Thread: XTEA (Map Data) Dumping

Page 3 of 3 FirstFirst 123
Results 21 to 25 of 25
  1. #21  
    Banned

    Join Date
    Sep 2010
    Age
    26
    Posts
    568
    Thanks given
    147
    Thanks received
    201
    Rep Power
    0
    Thank you for the link
    Reply With Quote  
     

  2. #22  
    Donator
    Brianna's Avatar
    Join Date
    Aug 2010
    Posts
    401
    Thanks given
    80
    Thanks received
    24
    Rep Power
    23
    you are all wrong the reson its not working is rs now has encripted strings inthere client and methods xtea dumper doesnt decript i hope he gets to it
    If you need help with anything, add me on Skype: Songoda, or Facebook: Briannastatic.

    [Only registered and activated users can see links. ]
    Reply With Quote  
     

  3. #23  
    Registered Member
    bracket's Avatar
    Join Date
    Aug 2009
    Posts
    5,286
    Thanks given
    1,047
    Thanks received
    1,463
    Rep Power
    5000
    Quote Originally Posted by songoda View Post
    you are all wrong the reson its not working is rs now has encripted strings inthere client and methods xtea dumper doesnt decript i hope he gets to it
    Wtf are you on about dude??
    Reply With Quote  
     

  4. #24  
    Renown Programmer
    Method's Avatar
    Join Date
    Feb 2009
    Posts
    1,455
    Thanks given
    0
    Thanks received
    843
    Rep Power
    3019
    Quote Originally Posted by owner pkin View Post
    Wtf are you on about dude??
    songoda explained why the application is no longer working. What are you on about?

    As for updating the application, I don't think I'm interested enough to figure out how the string obfuscation works and reverse it. If anyone else wants to do so, you're free to submit an updated version. I'll add it to the main post.
    :-)
    Reply With Quote  
     

  5. #25  
    Programmer, Contributor, RM and Veteran




    Join Date
    Mar 2007
    Posts
    5,074
    Thanks given
    2,625
    Thanks received
    3,578
    Discord
    View profile
    Rep Power
    5000
    Quote Originally Posted by Method View Post
    songoda explained why the application is no longer working. What are you on about?

    As for updating the application, I don't think I'm interested enough to figure out how the string obfuscation works and reverse it. If anyone else wants to do so, you're free to submit an updated version. I'll add it to the main post.
    Method it's actually fairly easy. Every class has some code that looks like this:

    Code:
    public char[] z(String str) {
    	char[] ch = str.toCharArray();
    	if (ch.length < 2)
    		ch[0] ^= *random value*;
    	return ch;
    }
    
    public String z(char[] ch) {
    	for (int pos = 0; pos < ch.length; pos++) {
    		switch (pos % 5) {
    		case 0:
    			ch[pos] ^= *random value*;
    			break;
    		case 1:
    			ch[pos] ^= *random value*;
    			break;
    		case 2:
    			ch[pos] ^= *random value*;
    			break;
    		case 3:
    			ch[pos] ^= *random value*;
    			break;
    		default:
    			ch[pos] ^= *random value*;
    			break;
    		}
    	}
    
    	return new String(ch).intern();
    }
    Each class also has a static array of strings which is initialized in the static initializer, like this:

    Code:
    static {
    	strings = new String[] {
    		z(z("encrypted string here")), z(z("encrypted string here")) //etc
    	}
    }
    In the code they are simply referred to as:

    Code:
    strings[0]
    etc.

    The random values change for each class but it's quite simple to find those by using these patterns:

    Code:
    CALOAD (BIPUSH | SIPUSH | ICONST) IXOR I2C CASTORE
    
    CALOAD ILOAD ICONST IREM (TABLESWITCH | LOOKUPSWITCH) ((BIPUSH | SIPUSH | ICONST) GOTO?)* IXOR I2C CASTORE
    I also used this to find the code which populates the table:

    Code:
    (ICONST | BIPUSH | SIPUSH | LDC) ANEWARRAY (DUP (ICONST | BIPUSH | SIPUSH | LDC) LDC INVOKESTATIC INVOKESTATIC AASTORE)+ PUTSTATIC
    Then, once you've decrypted the strings in the table, you simply have to replace any sequence of GETSTATIC, ICONST/BIPUSH/SIPUSH, AALOAD which refers to that array, with an LDC which refers to the decrypted string.
    .
    Reply With Quote  
     

  6. Thankful user:


Page 3 of 3 FirstFirst 123

Thread Information
Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)


User Tag List

Similar Threads

  1. XTEA data
    By Zee Best in forum Requests
    Replies: 3
    Last Post: 02-26-2010, 08:10 PM
  2. Replies: 43
    Last Post: 12-21-2009, 02:00 PM
  3. Dumping 'map data'
    By veer in forum Informative Threads
    Replies: 12
    Last Post: 01-13-2009, 09:08 AM
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •