![]() ![]() ![]() 2019.06.23~24, people on Reddit followed this path, and sorted out all the keyphrases used in IDA installation packages.Although the algorithm changed in IDA pro 7.3(2019.06.14), this is still a very educational reverse write-up. 2019.01~2019.06.21, Taiwanese people from devcore tried their best to solve the install package decryption, and they succeeded, in a very creative way.Even if the license file’s there, the installation package was yet to be decrypted. It belongs to “Octavian Dima”, and was not found on the internet until ~2019.06.24. Somebody who’s responsible for the leak hid the license file paired for this distro. ![]() SHA1 for the executable: 17f4e6a959f92fcb9a58da53e5215a3f9df573cd However, no valid license was available - The ESET one, said to be accidentally uploaded to VirusTotal - was not suitable for this leaked distro. Efforts by CZC did pave a way for people in the future, though. Also, the RSA license checking algorithms changed in IDA pro 7.2 later this year. Unfortunately, no installation decryption key was reversed and leaked at the time. 2018.08, somebody called CZC wrote a program called IDA-Pro-KeyGen for IDA pro 7.1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |