Waraxe IT Security Portal
Login or Register
September 20, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 69
Members: 0
Total: 69
Full disclosure
Stored XSS in "Edit Profile" - htmlyv2.9.9
Stored XSS in "Menu Editor" - htmlyv2.9.9
Backdoor.Win32.BlackAngel .13 / Unauthenticated Remote CommandExecution
Backdoor.Win32.CCInvader. 10 / Authentication Bypass
Backdoor.Win32.Delf.yj / Information Disclosure
SEC Consult blog :: Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey (CVE-2024-38014) + msiscan tool release
Stored XSS to Account Takeover - htmlyv2.9.9
APPLE-SA-09-16-2024-10 macOS Ventura 13.7
APPLE-SA-09-16-2024-9 macOS Sonoma 14.7
APPLE-SA-09-16-2024-8 iOS 17.7 and iPadOS 17.7
APPLE-SA-09-16-2024-7 Xcode 16
APPLE-SA-09-16-2024-6 Safari 18
APPLE-SA-09-16-2024-5 visionOS 2
APPLE-SA-09-16-2024-4 watchOS 11
APPLE-SA-09-16-2024-3 tvOS 18
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other hashes -> Got a TRICKY ByteRun one for ya, think you can crack it?
Post new topicReply to topic View previous topic :: View next topic
Got a TRICKY ByteRun one for ya, think you can crack it?
PostPosted: Fri Mar 12, 2010 12:51 pm Reply with quote
Sootah
Regular user
Regular user
Joined: Mar 12, 2010
Posts: 6




I've tried for a while to beat this bad boy myself, and have hit a dead-end.

The string
Code:
;$_D=strrev('edoced_46esab');eval($_D(......

obviously just translates into a standard base54_decode for the bottom portion of the file. It's after decrypting that chunk that I get

Code:
$_X=base64_decode($_X);$_X=strtr($_X,'A{V/s]yuq3UHQtY 9OG80kmpePrL 7MSgciK6T1Iw}5RZJl[nFN4bv','D<5s68>9FJmZx[T2c4MpwGOy3U=e0IHLboRiE/WAaQq{rjlYCXhNf S}.B 7zngd]VktuKPv1');$_R=str_replace('__FILE__',"'".$_F."'",$_X);eval($_R);$_R=0;$_X=0;



To work with the rest of it. The play here seems to be that they base64_decode $_X and then replace the characters in the strtr with their appropriate ones. (Or so I think) THIS is where I'm running into problems with the decryption.

There are too many chars on the end half of the strtr function for it to work properly. I don't know if it is a problem with me just 'echo'ing out the base64_decode of the first hash that gives me what you see above and some characters are getting incorrectly shown to be compatible with my browser or what.

SO, ANY and ALL help fully decoding this file will be GREATLY appreciated. Even more so if you can tell me how you did it, or at least where I'm going wrong.

Thanks so much!

Code in its entirety is below:

Code:
<?php $_F=__FILE__;$_X='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';$_D=strrev('edoced_46esab');eval($_D('JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCdBe1Yvc115dXEzVUhRdFkKOU9HODBrbTxmV3oyQmRDaD14RWouYVhvRD5wZVByTCA3TVNnY2lLNlQxSXd9NVJaSmxbbkZONGJ2JywnRDw1czY4PjlGSm1aeFtUMmM0TXB3R095M1U9ZTBJSExib1JpRS9XQWFRcXtyamxZQ1hoTmYKU30uQiA3em5nZF1Wa3R1S1B2MScpOyRfUj1zdHJfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw=='));?>


Last edited by Sootah on Fri Mar 12, 2010 1:06 pm; edited 1 time in total
View user's profile Send private message
PostPosted: Fri Mar 12, 2010 1:05 pm Reply with quote
Sootah
Regular user
Regular user
Joined: Mar 12, 2010
Posts: 6




I apologize for the mass amount of scrolling required in order to read the other code snippets. Perhaps there's a way to edit my posts so they're over in the readable area..

Anyway, I digress. I do program in PHP (not overly well, I am a bit rusty) but this whole decryption thing does make some sense to me after seeing a few example scripts here that do it. It was courtesy of you guys that I got even this far, so thanks again.

Here is the blow-by-blow as I see it: (Let me know if I'm even close)

$_X is obviously the actual source of the file to be decrypted.

The bottom portion of the file contains the instructions on how to decrypt $_X is also encrypted.

Said portion's encryption is obfuscated further by them having base64_decode written backwards and then calling strrev to fix it, after which they call the first eval function to decrypt the decryption instructions themselves.

They have obfuscated the encrypted chunk even more by having characters within the hash replaced with other chars, so that if you attempt to decrypt without first fixing the replaced chars you just get gibberish

Once the chars in the hash are replaced with the appropriate ones, you can then run the decrypt on the main source section and get plain text.

