There's been some proof that people have cracked it, including a few pictures of the software/source code inside the archive. Just lurk around and you'll find a few.
Printable View
probably because they have found the password, perhaps because it's a word related to flyff ....but well you could call it a proof when a complete file content will be quoted here (for exemple CObject3D.h wich contain o3d format, then we will be able to see if it's true or not)
about cola, even if this tool wasn't in the 7z file, with neuz source you could re create it just by having neuz source :p
So personnally the most usefull thing, even if it's old is neuz source.It contain all the format structure all v4-5 packet structure, and somuch interesting thing... The fact it's not a v15 source isn't very important
The best way to protect something is to use a password which is not related to the thing your trying to protect, and it looks like password for this archive is NOT flyff related, otherwise It already would be cracked.
Nah i guess this is not 100% true.
As i gave up my flyff Server i checked my databases which had the passwords unhashed. And now you can guess what most ppl are using as a password.
most of the passwords were like
flyffxyz
flyyff
flyflyfly
Flyff related passwords so maybe we are lucky and the Dev used a Flyff related thing we dont know aout yet or he just altered the original word with extras. But i other case: this DEV isnt a 14-16 years old Player whos not so careless about security.
And remember he stored this archive on his Server with the Name Neurospace.7z. Neurospace is a word lots of ppl know about because of the selfmade patchers etc... o it must be secure in this case else he had taken another filename which People wouldnt even think about "googeling" it...
But that are just my 2 cents :-/
i woudl lol if the pass was: RESCLIENT
xD
I just checked used your program to chek several passwords. Was a lil chance to find it though cause i made a list with all filenamens. Used them with and without extension, but no luck :-/
I will not be surpised if the one who said to aeonsoft about their security issue is the same that the one who take those file... Just to avoid other people to have them too and keep them for them self :p
I think this guy have done like this : found a router from aeonsoft with master username and password corresponding to default password given with the router when you buy it.
Then he penetrate aeonsoft network and found their backup server, and then those sources file.
Finally to avoid other people to have it the best way is to tell to aeonsoft where is the security issue ^^
if it was me, it's what i could have done...
ontopic: i continue the bruteforce attack but nothing for the moment
lets scan a Real online Dictionary and make a file like a Rainbow table out of it?
Maybe it is a common english word maybe not :-/
@ Nicco how was the comamnd to scan webpages?
Create createdictionary.txt of a website:
Then just use that dictionary.Code:7zBruteForce createdictionary "http://google.com"
Or use the batch f.bat
Usage:Code:@echo off
cls
del "createdictionary.txt"
7zBruteForce createdictionary "%1"
del "dictionary.txt"
rename "createdictionary.txt" "dictionary.txt"
del "cache.dat"
cls
7zBruteForce exit
Code:f "http://google.com"
f "http://forum.ragezone.com"
f "http://msn.com"