Need help identifying modified blowfish algo
Hello,
i am working on an arm linux elf file that has blowfish encryption algorithm inside. But whatever i did to reproduce them, i can't get the same results. this is what it's like in decompiled form. Code:
unsigned int __fastcall CBlowFish::Encode(CBlowFish *this, unsigned __int8 *a2, unsigned __int8 *a3, unsigned int a4) Code:
int __fastcall CBlowFish::Blowfish_encipher(CBlowFish *this, unsigned int *a2, unsigned int *a3) hxxps://filebin.net/yordbkvlpmofbaem thanks in advance |
upper function std::string *__fastcall linx::LCEncryption::EncryptDecrypt(std::string *pStrOutput, const char **ppInput, int mode)
Code:
v7 = lenInput % 8; Maybe if you can show some sample pairs of input/output strings to LCEncryption::EncryptDecrypt I don't have the proper arm env to debug the exe, tried it in qemu but it cries for missing so libs and some (QT) are compiled for this embedded app (ie not something that can be googled for) maybe if you can make a rootfs of the env or don't know, do a find / -name \*.so and only pack those (you have at least read access because of the a binary) |
1 Attachment(s)
i am new in reversing arm binaries. but, i don't think running that big elf file would be any use. or maybe qemu has debug capability?
been trying to setup qemu as ida debugger but it just hangs at start up. and there's really little information about this (ida and qemu) in the web. Quote:
Quote:
Attachment 9826 Quote:
thanks |
Quote:
|
Quote:
Try Azeria Labs VM https://azeria-labs.com/arm-lab-vm/ https://azeria-labs.com/lab-vm-2-0/ https://azeria-labs.com/emulating-arm-firmware/ Or Hugsy (the creator of GEF) VM labs https://blahcat.github.io/2017/06/25/qemu-images-to-play-with/ |
All times are GMT +8. The time now is 17:33. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX