I've been thinking on it and I guess the most simple, feasible way would be to dissamble the swf put a "print" and assemble again.
For example in ilive.to's swf file we can see in assembly code:
Code:
43 getproperty info //nameIndex = 249
46 getproperty secureToken //nameIndex = 1823
49 getlex undefined //nameIndex = 255
52 ifeq L4
56 getlocal0
57 getproperty private::_connection //nameIndex = 239
60 pushstring "secureTokenResponse" //stringIndex = 2382
63 pushnull
64 getlex com.wowza.encryptionAS3::TEA //nameIndex = 1068
67 getscopeobject 1
69 getslot 1
71 getproperty info //nameIndex = 249
74 getproperty secureToken //nameIndex = 1823
77 getlex _a_-_--- //nameIndex = 3047
80 pushint -1820302793 // 0x-6c7f9dc9
82 callproperty _a_--_-- (1) //nameIndex = 2444
86 coerce_s
87 callproperty decrypt (2) //nameIndex = 1782
91 callpropvoid call (3) //nameIndex = 195
Making a wild guess as I'm dont know match about actionscript translates to something like:
Code:
_connection.call("secureTokenResponse", null, TEA.decrypt(evt.info.secureToken, _a_-_---(-1820302793)));
Where _a_-_---() it's an obfuscated function. And maybe we can put something like trace(_a_-_---(-1820302793)) in assembly to show the computed token. (I think this method would also apply for coolsport)
@Telofy
I also work in linux and unfortunately there isn't much, you can try JPEXS Decompiler though. The best I've found it's Adobe swf investigator
http://labs.adobe.com/technologies/swfinvestigator/