Penetration Testing mailing list archives
perl2exe compiled perl
From: LordDoskias <lorddoskias () gmail com>
Date: Sat, 05 Jan 2008 22:25:47 +0200
Hello and best wishes for the new year ;)Now, I have a file compiled with perl2exe and I want to extract the original perl source code. A search with google, revealed that earlier versions of the aforementioned program used Bogocrypt(XOR) for "encrypting the files, unfortunately newer version seem not to use XOR because using what is mentioned on http://www.net-security.org/vuln.php?id=2464 didn't work. Looking at http://web.archive.org/web/20030413002553/http://ddtm.simon-cozens.org/~simon/perl2exe I saw there were other 2 attack vectors - bytecode to plain text attack or the bytecode sitting in the interpreter's memory and therefore making it vulnerable to dumping and feeding it to B::Deparse
So I'm asking all the perl monks here is there an easier way and what it is. If not, can you give me some url explaining the process of dumping the memory and feeding it to B::Deparse. All other ideas are more than welcome.
Regards. ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- perl2exe compiled perl LordDoskias (Jan 08)
- Re: perl2exe compiled perl Peter Parker (Jan 14)