Just made SWF
Encryption
, Completely using as3
Self-encryption of the original SWF.
Using alchemy to shell the original SWF is very simple. Three lines of C code are used in the encryption process. The useless code of the outer layer can be seen again, "but no one can crack the source code of the inner SWF! You can try to decompile
. I dare not say no one can crack it, but I guess it should be hard to crack! "
In the previous post, as3 is easily shelled by flash
023 "Brother cracked. In fact, this is only part of as3 shelling test. It should have been commented out and the result is misleading to everyone... (what I want to crack is the alchemy-C shelling part (the symbolic three lines of shelling code can actually be changed to one line). Now I create an encrypted file (the as3 shelling part is removed, only C shelling is left ).
Tip: 1. It should be impossible for C code to crack the shell.
2. the method I came up with was to save the original SWF after alchemy's shelling at runtime. If it is feasible, try it on your own (if ASV can export the SWC compiled by alchemy, this is okay, if ASV can dynamically modify the SWF script and run it directly, it is also possible. If either of the above two statements is true, any simple SWF shelling method can be completely cracked, we recommend obfuscation for encryption, or simply use haxe or alchemy to write the main code)
3. The code is not replaced by the variable name, and no encryption software is used. The encrypted SWF generates the code/inner SWF source code (* = variable name to be cracked ):
Var * = new textfield ();
*. Text = "please crack ";
*. Textcolor = 0xff0000;
*. Scalex = *. scaley = 10;
Addchild (*);
Welcome to the solution.
.
As3_encrypt_test.swf
(84.47 KB)
Encrypted File
Downloads: 412010-1-29
Problem solved? Experience:
My encryptor (direct to original .swf ):
1.shells use loaderto read original .swf "to refresh bytearrayand saveshells .swf;
2. Embed plugin
To flash,
3. Load with Loader
Original .swf, addchild to the stage.
Decryption ideas:
Step 2 of the encryption method: impeccable. The Code cannot be used to crack the shelling process or shell.
Step 2 of the encryption method: Since the shell code is written in C language, alchemy compilation is basically difficult to do anything.
The problem is that you want to display the original .swf. There must be a restored SWF in the memory during the runtime. If there are no protection measures, then... haha!
Decryption Method:
Thanks to flash023:
Not written in
Because all the classes in your shell are exposed, you can directly use your class and then use another loader to load your SWF and save it...
Flash023 published on
It seems that "obfuscation" is the king of encryption!
It is still difficult to encrypt Java and Flash files. I think of the C language. I don't want to decompile the EXE files. I watched a program a few days ago.
Source code
Among them, over one hundred lines of Embedded Assembly write, let me vomit blood directly...
In the next flash encryption and decryption, it is indeed a real "newbie
Not getting started ", because I was not too interested in it... code comments can never be deciphered...
However, encryption is easy:
I just don't like this encryption method.
The attachment does not use any tools
Encryption, but any cracking is meaningless at this time... you will understand it after decompiling...
It's easy to add. SWF
(3.63 KB)
Downloads: 92010-1-30
Source code:
- Var * = root. createemptymovieclip ("*", 1 );
- *. _ X = 256;
- *. _ Y = 256;
- *. Beginfill (0xff0000 );
- *. MoveTo (-256,-256 );
- *. Lineto (256,-256 );
- *. Lineto (256,256 );
- *. Lineto (-256,256 );
- *. Endfill ();
- *. Onenterframe = function (){
- *. _ Rotation + = 10;
- New Color (*). setrgb (math. Floor (math. Random () * 0 xffffff ));
- }
Copy code
I hope you will continue to report more about The Decompilation process! I want to know if the SWF can be compiled again after alchemy is decompiled.
Supplement:
Alchemy's encryption method is used to encrypt SWF files. Although flash 023 has cracked the encryption method, it is absolutely effective if it is used to encrypt image resources.
Bengine details: http: // flash.9ria
. Com/thread-44986-1-1.html
The five texture file resources used in the engine demo cannot be exported by anyone through decompilation.
Discussion: http://flash.9ria.com/thread-44239-1-1.html