Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 2 years ago.
Improve this question
I am new to reverse engineering.
I am using immunity debugger, x64 dbg, ollydbg.
Softwares like Winzip we can't able to read it's strings because it is obfuscated (encrypted).
I have watched some tutorials on YouTube, but those softwares ( power iso) strings were unencrypted.
I need to know is there any way to deobfuscate (decrypt), it's strings to reverse engineer
Obfuscation should not be confused with Encryption, semantics aside, Encryption is strong protection against capable attackers, Obfuscation is not.
With regard to your question, the theoretical approach is:
Identify cryptographic primitive being employed
Identify mode of operation, cryptographic trap-door function
Execute best known attack on cipher-text
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 4 years ago.
Improve this question
I'm doing a school project on the security of bitcoin, and I was just wondering if anyone could explain, possibly with credible sources how bitcoin wallets use the passphrase as encryption, what is meant by EVP ("The passphrase is converted to a key/iv using EVP") and just any information that people have about the encryption of bitcoin wallet would be much appreciated.
Thanks <3
To be clear, wallet encryption has nothing to do with the bitcoin protocol. If you were to create a new client, you can encrypt your private key(s) however you want.
According to this wiki the original bitcoin client hashes the passphrase with SHA-512 and then uses a key derivation algorithm described in the official documentation. The actual encryption is AES-256.
EVP ("Envelope") is just a tool of openssl that encapsulates crypo implemenations so that you can change the underlying algorithm without changing too much code.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I know my question is broad, but I have no clue where to start my research.
How can one implement VoIP on a server? I am fairly certain it does not use the http/https protocol. If so, what standard/famous protocols one can use? are there any open-source ones? What are good references to start working on that?
Start by looking at the SIP,RTP and RTCP protocols. I believe they form a minimalistic set of required protocols for VoiP
Some relevant open source projects:
http://www.fsf.org/campaigns/priority-projects/priority-projects/highpriorityprojects#Replaceskype
"There are a number of such programs, such as Ekiga, Twinkle, Coccinella, QuteCom, and Jitsi. Unfortunately, these programs only replace some of Skype's functionality, and only in some situations. WebRTC has a mission to enable rich, high quality, Real-Time Communications (RTC) applications to be developed in the browser via simple Javascript APIs and HTML5. Developers should consider helping free software VoIP and video, chat, and multimedia communications projects."
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I have been asked if "I am" encrypting my data at rest. I was just curious if Parse does so when storing their information on Amazon's AWS servers. I checked out the Privacy section at Parse.com and didn't get an answer. I also tried searching for "data at rest", both here and at the google group, with no success. Thanks in advance!
No. It is encrypted whenever it travels over the wire (HTTPS), but not at rest.
You can encrypt the data and store it as you wish, but Parse does not automatically encrypt data for storage.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 9 years ago.
Improve this question
Id like to encrypt a file and share it. I'd like the file to be decrypted just one time. I was wondering if there are security or encryption protocols that can be used to implement a 1 time use scenario. In simple terms the decryption key would only be good one time.
No it's not possible, with any kind of computer and any kind of OS.
What you want is called a DRM, and your file would need to be read by a program you've coded that would destroy the file (and the decoding key) after reading. But in order to protect the decyphering program from being copied, you'd have to sign the application against your OS, and make your OS protect that file from deletion. And in order to protect your OS from being copied with the file within, you'd have to use a computer that has a chip in the CPU making everything uncopiable... That's called trusted computing.
And though it may theoretically work, it would still be possible to keep a copy of your file, and use a super computer for up to 1000 years (or one hour, depending on your algorithm and the size of your key) to find your decription key, and thus access your precious content.
For the story, sony has tried putting DRMs in their CDs, and that's what they end up creating.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I am looking to provide some properiatary software with the raspberry pi as the platform (but this could be with any embedded board). I'm looking for a way for the file system to only be visible on that device.
Is this possible? How?
You could encrypt the whole disk or the volume using LUKS or dm-crypt if your distribution supports it. It's also possible to encrypt files or directories on the disk while leaving the file-system mountable (but scrambled). If you go the latter route, it would be a good coding experience to write your own software that encrypts files and then de-crypts them when a key is entered.
Either way, you'll run into an issue: Before using the clear data, someone has to input the key. If the key is stored on the card, nothing prevents an attacker reading the key from a stolen card. If it's input by a person, that person needs to manually enter the key after every boot.