Level Flyff decryptor

11/25/2013 13:33 EclipseDecrypt#1
Hi all,

Today i release a decrypter for a small server shit :rolleyes:


They think all files was encrypt in AES... :D but ... :pimp: :mofo:

[Only registered and activated users can see links. Click Here To Register...]

Have fun !

VT : [Only registered and activated users can see links. Click Here To Register...] (0/47)
11/25/2013 19:57 Schulzie#2
WTH?...how to encrypt the 800mb file?
11/26/2013 01:41 EclipseDecrypt#3
is decryptor ...
11/26/2013 08:10 Schulzie#4
i dont understand this?!

i can read small Lvf-Files but i cant read the big one (830MB).
it crashed...
[Only registered and activated users can see links. Click Here To Register...]

how can i fix that?
11/26/2013 08:59 Jopsi332#5
It says your Ram is full
11/26/2013 10:05 Wanetrain#6
Quote:
Originally Posted by Jopsi332 View Post
It says your Ram is full
Also ich glaub eher dass dieses Shitty .NET tool zu wenig Ram zu gewießen bekomt und daher dass Tool OutOfMemory läuft, hat nichts mit deiner Verfügbaren Anzahl zutun.

Oder denkst du dass Minecraft auch bei mir 16G Ram verbraucht wenn es OutOfMemory rennt?
11/26/2013 13:42 EclipseDecrypt#7
It's for open Data.lvf, open the program and press Ctrl+O, search Data.lvf, and select files who want extract and Click -> Actions, Extraire la selection.
11/26/2013 22:27 felizob#8
Quote:
Originally Posted by naruto66620 View Post
No problem EclipseDrcrypt Level-Flyff for next Update change Cryptage for new files :)

[Only registered and activated users can see links. Click Here To Register...]

Amicalement,
Shinki Administrateur de Level-Flyff.
Who cares if you change to another sucky encryptation method, it will be easy to crack again.
11/26/2013 23:11 Ackselly#9
Quote:
Originally Posted by naruto66620 View Post
No problem EclipseDrcrypt Level-Flyff for next Update change Cryptage for new files :)

[Only registered and activated users can see links. Click Here To Register...]

Amicalement,
Shinki Administrateur de Level-Flyff.
Oh, that's awesome. Except you forgot one tiny fact; you didn't rip those armor sets, I did. And since I loathe leecher servers, I decided to rob your exclusiveness of those armor sets and release them to everybody. Have fun.

[Only registered and activated users can see links. Click Here To Register...]
11/26/2013 23:48 EclipseDecrypt#10
No prob for me, when your "new" encryption method will be implemented I would be happy to broken it and share the new decryptor...

kiss
11/27/2013 07:34 Schulzie#11
Quote:
Originally Posted by EclipseDecrypt View Post
No prob for me, when your "new" encryption method will be implemented I would be happy to broken it and share the new decryptor...
kiss
Thx! Im happy to read and still waiting ;)

@Jopsi332 & EclipseDecrypt:
how can i solve the Ram problem to decrypt the file? :(
11/27/2013 07:50 raventh1984#12
You need to make your own res extractor then. or maybe EclipseDecrypt can get the source of the res extractor so it can be fixed.
10/25/2014 23:05 aoyamananami#13
is there a new decrypter for level flyff?!?
because i cant open there .lvl file :3
10/27/2014 01:09 WinterWave#14
There is a decrypter for the new encryption method but not released yet, so nop you cannot decrypt it at the moment
10/28/2014 19:16 WurstbrotQT#15
It's quite easy, they got a keytable with 2048 values, the first 5 bytes to read are at the offset eof-60, the first byte is something like an encryption key identifier, the last 4 the typical header size.

After that, you have to continue reading the header from the start of the file and decrypt it with the normal bit manipulate function of offi but passing the value at position i, which is the current position of the header loop, or the 2048th element if the current loop counter exceeds the amount of values.

Reading that header is quite the same as reading an offi header without the version.

The before mentioned key identifier determines the key for the rest of the file (decrypting the contents).

0x0b turns into 0x63
0x16 and 0x2c into 0x12
0x21 into 0xf1
0x37 into 0xe2
0x42 into 0x98
0x4d into 0xa5
anything else: 0xc4

You can find the key table with every disassembler, should be the offset 0x00AFF9E8.