flat assembler
Message board for the users of flat assembler.

Index > Main > String & Proc Encrypting

Goto page Previous  1, 2, 3, 4, 5, 6  Next
Author
Thread Post new topic Reply to topic
AlexP



Joined: 14 Nov 2007
Posts: 561
Location: Out the window. Yes, that one.
AlexP
Quote:
QIKPAD
Did you forget the 'U'? Anyways, just make a modified version of the simple text editor that's included in the FASM examples, it's tiny and can do whatever you want (provided it would need save/open capabilities, pretty small). That will definitely be one of my future projects (I know nothing of WIndows programming in the standard term)
Post 18 Apr 2008, 20:43
View user's profile Send private message Visit poster's website Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Hey hey, Maybe I gets to get to be helpful for a change. I might not know much else but I know Windows ( B- ) to ( B+ ) avg

masm32\Examples\Example2\QIKPAD
I can't miss-spell a sample that I learned and build from since 2002
Attachment... i new fasm editor and one masm

Quote:
simple text editor that's included in the FASM examples


No thanks. It took me a long time to choose a sample editor to work from. I think I tried them all and a whole lot better you would think. But QIKPAD won out and I can't remember why. I already got my a Custom FASM Window Style Template near ready. I will post it in about a week. The fasm editor example is how I want to work with you guys so I'll build from there. My MASM code is FASM compatible thanks to my experience with POASM.. That was pure luck.

OK:

1 drop of ignorant oil
1 string
2 drop of ignorant oil
1 string
1 drop of ignorant oil
1 string
3 drop of ignorant oil
1 string

procedure 1 .... free
procedure 2 .... Beale Ciphers
procedure 3 .... AES encryption 256
procedure 4 .... SHA encryption
procedure 5 .... AES encryption 128
procedure 6 .... SHA encryption 2048 and some
procedure 7 .... Beale Ciphers
procedure 8 .... AES encryption
procedure 9 .... AES encryption
procedure 10 .... procCHICK
procedure 11 .... procCHICK
procedure 12 .... AES Encryption
procedure 13 .... macroBIT^H
etc
etc
etc

It really is no big deal but I if I'm going from grown up I thought it would be better to ask about something I never did before other than blowfish and I'm not sure that library is really correct. What do you think so far. How many months would I have.


Description:
Download
Filename: Editors.zip
Filesize: 26.01 KB
Downloaded: 80 Time(s)

Post 19 Apr 2008, 01:57
View user's profile Send private message Reply with quote
AlexP



Joined: 14 Nov 2007
Posts: 561
Location: Out the window. Yes, that one.
AlexP
Quote:
SHA encryption
I assume you refer to hashing/checksums?

[edit] I did look at that QIKEDIT, seems nice. I like FASM's tab feature though, helps a lot instead of having multiple windows open. And I don't speak frances, so I couldn't understand the program that you posted Sad.
Post 19 Apr 2008, 04:31
View user's profile Send private message Visit poster's website Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
The french guy who wrote that translated most of masm32 examples to fasm. There is not many fasm samples I found. He got the bulk of it all it seems and it is a great place to start programming for Windows. Give me a half hour. In the mean time over look his text and pay attention to the code names and locations.
Post 19 Apr 2008, 05:14
View user's profile Send private message Reply with quote
r22



Joined: 27 Dec 2004
Posts: 805
r22
Security by obscurity works best when you know how your attacker will react.

Using a packer or encrypting all your procedures will just present a larger target. The number one way of revsersing is just dumping the process memory after all the UNpacking or DEcrypting has tacken place. Because of this the good obfuscators unpack/decrypt only the chunks being used so reversing becomes a jigsaw puzzle as opposed to a riddle.

For Clarification:
If you want to keep your proprietary algorithm(s) secret hosting it as a web service IS THE MOST SECURE SOLUTION. NOT the most efficient, NOT the most reliable, THE MOST SECURE.

That said here's a little obfuscation idea in its infancy. It uses a thread running in parallel to modify the running code. Essentially at any given time T while the program is running there's only one Opcode (that's meaningful to the algorithm) present.

This is NOT a fully developed idea, but I was sick of the rehashing and rehashing of bit xoring and encrypting procedures. This isn't even a good idea but I'm sure it could be expanded or improved.


Description: Opcode level obfuscation.
Download
Filename: CodeObfuscationToy.ASM
Filesize: 2.05 KB
Downloaded: 130 Time(s)



Last edited by r22 on 19 Apr 2008, 06:47; edited 1 time in total
Post 19 Apr 2008, 06:40
View user's profile Send private message AIM Address Yahoo Messenger Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Early next week I will gather and attach all the FASM for Windows samples I have.

It so easy. Just Comment-Out a few line of code in the same block or what make since to you. Comply and see what happen. Missing What... Now you know where it is.

Keep a shortcut to TASKMAN just in case you commented the wrong thing or forget

Make copies 1, 2 & 3 just in case you totally mess up...

After 2 hours of that and you ready to change the numbers to resize.

