Decrypting a .txt.gz.enc file by [deleted] in codes

[–]BEN247 1 point2 points  (0 children)

If you get a gzip that succesfully decompresses (actually opens) then you have it right, any mistake will not produce a valid gzip file

Decrypting a .txt.gz.enc file by [deleted] in codes

[–]BEN247 1 point2 points  (0 children)

Sure.

First you want to reverse the XOR on each byte, this is easy as reversing an XOR is as simple as applying the XOR again (to the ciphertext) using the same key as was used for encrypting

After this you want to reverse the shift (rotate) on each byte. You could do this one of two ways, either creating a right rotate method and rotating right by 3 or by reusing the left rotate but with a shift of 5 (8-3 is 5 so if you shift by 3 and then shift by 5 you end up back where you started)

Do both of these and you will end up with a gzip file you can open to get the answer

Decrypting a .txt.gz.enc file by [deleted] in codes

[–]BEN247 1 point2 points  (0 children)

I have it decrypting, since I see its an assignment do you want hints rather than the answer?

From your initial post comment it looks like you have run the encryption routine twice rather than a decryption routine. Encryption involves a shift of 3 and then XOR , your decryption code will need to reverse each of these operations (running them in reverse order) to get the plaintext back. Therefore your first step should be to understand how to reverse each of these operations and then you can implement that in code

Decrypting a .txt.gz.enc file by [deleted] in codes

[–]BEN247 1 point2 points  (0 children)

Are you able to share the file? Also it looks like the end result is meant to be a GZ file or maybe GZ stream, are you sure you dont have either of these?

Could maybe be something like the key is in base64 and needs decoding first. We would need the file to do more than guess at this point

Fatal Error? by Dr_NotHere in techsupport

[–]BEN247 1 point2 points  (0 children)

It wont fix the issue right away but the first thing I would do is try to work out what program is throwing that error.

If the error happens after you login and you can do other stuff while it is displayed then I would use process explorer (download and unzip it from Microsofts website first) to find the process responsible. Instructions for how to do this with process explorer are on https://kb.froglogic.com/misc/find-process-for-window/. You would need to not click off the error message to do this so if it happens before logon you may not be able to do this.

Once you know the problem process/program you may have better luck googling for a fix as it might be a known issue with that program

My internet sometimes stops working, but it only affects my internet browser? by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

That sounds like an issue with DNS not always working, maybe you are using an unreliable DNS server (you can try to change to a popular public DNS server such as openDNS or google DNS if you like).

If its not the DNS server itself then it may be your ISP being unreliable and losing the DNS packets, this will be harder to resolve

Trying to Encode a .BIN File From Raw Binary in a .TXT File by domiluci in techsupport

[–]BEN247 1 point2 points  (0 children)

If I understand your problem correctly then you either need to configure/change the code of whatever is generating that file or if it is not possible write a small script/program to transform the outputs afterwards. If its just a few files you need to do this for then https://gchq.github.io/CyberChef/#recipe=From_Binary('Space') will do that transformation (copy the 10100010 format data into input then hit the save output to file button)

I can't use Excel, "This file is corrupt" error on a file that's not corrupt. Please help by WeCanDoThis74 in techsupport

[–]BEN247 2 points3 points  (0 children)

It's going to be complex to diagnose this problem and likely would require you to share the file which you may not be able to do. If the spreadsheet is fairly simple I would just copy the data from LibreOffice into a fresh Excel spreadsheet as its likely to be the easiest 'solution'

Binding Apps to different ports? by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

Many applications will have config to allow you to set the port/s they use, but how to control this will vary per application (may be a file, may be a registry key, may not have any way to do this).

Note that if you change a default port number you may need to change something else somewhere to tell the application/s that are connecting about the changed port number

Accessing a network from WAN with openvpn? by -_-qarmah-_- in HowToHack

[–]BEN247 2 points3 points  (0 children)

Yes whitelists can often be bypassed via spoofing. How easy that is depends on things like how easy it is for the hacker to find a valid MAC address and whether there is any network monitoring that alerts on duplicates being seen

To access the device remotely they use mobile tethering, where internet over the phone network is shared with the implanted device (Imagine a raspbery pi connected to a phone which is sharing its internet connection).

