Home page logo
/

pen-test logo Penetration Testing mailing list archives

perl2exe compiled perl
From: LordDoskias <lorddoskias () gmail com>
Date: Sat, 05 Jan 2008 22:25:47 +0200

Hello and best wishes for the new year ;)


Now, I have a file compiled with perl2exe and I want to extract the original perl source code. A search with google, revealed that earlier versions of the aforementioned program used Bogocrypt(XOR) for "encrypting the files, unfortunately newer version seem not to use XOR because using what is mentioned on http://www.net-security.org/vuln.php?id=2464 didn't work. Looking at http://web.archive.org/web/20030413002553/http://ddtm.simon-cozens.org/~simon/perl2exe I saw there were other 2 attack vectors - bytecode to plain text attack or the bytecode sitting in the interpreter's memory and therefore making it vulnerable to dumping and feeding it to B::Deparse

So I'm asking all the perl monks here is there an easier way and what it is. If not, can you give me some url explaining the process of dumping the memory and feeding it to B::Deparse. All other ideas are more than welcome.

Regards.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]