yo guys, with a byte array wich is key you can decrypt some of xigncode log ^^
[ Key ]
[ How to decrypt ]
Basicaly all the encryption algorythm is XoRing every byte with a KEY, as far i got this every encrypted byte has it's own key
so for a single encrypted log file there is a message with a maximum size of 320 bytes.
First 68 bytes are HEADER
Other bytes are Log MESSAGE
here is a image of example below
[Only registered and activated users can see links. Click Here To Register...]
HEADER is always the same, it's never changing and it does NOT contain any sensetive information ^^
MESSAGE you start decrypting it with KEY, it won't work if you would start decrypt it with HEADER, you will get those junk bytes
Decryption Algorythm in program (will look something like this)
[ Some log i decrypted ]
[ Info ]
Remember, with this KEY you are not able to decrypt everysingle byte in log! ^^
please don't flame me hard, i've worked hard to get those bytes and trying to understood the algorythm ;)
[ Key ]
[ How to decrypt ]
Basicaly all the encryption algorythm is XoRing every byte with a KEY, as far i got this every encrypted byte has it's own key
so for a single encrypted log file there is a message with a maximum size of 320 bytes.
First 68 bytes are HEADER
Other bytes are Log MESSAGE
here is a image of example below
[Only registered and activated users can see links. Click Here To Register...]
HEADER is always the same, it's never changing and it does NOT contain any sensetive information ^^
MESSAGE you start decrypting it with KEY, it won't work if you would start decrypt it with HEADER, you will get those junk bytes
Decryption Algorythm in program (will look something like this)
[ Some log i decrypted ]
[ Info ]
Remember, with this KEY you are not able to decrypt everysingle byte in log! ^^
please don't flame me hard, i've worked hard to get those bytes and trying to understood the algorythm ;)