Home > other >  Anyone know unity resources encrypted
Anyone know unity resources encrypted

Time:09-30

O how to extract by caught or other way to decrypt the encrypted content resources, such as encrypted map, etc.,

CodePudding user response:

Write binary resource, and then do to binary data encryption processing, read the reduction back to go,

CodePudding user response:

reference 1st floor tianqiDMC response:
write binary resources, then oneself do encryption with binary data, read the VAT back,


You don't look at the building said that, the original poster is not to encrypt their own projects, but to crack, extraction of others project resources


Encrypted, in order to improve the difficulty of reverse, you need to "encryption and decryption" basis,
The first kind of plan: according to the file data structure content, decryption algorithm is deduced,
Number two: static analysis, such as IDA reverse tools, static analysis may decryption algorithm,
Dynamic debugging tools, and the third way: with single step by step and step into the dynamic debugging etc., analysis of each call, find the client's own decryption algorithm,


After finding algorithm to extract resources as long as out of memory dump, save a file to go,
Premise is: do you have a reverse basis,

CodePudding user response:

http://j.gs/Cq62

Take a look at this useful?

CodePudding user response:

refer to faint on the second floor has a leisurely yo reply:
Quote: refer to 1st floor tianqiDMC response:

Write binary resource, and then do to binary data encryption processing, undo went, when read


You don't look at the building said that, the original poster is not to encrypt their own projects, but to crack, extraction of others project resources


Encrypted, in order to improve the difficulty of reverse, you need to "encryption and decryption" basis,
The first kind of plan: according to the file data structure content, decryption algorithm is deduced,
Number two: static analysis, such as IDA reverse tools, static analysis may decryption algorithm,
Dynamic debugging tools, and the third way: with single step by step and step into the dynamic debugging etc., analysis of each call, find the client's own decryption algorithm,


After finding algorithm to extract resources as long as out of memory dump, save a file to go,
Premise is: do you have a reverse basis,


Is there any detail method... Excuse me, can you tell me what you have done something similar

CodePudding user response:

reference Nigel - 3, 4/f u reply:
Quote: refer to the second floor faint a leisurely yo reply:
Quote: refer to 1st floor tianqiDMC response:

Write binary resource, and then do to binary data encryption processing, undo went, when read


You don't look at the building said that, the original poster is not to encrypt their own projects, but to crack, extraction of others project resources


Encrypted, in order to improve the difficulty of reverse, you need to "encryption and decryption" basis,
The first kind of plan: according to the file data structure content, decryption algorithm is deduced,
Number two: static analysis, such as IDA reverse tools, static analysis may decryption algorithm,
Dynamic debugging tools, and the third way: with single step by step and step into the dynamic debugging etc., analysis of each call, find the client's own decryption algorithm,


After finding algorithm to extract resources as long as out of memory dump, save a file to go,
Premise is: do you have a reverse basis,


Is there any detail method... Excuse me, can you tell me what you have done some similar


Encryption to decrypt itself is a professional discipline, to just learn a little bit of fur,
Each company of the products, and even every product encryption may not be the same, can only see the following instead is common even if the other party, released encryption program, results of encryption is needed to determine the "experience" what it is, can suit the remedy to the case,
Suggested that this encryption to decrypt the problem, is suitable for special BBS ask, see snow BBS, for example, I love to crack, and so on! Ask this, here is not right!

CodePudding user response:

As for packet caught, there is a very simple way, such as set up a proxy server, and run the game application equipment, such as mobile wifi setting agent to the proxy server,,
Then grasp software package on the proxy server to use a proxy server proxy connection line,

As for resources, encryption, this certainly is in the client code, can only be decompiled, or reverse the client code, this requires experience and luck

CodePudding user response:

reference 6 buildings faint a leisurely yo reply:
as for packet caught, there is a very simple way, such as set up a proxy server, and run the game application equipment, such as mobile wifi setting agent to the proxy server,,
Then grasp software package on the proxy server to use a proxy server proxy connection line,

As for resources, encryption, this certainly is in the client code, can only be decompiled, or reverse the client code, this requires experience and luck

Do you have any qq I want to ask you some questions,,
  • Related