Than Voila !!! it On

I'll be up for a while cause I got to do some reading so I'll look out just in case you need some help.


Description:
Download
Filename: fasm_edit1.zip
Filesize: 4.08 KB
Downloaded: 90 Time(s)

Post 19 Apr 2008, 06:45
View user's profile Send private message Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
That will work...

Thanks r22
Post 19 Apr 2008, 06:51
View user's profile Send private message Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Great Scott !!!

Bingo, I got it ... I'll just host it as a Web Service. That is the perfect solution for my situation. Lucky I thought of it. Wink

Now I don't have to worry about messing up my code. The only downside is I blew my chance to teach the crackers the GREATEST lesson they would have EVER had.


Jungle Hell Hallway Has Been Close Sad Shocked Crying or Very sad sorry

and have a nice day!!!

Smile
BTW: Alexp I take my B's down to a C- ... I checked out the Windows Department seriously. These guys are good ...
Post 19 Apr 2008, 14:41
View user's profile Send private message Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17252
Location: In your JS exploiting you and your system
revolution
Haha, like the Google office (or whatever it is called), all the clients data is stored online. I hope your clients trust you implicitly with their data.

I know you are only joking (you are right?).
Post 19 Apr 2008, 15:19
View user's profile Send private message Visit poster's website Reply with quote
AlexP



Joined: 14 Nov 2007
Posts: 561
Location: Out the window. Yes, that one.
AlexP
I do not believe he's joking. If you do go through with the web service idea (why the hell would you?!), make sure you use strong crypt/sigs along the way! (AKA RSA!!!). Good luck with it, and may the force be with you.
Post 19 Apr 2008, 15:55
View user's profile Send private message Visit poster's website Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17252
Location: In your JS exploiting you and your system
revolution
AlexP wrote:
I do not believe he's joking. If you do go through with the web service idea (why the hell would you?!), make sure you use strong crypt/sigs along the way! (AKA RSA!!!). Good luck with it, and may the force be with you.
RSA is dead anyway, ECC is better. But the standard SSL will deal with all that, so no need to worry there.
Post 19 Apr 2008, 16:04
View user's profile Send private message Visit poster's website Reply with quote
AlexP



Joined: 14 Nov 2007
Posts: 561
Location: Out the window. Yes, that one.
AlexP
Quote:
RSA is dead anyway
Why thank you revolution, you just brightened my day Mad . I'll save curves for when I understand them.
Post 19 Apr 2008, 18:00
View user's profile Send private message Visit poster's website Reply with quote
asmhack



Joined: 01 Feb 2008
Posts: 431
asmhack
use dongle hahahahaha
Post 20 Apr 2008, 02:48
View user's profile Send private message Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17252
Location: In your JS exploiting you and your system
revolution
asmhack wrote:
use dongle hahahahaha
I've got a few old dongles lying around here that have had their parent program "neutered".
Post 20 Apr 2008, 02:55
View user's profile Send private message Visit poster's website Reply with quote
asmhack



Joined: 01 Feb 2008
Posts: 431
asmhack
well.. then you can become a hero if you dongle something like cubase 4 XD
Post 20 Apr 2008, 03:46
View user's profile Send private message Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Do anyone have a heart around hereeee? I already know revolution has NADA. He is about to corrupt our young friend.. I give Alexp 6 month, than revolution will try to slip in to retirement for a couple of weeks. I know of a great vacation spot for him. A place where no one would ever want to leave, or even can "unless" which will prove impossible...
Post 20 Apr 2008, 04:56
View user's profile Send private message Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17252
Location: In your JS exploiting you and your system
revolution
Haha, they may be neutered but they were still paid for. It's not like I stole them or anything. For a business it is just too inconvenient to have dongles and things, it creates problems with drivers and whatnot. Like I mentioned above, just because I bought some software doesn't mean the programmer owns my machine. I don't like the idea of a software program taking over parallel port and fucking up my printing and my JTAG programmer, and worse, a laptop without a parallel port can't even run it.

Of course, since I am a forum robot then I have no heart and you can't make me feel guilty Laughing
Post 20 Apr 2008, 05:25
View user's profile Send private message Visit poster's website Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Name 10 software programs that U use on your machine right now.
Post 20 Apr 2008, 06:58
View user's profile Send private message Reply with quote
revolution
When all else fails, read the source


Joined: 24 Aug 2004
Posts: 17252
Location: In your JS exploiting you and your system
revolution
ic2 wrote:
Name 10 software programs that U use on your machine right now.
Why?
Post 20 Apr 2008, 07:04
View user's profile Send private message Visit poster's website Reply with quote
ic2



Joined: 19 Jan 2008
Posts: 75
ic2
Quote:
I bought some software doesn't mean the programmer owns my machine.
Post 20 Apr 2008, 07:15
View user's profile Send private message Reply with quote
Display posts from previous:
Post new topic Reply to topic

Jump to:  
Goto page Previous  1, 2, 3, 4, 5, 6  Next

< Last Thread | Next Thread >
Forum Rules:
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Copyright © 1999-2020, Tomasz Grysztar.

Powered by rwasa.