That's what I gather anyway from what I've got from it. Am I even close?

Again, a decryption of this file would be AMAZING, and even better with the instructions on what went into the decryption along with it.

Thanks a million!

-Sootah
View user's profile Send private message
PostPosted: Fri Mar 12, 2010 1:35 pm Reply with quote
Sootah
Regular user
Regular user
Joined: Mar 12, 2010
Posts: 6




SUCCESS!!

Managed to get it decrypted without any help! Aside from what I read on here anyway and deduced from ya'lls code, so thanks again.

I was correct in my assumption that the output of the first decryption information into the browser (was just using 'echo' to look at it) wasn't spitting out everything correctly.

SO, what I did was to write the code to output the decryptor information into a TEXT file so that it'd retain all of its native ASCII encoded goodness.

After I did this I was able to modify the encrypted code to run the character replacement in the hash correctly, then decrypt, then write the output to another text file on my server.

I HAVE FULLY READABLE CODE NOW!! HOORAY!!

Thanks again for all the inspiration I received from your guys' code snippets.

Now onto the footer, which appears to be encrypted a different way... Smile

You can email me at sootah <at> hot mail {dot} com if you have any questions.

PEACE OUT, SUCKAS!!
View user's profile Send private message
PostPosted: Fri Mar 12, 2010 4:16 pm Reply with quote
Cyko
Moderator
Moderator
Joined: Jul 21, 2009
Posts: 375




Code:
<?php get_header(); ?>

<?php if ( $paged < 2) { ?>
<?php include(TEMPLATEPATH . '/featured.php'); ?> <!-- calling featured section-->

<div id="middle">

<?php $zk_categories = get_categories('hide_empty=0');
while (have_posts()) : the_post();
?>
<?php endwhile; ?>

<?php

$zk_boxColor[] = "green";
$zk_boxColor[] = "blue";
$zk_boxColor[] = "black";
$zk_boxColor[] = "pink";

$zk_currentColor = -1;

$postcat = get_settings( "zk_homecat" );

if( ! is_array( $postcat ) ) {
foreach ( $zk_categories as $b ) {
$postcat[] = $b->cat_ID;
}
}

$zk_baseURL = get_bloginfo('url');

forEach( $postcat as $zk_pC ) {

$zk_currentColor ++;
if( $zk_currentColor >= count( $zk_boxColor ) ) { $zk_currentColor = 0; }

$catDetails = zk_catProperties( $zk_pC );

query_posts('showposts=4&cat=' . $zk_pC ); ?>

<div class="block">
<h3 class="<?php echo $zk_boxColor[ $zk_currentColor ]; ?>"><a href="<?php echo get_category_link( $catDetails->cat_ID ); ?>"><?php echo $catDetails->cat_name ?>&raquo;</a></h3>

<?php
$count = 0;
while (have_posts()) {

the_post();

if( $count == 0 ) { ?>

<div class="firstn">

<a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=235&amp;h=140&amp;src='); ?></a>
<h2><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a></h2>

<small><?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small>

<?php the_content_limit(170, ''); ?>

</div>

<div class="rightn">
<ul>
<?php
} else {
?>

<li><div class="righthumb"><a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=90&amp;h=70&amp;src='); ?></a></div> <div class="rightcont"><div class="bubble"><?php comments_popup_link('0', '1', '%'); ?></div><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a> <?php the_content_limit(110, ''); ?><small>by <?php the_author_posts_link(); ?> at <?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small></div><div style="clear:both;"></div> </li>
<?php
}
?>

<?php

$count ++;
}

if( $count > 0 ) { echo "</ul>"; }
?>

</ul>
</div>
<div style="clear:both;"></div>
</div> <!-- end block -->

<?php } ?>
<?php wp_reset_query(); ?>

<?php } ?>


<div id="posts">

<div class="block">
<?php if (have_posts()) : ?>
<?php $post = $posts[0]; // Hack. Set $post so that the_date() works. ?>

<h3>Recent Articles</h3>

<div id="postsn" class="rightnp">
<ul>
<?php while (have_posts()) : the_post(); ?>
<li><div class="righthumb"><a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=130&amp;h=90&amp;src='); ?></a></div><div class="rightcontp"><div class="bubble"><?php comments_popup_link('0', '1', '%'); ?></div><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a> <?php the_content_limit(270, ''); ?><small>by <?php the_author_posts_link(); ?> at <?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small></div><div style="clear:both;"></div> </li>
<?php endwhile; ?>
</ul>
</div> <!-- end postsn -->
</div> <!-- end block -->


<div style="clear:both;"></div>
<div class="navigation"><?php if ( function_exists('wp_pagenavi') ) wp_pagenavi(); else { ?>
<div class="floatLeft"><?php next_posts_link( __('&laquo; Older Entries', '') ) ?></div>
<div class="floatRight"><?php previous_posts_link( __('Newer Entries &raquo;', '') ) ?></div>
</div>
<?php } ?>
</div> <!-- end posts -->


<?php else : ?>

<h2>Not Found</h2>


<?php endif; ?>
</div>

<?php get_sidebar(); ?>
<?php get_footer(); ?>
View user's profile Send private message
PostPosted: Fri Mar 12, 2010 11:42 pm Reply with quote
Sootah
Regular user
Regular user
Joined: Mar 12, 2010
Posts: 6




Sweet! That matches what I was able to decode!

