Solved

Encrypted file

Posted on 2013-01-30
8
166 Views
Last Modified: 2013-01-31
Hi experts,

Have any idea how to decrypt this?

some code
0
Comment
Question by:jebbie635
  • 4
  • 4
8 Comments
 
LVL 84

Expert Comment

by:ozo
Comment Utility
See if
  file
can identify the file type
Run
  strings
on it to see the printable text
0
 

Author Comment

by:jebbie635
Comment Utility
The file has no extension. Please tell me how to run strings.
0
 

Author Comment

by:jebbie635
Comment Utility
Ok i ran this

strings -ao -n 1 -t o filename

How does the result help? I want it decrypted.
0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
When you ran
 file filename
what kind of file did it think it was?
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:jebbie635
Comment Utility
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.2.5, not stripped
0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
You might try executing it. (maybe in a sandbox if you're afraid it does something malicious)
Or use a decompiler.
I'm not sure what you have available, but gdb might do for a start.
0
 

Author Comment

by:jebbie635
Comment Utility
I need to see the whole source. How do i do that?
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
Comment Utility
You may need to contact the author for the whole source.
the strings output may supply some leads on how to contact the author.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
build html 5 client that connect to indy Tidtcpserver 3 295
sumHeights  challenge 17 60
count7 challenge 12 67
mapBully challenge 6 88
How to remove superseded packages in windows w60 or w61 installation media (.wim) or online system to prevent unnecessary space. w60 means Windows Vista or Windows Server 2008. w61 means Windows 7 or Windows Server 2008 R2. There are various …
If you haven’t already, I encourage you to read the first article (http://www.experts-exchange.com/articles/18680/An-Introduction-to-R-Programming-and-R-Studio.html) in my series to gain a basic foundation of R and R Studio.  You will also find the …
This tutorial explains how to use the VisualVM tool for the Java platform application. This video goes into detail on the Threads, Sampler, and Profiler tabs.
The goal of the video will be to teach the user the difference and consequence of passing data by value vs passing data by reference in C++. An example of passing data by value as well as an example of passing data by reference will be be given. Bot…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now