Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 08-02-2003, 06:26
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
Kanal how does signature analysis work?

Hi guys,
I'm a new member of this great forum. I'm also new to the art of reversing and hoping to reverse a Delphi app.

I scanned the exe with Kanal v2.2 tool and it reports that it contains RC5/RC6 crypto signatures.

Is the signature a recognisable block of bytes which are the opcodes used in the algorithm? Or is a signature defined in some other way?

Be as technical as you want any reply.

Thanks for your help

Reply With Quote
  #2  
Old 08-03-2003, 05:34
Nebob
 
Posts: n/a
Most crypto algorithms use certain constants to initialize/assist the computation. It probably searches for these.

For example, md5:

0x67452301;
0xefcdab89;
0x98badcfe;
0x10325476;
Reply With Quote
  #3  
Old 08-03-2003, 16:19
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
Hmmm.....
If KANAL used those constants for detecting crypto algos
in exeutables, I'd understand why it doesn't show us
the address of the crypto code.
Many ppl asked sKAMER whether he could improve
KANAL in that way that it shows us the address
of the crypto code.
I'd also understand why it does not detect the RSA algo:
'cause it does not use any constants.
Reply With Quote
  #4  
Old 08-03-2003, 16:41
an0nymous
 
Posts: n/a
none ask me, if i remember..but im bussy atm

try ask snaker - this is dsk* a deadly-skills-coder

i think this elite hero have too much time than me
Reply With Quote
  #5  
Old 08-03-2003, 18:21
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
That could be the answer, RC5 uses 2 constants :
1.) the base of natural logarithms
2.) the golden ratio.

I expect RC6 will be the same as this too is a parameterized algorithm where block size, key size, and the number of rounds are variable; with a 2040 bit upper limit on the key size.

Are the any crypto experts on this forum that know how to exploit poorly implemented rc5 code to obtain private keys?

Or has anyone seen keygens for apps that use rc5 in there protection scheme? I need all the help I can get.

All my searches point to the distributed.net site which is of no real help to me.

Thanks for the replies so far.

5Alive
Reply With Quote
  #6  
Old 08-03-2003, 18:35
ArC ArC is offline
VIP
 
Join Date: Jan 2003
Location: NTOSKRNL.EXE
Posts: 172
Rept. Given: 0
Rept. Rcvd 1 Time in 1 Post
Thanks Given: 5
Thanks Rcvd at 17 Times in 12 Posts
ArC Reputation: 1
I don't have much experiance with RC5
but I could imagine that you will find that
key when you trace the app....

To the best of my knowledge RC5 is a private-key-only
cipher.
This means that the key used for decryption is the same
that is used for encryption.

Correct me if I'm wrong
Reply With Quote
  #7  
Old 08-03-2003, 20:18
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
Quote:
Originally posted by ArC
I don't have much experiance with RC5
but I could imagine that you will find that
key when you trace the app....
You make it sound so easy.

You are right RC5 only uses a private key of variable length,
it is a symmetric block cipher meaning that the same key is used for both encryption and decryption.

5Alive.
Reply With Quote
  #8  
Old 08-04-2003, 00:07
an0nymous
 
Posts: n/a
rc5 isnt a hard stuff
Reply With Quote
  #9  
Old 08-04-2003, 03:54
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
Quote:
Originally posted by sKAMER
rc5 isnt a hard stuff
Are you speaking from experience? Any knowledge you can share would be very helpful to me.

What is the best approach to finding a private key as they are not hidden in the code anywhere.

Thanks.

5Alive.
Reply With Quote
  #10  
Old 08-04-2003, 04:26
an0nymous
 
Posts: n/a
any crypto defeating depends on crypto implementation
Reply With Quote
  #11  
Old 08-04-2003, 04:28
doggystile
 
Posts: n/a
where can i get Kanal v2.2

where can i get Kanal v2.2 to download
Reply With Quote
  #12  
Old 08-04-2003, 04:30
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
Naturally, can what should I be looking for?
Reply With Quote
  #13  
Old 08-04-2003, 05:07
31415926535
 
Posts: n/a
You should try Dede and look for used units, there are only few implementations of RC5 on net. I dont'n know what you're trying to crack but I'd bet that it will use DCPCrypt1/2(hxxp://www.cityinthesky.co.uk/). Load it into Delphi, make sample app, debug in Delphi internal debugger and learn.
Reply With Quote
  #14  
Old 08-04-2003, 05:18
doggystile
 
Posts: n/a
Question need help decripting a file

i am a newbe at crytography. need help decripting a file and i do not know where to start, the file i am decrypting has no attchments to it . i made a copy of the file and put a attchment txt to it and open it in read form it is encrypted . how do i fix it
Reply With Quote
  #15  
Old 08-04-2003, 16:50
5Alive 5Alive is offline
Friend
 
Join Date: Aug 2003
Posts: 82
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 1 Time in 1 Post
5Alive Reputation: 0
Quote:
Originally posted by 31415926535
You should try Dede and look for used units, there are only few implementations of RC5 on net. I dont'n know what you're trying to crack but I'd bet that it will use DCPCrypt1/2(hxxp://www.cityinthesky.co.uk/). Load it into Delphi, make sample app, debug in Delphi internal debugger and learn.
Thanks for nonambiguous comments, I am using DeDe which is a great tool and has helped me a lot in understanding how the program works, though I still have much to learn.

I was hoping that it uses a standard library suchs as DCPCrypt, it uses something called TCipherStreamFactoryRC5 to handle the decryption.

Web searches have proved fruitless, so I can only guess it is a custom lib. Anyone heard of this ?

5Alive
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Any current Crypto Scanners or tools like KANAL in use? TempoMat General Discussion 13 09-18-2021 00:53
Kanal koncool General Discussion 7 08-01-2003 04:56


All times are GMT +8. The time now is 23:07.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )