Questions tagged [xor]
Exclusive or (xor) is a logical operation that outputs true only when both inputs differ (one is true, the other is false).
29
questions
0
votes
0
answers
57
views
Attempting to auto reverse XOR
Does anyone know of any helpful tools or a way to automate decryption of XOR in IDA? I know that they have a built in function to do some bare XOR encryption but this one seems a bit more ...
2
votes
0
answers
62
views
Figuring out the algorithm for an NFC reader, which displays values increased by 1.52 times
I have two NFC readers, reader A reads card ID numbers according to the ISO standard and the algorithm is publicly available. Reader B is from a Canon printer. The card numbers read by reader B are 1....
0
votes
1
answer
102
views
Trying to reverse encypter to decrytper in C. Can't figure out what I'm missing
Goal:
Trying to reverse encrypter to decrypter that successfully decrypts.
This is the pseudo-code of the disassembled encrypting program. There are no function calls, and I've been able to somewhat ...
1
vote
1
answer
238
views
Where is the XOR operation?
I am doing TryHackMe REloaded room, level 3.
When I got stuck I followed this tutorial which mentions an XOR by 7 operation being performed on a string, however I cannot see it anywhere.
Where is it ...
2
votes
0
answers
146
views
How would I decode this XOR Cipher
I have been given a XOR Cipher which is a bunch of hexidecimal looking charcters. This cipher is:
fa ce fd d3 fa df ed d3 fa ce d3 d3 fa de df d3
fa de df d3 fa de f9 d3 fa ce f9 d3 fa de f1 d3
...
3
votes
0
answers
318
views
How would I crack a software that has Xor encryption
So, before you shout at me to go on google I would just like to say I am new to reverse Engineering. Like I have been doing it for a hour. So, I was doing a bunch of crackmes.one using the search all ...
3
votes
0
answers
593
views
How to decrypt cocos2d luac type?
I am new with IDA and cocos2d. Since I have learned how to decrypt cocos2d Lua file, I found xxtea tool with Sign and Key and how to find Sign header in some game in Lua file.
But that method does not ...
1
vote
0
answers
66
views
RE on firmware images that seem to use weak encryption/obfuscation. Robot vacuum
I have been playing with some robot vacuums that utilize very basic navigation, and I am wanting to play around with my own provisioning along with adding a Rpi to augment features.
These vacuums are ...
2
votes
1
answer
535
views
Help regarding XOR game decryption algorithm
I'm currently trying to reverse engineer the decryption algorithm for an old online game, using a chat message packet, as it contains text which is easily recognizable.
I used a packet sniffer to get ...
0
votes
2
answers
2k
views
Decode xor data in IDA
I have code that looks like this:
byte_100031BA4 = v41;
byte_100031BA5 ^= 0x3Eu;
byte_100031BA6 ^= 0x47u;
LOBYTE(a1) = -9;
byte_100031BA7 ^= 0xF7u;
byte_100031BA8 ^= 0xA9u;
byte_100031BA9 ^= 0xE8u;
...
0
votes
1
answer
239
views
xor eax,3 why does the input change the way it does?
I am new to reverse engineering and I am trying to figure out exactly what xor is doing in this little program. I know if I put any number other than 0 I get a xor eax,3 so if I put in 1 I get 2 if I ...
5
votes
1
answer
1k
views
Stuck on XOR decryption of firmware
TL;DR
I have an encrypted image and the cleartext version, and I'm almost certain it's an XOR cipher, but I can't figure out how to decrypt it. I have a few clues listed below.
Ciphertext excerpt (...
4
votes
1
answer
353
views
Tektronix firmware XOR puzzle
As a means of learning about packing firmware and for fun I am trying to unpack the latest firmware for an entry level Tektronix Function generator firmware attached
I have read the forum and ...
1
vote
0
answers
115
views
File Decryption Problems
over the past year, I provided an English patch to a community of thousands of players of a game I love and which is not available in English (just Chinese and Korean).
Sadly, besides me, other ...
0
votes
1
answer
270
views
Does someone recognize this "lookup table"? (used for xor encryption)
This table is part of the packet encryption of an old game for which I am developing a server.
The crypto algorithm doesn't just xor the password with the message.
It uses a multiple of the ascii ...