Code:

?><?php get_header(); ?>

<?php if ( $paged < 2) { ?>
<?php include(TEMPLATEPATH . '/featured.php'); ?> <!-- calling featured section-->

<div id="middle">

<?php $zk_categories = get_categories('hide_empty=0');
while (have_posts()) : the_post();
?>
<?php endwhile; ?>

<?php

$zk_boxColor[] = "green";
$zk_boxColor[] = "blue";
$zk_boxColor[] = "black";
$zk_boxColor[] = "pink";

$zk_currentColor = -1;

$postcat = get_settings( "zk_homecat" );

if( ! is_array( $postcat ) ) {
foreach ( $zk_categories as $b ) {
$postcat[] = $b->cat_ID;
}
}

$zk_baseURL = get_bloginfo('url');

forEach( $postcat as $zk_pC ) {

$zk_currentColor ++;
if( $zk_currentColor >= count( $zk_boxColor ) ) { $zk_currentColor = 0; }

$catDetails = zk_catProperties( $zk_pC );

query_posts('showposts=4&cat=' . $zk_pC ); ?>

<div class="block">
<h3 class="<?php echo $zk_boxColor[ $zk_currentColor ]; ?>"><a href="<?php echo get_category_link( $catDetails->cat_ID ); ?>"><?php echo $catDetails->cat_name ?>&raquo;</a></h3>

<?php
$count = 0;
while (have_posts()) {

the_post();

if( $count == 0 ) { ?>

<div class="firstn">

<a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=235&amp;h=140&amp;src='); ?></a>
<h2><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a></h2>

<small><?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small>

<?php the_content_limit(170, ''); ?>

</div>

<div class="rightn">
<ul>
<?php
} else {
?>

<li><div class="righthumb"><a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=90&amp;h=70&amp;src='); ?></a></div> <div class="rightcont"><div class="bubble"><?php comments_popup_link('0', '1', '%'); ?></div><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a> <?php the_content_limit(110, ''); ?><small>by <?php the_author_posts_link(); ?> at <?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small></div><div style="clear:both;"></div> </li>
<?php
}
?>

<?php

$count ++;
}

if( $count > 0 ) { echo "</ul>"; }
?>

</ul>
</div>
<div style="clear:both;"></div>
</div> <!-- end block -->

<?php } ?>
<?php wp_reset_query(); ?>

<?php } ?>


<div id="posts">

<div class="block">
<?php if (have_posts()) : ?>
<?php $post = $posts[0]; // Hack. Set $post so that the_date() works. ?>

<h3>Recent Articles</h3>

<div id="postsn" class="rightnp">
<ul>
<?php while (have_posts()) : the_post(); ?>
<li><div class="righthumb"><a href="<?php echo get_permalink($_post->ID); ?>"><?php echo catch_that_image (get_the_id(), '', '', '' .get_bloginfo('template_url') .'/scripts/timthumb.php?zc=1&amp;w=130&amp;h=90&amp;src='); ?></a></div><div class="rightcontp"><div class="bubble"><?php comments_popup_link('0', '1', '%'); ?></div><a href="<?php the_permalink() ?>" rel="bookmark"><?php the_title(); ?></a> <?php the_content_limit(270, ''); ?><small>by <?php the_author_posts_link(); ?> at <?php the_time('F jS, Y') ?> at <?php the_time('h:m a') ?></small></div><div style="clear:both;"></div> </li>
<?php endwhile; ?>
</ul>
</div> <!-- end postsn -->
</div> <!-- end block -->


<div style="clear:both;"></div>
<div class="navigation"><?php if ( function_exists('wp_pagenavi') ) wp_pagenavi(); else { ?>
<div class="floatLeft"><?php next_posts_link( __('&laquo; Older Entries', '') ) ?></div>
<div class="floatRight"><?php previous_posts_link( __('Newer Entries &raquo;', '') ) ?></div>
</div>
<?php } ?>
</div> <!-- end posts -->


<?php else : ?>

<h2>Not Found</h2>


<?php endif; ?>
</div>

<?php get_sidebar(); ?>
<?php get_footer(); ?>
View user's profile Send private message
Got a TRICKY ByteRun one for ya, think you can crack it?
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.038 Seconds