an hard encryption.

Anyway, i found the encryption of the packets too(by dissembling), i tried to do a litte server on my computer. Just a little ss, http://www.2send.us/uploads/32c1ca2113.jpg

Posted: Sun Jan 20, 2008 5:36 pm
by Rheini
kornto wrote:But if you find it, please don't leak it, so they won't change it to an hard encryption.
There's always a new challenge :)

Posted: Sun Jan 20, 2008 6:01 pm
by Fiel
Rheini wrote:There's always a new challenge :)
Indeed.

I tried to dump the MSEA exe but to no avail. Invalid pointers. I'll keep poking around.

Posted: Sun Jan 20, 2008 6:15 pm
by Rheini
Yeah strange stuff, the tools detect yoda's cryptor and after unpacking detect ASProtect.

Posted: Sun Jan 20, 2008 9:09 pm
by kornto
Rheini wrote:
kornto wrote:But if you find it, please don't leak it, so they won't change it to an hard encryption.
There's always a new challenge :)
Disassembling the game to get the packet encryption was enough, I don't want more :(.
My hint is, that there is a way to figure out the new wz encryption without disassembling.

Posted: Sun Jan 20, 2008 10:42 pm
by kornto
I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.

Posted: Sun Jan 20, 2008 11:07 pm
by maststef
kornto wrote:I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.
What do you mean by "not all folders are encrypted"? All the *.img files in all the wz's are packed and encrypted in the same way (if it would be not this way, then my WZextract tool [and also Maplext and the Python script] wouldn't work ;) ).

And like kornto said: Yes, the new string encryption must be crackable without disassembling (just imagine somone is sending you encrypted strings, but not the tool to decode them).
But again: The question still is, if Wizet used a fixed key (--> trial-and-error on finding all needed bytes) or a fixed calculation (--> finding out the math behind it).

Posted: Sun Jan 20, 2008 11:12 pm
by kornto
maststef wrote:
kornto wrote:I checked one of the strings in list.wz, it is just a name of .img folder in one of the wz files.
Maybe it is a list of the encrypted folders? because not all the folders encrypted.
What do you mean by "not all folders are encrypted"? All the *.img files in all the wz's are packed and encrypted in the same way (if it would be not this way, then my WZextract tool [and also Maplext and the Python script] wouldn't work ;) ).

And like kornto said: Yes, the new string encryption must be crackable without disassembling (just imagine somone is sending you encrypted strings, but not the tool to decode them).
But again: The question still is, if Wizet used a fixed key (--> trial-and-error on finding all needed bytes) or a fixed calculation (--> finding out the math behind it).
No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.

Posted: Sun Jan 20, 2008 11:46 pm
by Fiel
kornto wrote:No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.
Yes, but how long did it take you to figure out the encryption, and is the encryption overly difficult or relatively simple (both for KMS[T] and MSEA)?

EDIT: Oh wow... I think I just figured out some of the encryption. Koolk, check your PM's on Sleepywood.

EDIT2: Yeah, I just checked. What we're working with is KMST encryption. It's the exact same.

Posted: Mon Jan 21, 2008 8:22 am
by Rheini
kornto wrote:Disassembling the game to get the packet encryption was enough, I don't want more :(.
My hint is, that there is a way to figure out the new wz encryption without disassembling.
Did you unpack the exe before doing so? If so, may you tell me what protection it is? The tools detect yoda and after unpacking AsProtect, but that can't be cause of CRC checks and so on.

Posted: Mon Jan 21, 2008 8:52 am
by kornto
Fiel wrote:
kornto wrote:No.
In msea only some of the folders are encrypted.
For example in UI.wz, the images in WindowUI are encrypted but in another folders not.

I figured out the encryption of kmst some months ago, and i said that i did it without disassembling.
The encryption is still a crap. I keep it private because I don't want that they will change it.
Yes, but how long did it take you to figure out the encryption, and is the encryption overly difficult or relatively simple (both for KMS[T] and MSEA)?

EDIT: Oh wow... I think I just figured out some of the encryption. Koolk, check your PM's on Sleepywood.

EDIT2: Yeah, I just checked. What we're working with is KMST encryption. It's the exact same.
That what i said from start.

The long part was to understand that the images are just encrpyted with XOR. But than it was very fast.
Did you unpack the exe before doing so? If so, may you tell me what protection it is? The tools detect yoda and after unpacking AsProtect, but that can't be cause of CRC checks and so on.
No, I took an unpacked exe.(from GMS, not SEA)
And i think that it can be yoda and AsProtect

Posted: Mon Jan 21, 2008 9:49 am
by maststef
Are we talking about the same thing?
We talk about decrypting the text strings. They are simply XOR'd, yes, but that was known like already 2 years.
Our problem now is to find out what they changed from old to new encryption.
Old one was: Every character was XOR'd with another value. The calculation of this "key" was "old_key + 1", starting with the key 0xAA.
New one is: Every character is XOR'd, key starts with 0x01, calculation of the following keys unknown.

Can you PM me, if you don't want to make your ideas public?