View Single Post
  #7  
Old 10-04-2013, 10:12 AM
gorilla.maguila gorilla.maguila is offline
Member
 
Join Date: Dec 2012
Posts: 62
gorilla.maguila is on a distinguished road
Default

Re: dumping Ilive.to


I've been thinking on it and I guess the most simple, feasible way would be to dissamble the swf put a "print" and assemble again.

For example in ilive.to's swf file we can see in assembly code:

Code:
 43   getproperty   	info //nameIndex = 249
 46   getproperty   	secureToken //nameIndex = 1823
 49   getlex        	undefined //nameIndex = 255
 52   ifeq          	L4

 56   getlocal0     	
 57   getproperty   	private::_connection //nameIndex = 239
 60   pushstring    	"secureTokenResponse"  //stringIndex = 2382
 63   pushnull      	
 64   getlex        	com.wowza.encryptionAS3::TEA //nameIndex = 1068
67   getscopeobject	1
69   getslot       	1
71   getproperty   	info //nameIndex = 249
74   getproperty   	secureToken //nameIndex = 1823
77   getlex        	_a_-_--- //nameIndex = 3047
80   pushint       	-1820302793	// 0x-6c7f9dc9
82   callproperty  	_a_--_-- (1) //nameIndex = 2444
86   coerce_s      	
87   callproperty  	decrypt (2) //nameIndex = 1782
91   callpropvoid  	call (3) //nameIndex = 195

Making a wild guess as I'm dont know match about actionscript translates to something like:

Code:
_connection.call("secureTokenResponse", null, TEA.decrypt(evt.info.secureToken, 	_a_-_---(-1820302793)));
Where _a_-_---() it's an obfuscated function. And maybe we can put something like trace(_a_-_---(-1820302793)) in assembly to show the computed token. (I think this method would also apply for coolsport)


@Telofy
I also work in linux and unfortunately there isn't much, you can try JPEXS Decompiler though. The best I've found it's Adobe swf investigator http://labs.adobe.com/technologies/swfinvestigator/

Last edited by gorilla.maguila : 10-04-2013 at 11:26 AM.
Reply With Quote