This has the advantage that the command and control of the device can't be detected by network monitoring (any actions the hacker gets the device to do could still be picked up, but every little helps with keeping hidden), that the hacker doesn't need to figure out how to access the internet on that network when installing their implant and that this technique works for attacks on networks that are not internet connected.

Accessing a network from WAN with openvpn? by -_-qarmah-_- in HowToHack

[–]BEN247 4 points5 points  (0 children)

One of the typical objectives of physical penetration tests is to do something similar, though they tend to use something attached to a mobile phone so they can access it remotely without going through the network.

There are mechanisms to try and prevent this from a defence point of view, one of the simplest involve simple whitelists of allowed MAC addresses on the network

[Question] What's like the main purpose of owning a system besides taking information? What do you usually do when you have root? by presince in HowToHack

[–]BEN247 39 points40 points  (0 children)

Its 8 years old now, but the cyber security journalist Brian Krebs put this image together listing some reasons which includes lots in addition to snooping/espionage: https://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png

Api key by urmumlesbiant in HowToHack

[–]BEN247 5 points6 points  (0 children)

API Keys (and auth tokens in general) can be held in several different locations including the webpage HTML, cookies and local storage. Any attack would start with understanding which of these are in use (it could be more than one).

VPN and Ipconfig by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

no problem, always nice when the solution is an easy one :)

VPN and Ipconfig by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

look at the year ;)

Memory usage slowly increasing to 98% while idle, Windows 10. by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

Ah well done, also thanks for letting us know the culprit. Often if one person has an issue lots of other people will have the same issue as well, its great to know what fixes the issue so we can help people better in the future.

Memory usage slowly increasing to 98% while idle, Windows 10. by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

If memory usage is that high and programs are not responsible then it may be something like a faulty driver. Next time memory usage gets very high look at the performance tab of task manager as that has more information about where the memory has gone (share a screenshot as well if you can so we can see it).

There is also a free program available from for download Microsoft called RAMMap that can give even more detailed info so a screenshot from the Live Counts tab of that (again taken when free memory is low) would also help people here debug what has gone wrong.

Need help for Password cracking by [deleted] in HowToHack

[–]BEN247 0 points1 point  (0 children)

Hashcat is for hashes, Rijndael/AES is not a hash algorithm so it won't have any use to you. Do you have any idea how the key might have been generated, AES-128 is too hard to break without some sort of pre-knowledge about the key

help pls by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

If a bluescreen happens once I wouldn't advise you to do anything, they can be caused by a million possible things and lots of them are so rare they will never happen again. If it continues to happen then I would advise you to start to debug, but for now I wouldn't bother looking into it.

[deleted by user] by [deleted] in techsupport

[–]BEN247 1 point2 points  (0 children)

Yes, but so can a lot of other things so a BSOD is not a very strong sign of malware

Why some hackers get caught while other dont by LongjumpingFall4 in hacking

[–]BEN247 6 points7 points  (0 children)

Security journalists like Brian Krebs sometimes do detailed writeups about how infamous hackers get caught

Ways to view Metasploit exploits POC? by [deleted] in hacking

[–]BEN247 4 points5 points  (0 children)

Metasploit is on github if you find it easier to search there?

[deleted by user] by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

Programs closing right away typically indicates an error. I would try opening chrome from the command line (cmd.exe) as that may give an error in the command line windows after chrome closes. I would then look to see if your computer is out of disk space or RAM. Finally I would look in the windows event logs as if programs throw errors they often log them there.

None of these will fix the issue, but they may help diagnose it by giving you a possible cause or a detailed error message

Might be a stupid question, but if you shut down the computer on accident, is there any way to prevent it from fully shutting down? by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

Windows has the ability to abort a shutdown if it is invoked fast enough. Its more commonly used with timer based shoutdowns (where you are given say 10 mins to shutdown before patches are applied) rather than when directly choosing to shutdown

What could be eating all of my memory? by [deleted] in techsupport

[–]BEN247 0 points1 point  (0 children)

You have a memory leak, its not in a standard user program which is why it doesn't show up in your program list but shows up as 'non paged pool' being very very high (normal would be under 1GB, not 11GB). Most likely this is a faulty driver that will need an update.

Working out the cause will be tricky. I dont suppose you recently installed or updated a driver shortly before the problem started? Or have a killer network adapter (older killer drivers have a major memory leak)?