Questions tagged [encryption]
Process of encoding information such that decoding requires the knowledge of some secret (a key). This tag covers questions about obfuscated and encrypted programs, or tools, but higher level questions may get better answers on Cryptography Stack Exchange.
271 questions
0 votes
0 answers
33 views
Help me solve a steganograhy challenge!
(original png) It's a multi level challenge. While examining through zsteg I found 2 zlib compressed file and a binary executable. I have uncompressed one of the zlib which gave long hex string, which ...
1 vote
0 answers
147 views
Decoding .dat files in the Unity game
I'm localizing a Unity IL2CPP game. All data files, as well as localization files, are encrypted in a custom .dat format. I'm currently trying reverse engineering to decode them. I found out that the ...
0 votes
0 answers
66 views
Hooking decryption functions in IL2CPP Unity game: Classes/methods not found at runtime despite dump.cs output
I've been working on reverse engineering a Unity game (IL2CPP) to analyze its encryption methods, but I've hit several roadblocks and would appreciate guidance from more experienced reversers. What I'...
0 votes
1 answer
121 views
How to reverse engineer communication encryption logic from the application?
I would like to reverse engineer a communication protocol encryption (ccTalk BNV), where I have access to the following: a windows application (test program), that can send unencrypted and encrypted ...
0 votes
0 answers
63 views
Decrypting non-cyrillic data (BIN file) which contains the date for renewal
Hi everyone, good evening and something else.enter image description here I have a .txt file which contains the license date, my email information. My mission - decode this file and change date, then ...
2 votes
1 answer
79 views
Identify an unknown attached signature algorithm
I have a collection of both signed and unsigned firmware images for a device (of which the bootloader seems to require the signed images). I also have what I think may be the signing key (a 256-bit EC ...
0 votes
0 answers
100 views
Encrypted UART communication protocol
I'm currently analyzing the communication protocol between an ultrasonic cartridge and the machine it operates with. The cartridge is a consumable, and my goal is to virtually recharge it. From what I ...
1 vote
1 answer
191 views
What does this function do? Why is one of the variables unresolved?
This function decrypts an array of bytes to the string "crackmeYG": +0x1610 int64_t sub_7ff7c8a11610(int64_t arg1, int128_t* arg2) +0x1610 { +0x1634 void var_1c8; +0x1634 ...
0 votes
0 answers
75 views
How do I find the decryption key of an android app using Frida?
I've been reverse-engineering an Android app for a set of Bluetooth headphones, and my goal is to find the keys to decrypt the firmware. I obtained the firmware by intercepting the traffic between the ...
0 votes
0 answers
58 views
Reverse Engineering S/EX RE-MAN BOARD INTERFACE SR2 SL (MRD-45-2276)
S/EX RE-MAN BOARD INTERFACE SR2 SL (MRD-45-2276) How can I access the raw data sent by the sensors to this board? I also need the data sheet and schematic information of the board.
0 votes
0 answers
91 views
What is the checksum algorithm for these messages?
I am attempting to reverse engineer a motor with an unknown CRC algorithm. I've used a logic analyzer to find these bytes, and I would like to send my own bytes back to the motor. Unfortunately, I can'...
1 vote
1 answer
127 views
How to Determine the AES Mode Used for an Encrypted Binary File?
I'm working with a binary file that has been encrypted using the AES cipher, but I'm unsure of which mode of operation was used (e.g., ECB, CBC, GCM, etc.). I need to automate the process of ...
0 votes
0 answers
53 views
I extracted a file from inside the dump that contains the serial number and I need to analyze it
I extracted a file from inside the dump that contains the serial number and I need to analyze it I want to unpack and compress this encrypted file after modifying it
1 vote
1 answer
169 views
Sniff Bluetooth traffic using Fitness Tracker
I am attempting to sniff the Bluetooth between the fitness tracker(GOJI ACTIVE GFITBK20 Activity Tracker) and the application(Goji Active) installed on the phone but I am unable to see any health ...
0 votes
0 answers
127 views
How did a cheap amazon RF key managed to clone original key with rolling codes?
I have a garage and I have the original key which is 433MHz and the specifications say it is a rolling code. Here is a table of the specifications: Range in open field (m): 100 Frequency: 433.92 MHz ...