Solved

Encrypted file

Posted on 2013-01-30
8
177 Views
Last Modified: 2013-01-31
Hi experts,

Have any idea how to decrypt this?

some code
0
Comment
Question by:jebbie635
  • 4
  • 4
8 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 38838268
See if
  file
can identify the file type
Run
  strings
on it to see the printable text
0
 

Author Comment

by:jebbie635
ID: 38838456
The file has no extension. Please tell me how to run strings.
0
 

Author Comment

by:jebbie635
ID: 38838568
Ok i ran this

strings -ao -n 1 -t o filename

How does the result help? I want it decrypted.
0
 
LVL 84

Expert Comment

by:ozo
ID: 38838961
When you ran
 file filename
what kind of file did it think it was?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:jebbie635
ID: 38839114
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.2.5, not stripped
0
 
LVL 84

Expert Comment

by:ozo
ID: 38841466
You might try executing it. (maybe in a sandbox if you're afraid it does something malicious)
Or use a decompiler.
I'm not sure what you have available, but gdb might do for a start.
0
 

Author Comment

by:jebbie635
ID: 38841968
I need to see the whole source. How do i do that?
0
 
LVL 84

Accepted Solution

by:
ozo earned 500 total points
ID: 38841985
You may need to contact the author for the whole source.
the strings output may supply some leads on how to contact the author.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
why to use string 10 60
haveThree challenge 22 112
tenRun challenge 28 88
rhino JavaScript import, load 25 66
Navigation is an important part of web design from a usability perspective. But it is often a pain when it comes to a developer’s perspective. By navigation, it often means menuing. This is less theory and more practical of how to get a specific gro…
How to remove superseded packages in windows w60 or w61 installation media (.wim) or online system to prevent unnecessary space. w60 means Windows Vista or Windows Server 2008. w61 means Windows 7 or Windows Server 2008 R2. There are various …
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.
The viewer will learn how to pass data into a function in C++. This is one step further in using functions. Instead of only printing text onto the console, the function will be able to perform calculations with argumentents given by the user.

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now