ShCiPwA
April 3rd, 2005, 03:04
Hi, i am currently trying to recreate a program used to open up a firewall using a username and password, the problem is not the login details, but the program. It is large and intrusive, and requires that you be logged in to access the resources of the servers. This is quite a hastle to have to open it up everytime you want to use it. It would be much easier if the program would sit down in your system tray and penetrate the firewall with a valid login, but leave the accessing of resources to better programs.
That is simply what i want to create, logins can be created feely, but there is a built in challenge response code similar to a Name / Serial key generation done by the program. for example:
1
Challenge: "fqzzywoevmzrzzlg"
Response: "riejkhfsmlv"
2
Challenge: "jzlvypwkqewaoith"
Response: "uilsqhrpenb"
These are 2 examples of server sending a challenge and program responding with authentication code. I have been working on reverse engineering the algo from the asm code, but it is quite complex and i have only been learning asm for a few days. The task seems beyond me. I have narrowed it down to about 50 lines of asm where the manipulation is done, that i am sure of. But I cant seem to make sense of what the code does.
I was wondering if:
A: There is a mathematical process to derive the algo?
or
B: There is some sort of translator to make the asm more understandable, eg to pseudo(spelling) code or a c like layout?
I am quite experienced in alot of higher level languiges, and just cant make the connection.
if there is some nice person who is fluent in asm that could have a quick breese through the code to tell me where i should be heading / make some sense of it / tell me if its a too big task, i will attach the asm that does the calc.
Any input on the subject would be usefull
Thanks, ShCiPwA
That is simply what i want to create, logins can be created feely, but there is a built in challenge response code similar to a Name / Serial key generation done by the program. for example:
1
Challenge: "fqzzywoevmzrzzlg"
Response: "riejkhfsmlv"
2
Challenge: "jzlvypwkqewaoith"
Response: "uilsqhrpenb"
These are 2 examples of server sending a challenge and program responding with authentication code. I have been working on reverse engineering the algo from the asm code, but it is quite complex and i have only been learning asm for a few days. The task seems beyond me. I have narrowed it down to about 50 lines of asm where the manipulation is done, that i am sure of. But I cant seem to make sense of what the code does.
I was wondering if:
A: There is a mathematical process to derive the algo?
or
B: There is some sort of translator to make the asm more understandable, eg to pseudo(spelling) code or a c like layout?
I am quite experienced in alot of higher level languiges, and just cant make the connection.
if there is some nice person who is fluent in asm that could have a quick breese through the code to tell me where i should be heading / make some sense of it / tell me if its a too big task, i will attach the asm that does the calc.
Any input on the subject would be usefull
Thanks, ShCiPwA