Re: Infiltration source code
Quote:
Originally Posted by
MisterKid
Lol i still dont get why people wants to steal res files... too secure against cheaters you can use flyff.a and flyff.b. But everything can be bypasses/decrypted/unpacked. if you take time for it.
Posted via Mobile Device
sorry for this question
can i Encrypt .res file in flyff source?
:huh:
Re: Infiltration source code
Quote:
Originally Posted by
MisterKid
Lol i still dont get why people wants to steal res files... too secure against cheaters you can use flyff.a and flyff.b. But everything can be bypasses/decrypted/unpacked. if you take time for it.
Posted via Mobile Device
Clientsided file encryption is by far the easiest encryption to reverse engineer. Detour the decryption routine and dump the unencrypted data from memory.
Re: Infiltration source code
You cannot reverse engineer (baliktad "utak ng" engineer) or even detour the decryption routine, because my neuz is resources friendly which means no memories are allocated. Hehehe.
@Mod Please don't banned me. T_T
Re: Infiltration source code
Quote:
Originally Posted by
rtosoftware
You cannot reverse engineer (baliktad "utak ng" engineer) or even detour the decryption routine, because my neuz is resources friendly which means no memories are allocated. Hehehe.
@Mod Please don't banned me. T_T
Bullshit and not possible.
If you can write a program using 0 memory then why are you here?
I think I don't understand what you are trying to say.
For what i can understand is that your neuz doesn't use any memory?
"Security is no more then a illusion."
A qoute from some guy.
Its true since everything can be cracked.
Even hash md5.But noone is smart enough. :S
Re: Infiltration source code
Quote:
Originally Posted by
MisterKid
Bullshit and not possible.
If you can write a program using 0 memory then why are you here?
Sorry, I only use baliktad "utak ng" engineer.
Re: Infiltration source code
Quote:
Originally Posted by
xLethal
Clientsided file encryption is by far the easiest encryption to reverse engineer. Detour the decryption routine and dump the unencrypted data from memory.
True, but only if you know how and I'd say at least 90% of the people who play flyff now have no idea how to do that, maybe more.
main reason I'd say for res file encryption is to prevent noobs from stealing your stuff for their servers.
Re: Infiltration source code
Quote:
Originally Posted by
rtosoftware
You cannot reverse engineer (baliktad "utak ng" engineer) or even detour the decryption routine, because my neuz is resources friendly which means no memories are allocated. Hehehe.
@Mod Please don't banned me. T_T
If it's not in memory, then how are the resources rendered on the screen? Your code is in memory at execution time as well, that is how I detour it.
I'm assuming when you say "no memories are allocated", you mean you deallocate it directly after it's read, which still is vulnerable to a detour and can be easily dumped.
Quote:
Originally Posted by
ShadowDragon42
True, but only if you know how and I'd say at least 90% of the people who play flyff now have no idea how to do that, maybe more.
main reason I'd say for res file encryption is to prevent noobs from stealing your stuff for their servers.
I'd say around 10 reverse engineers currently in the Flyff scene can dump encrypted resources if they had the proper motivation. It's not a bad idea to encrypt resources, but don't rely on it otherwise you'll end up looking like a fool if someone does manage to dump them.
Re: Infiltration source code
.... .res alreadt is encrypted why encrypt it twice? It makes it slower. Example.
You are sitting in the garden and want some tea.You do the following
Get a cup of tea and get back in the garden theb go back to the kitchen for sugar and then back in the garden.
While you could get them at the same time.
Its faster. Just improve the encryption.... you got the source.
Dont encrypt it like *.res.blah .... @ patcher it be like *.res.blah.gz
Make it directly *.blah
Posted via Mobile Device
Re: Infiltration source code
Quote:
Originally Posted by
MisterKid
.... .res alreadt is encrypted why encrypt it twice? It makes it slower. Example.
You are sitting in the garden and want some tea.You do the following
Get a cup of tea and get back in the garden theb go back to the kitchen for sugar and then back in the garden.
While you could get them at the same time.
Its faster.
Posted via Mobile Device
-.- don't take everything I say at face value..
I didn't mean encrypt them twice, but change the encryption so it can't be easily read.
Re: Infiltration source code
owh :p
Posted via Mobile Device
Re: Infiltration source code
why does this release remind me of Auto and Term?
Re: Infiltration source code
Quote:
Originally Posted by
xLethal
If it's not in memory, then how are the resources rendered on the screen? Your code is in memory at execution time as well, that is how I detour it.
I'm assuming when you say "no memories are allocated", you mean you deallocate it directly after it's read, which still is vulnerable to a detour and can be easily dumped.
Your words not mine.
How to deallocate if there is no memory allocated?
And there is no dumped memory.
*Sorry my bad english i'm not school.
Re: Infiltration source code
Quote:
Originally Posted by
rtosoftware
Your words not mine.
How to deallocate if there is no memory allocated?
And there is no dumped memory.
*Sorry my bad english i'm not school.
I have no idea what you're trying to say, but you are truly a wizard if you can have a program running without using any memory. /endsarcasm
You seriously can't have ANY and I seriously mean ANY program opened on your computer without using any memory (aka RAM).
Re: Infiltration source code
Quote:
Originally Posted by
GlaphanKing
why does this release remind me of Auto and Term?
Maaaaybe because all of those hacks from nForce also used the AntTweakBar GUI. :D