WebApp Sec mailing list archives
RE: ArtistScope
From: "Yvan Boily" <yboily () seccuris com>
Date: Fri, 20 Aug 2004 17:13:14 -0500
It may be of debatable legality in your jurisdiction, however reverse engineering starting from the disassembled code for the SecureImage java applet that is used to view the .class file on the client should reveal some fairly easy to decipher code that would reveal the complete algorithm. One would imagine that given the class file, the algorithm, and the lack of a secret key, it should be trivial to write a decoder. This is of course, assuming that you would not be breaking any laws or license agreements in doing so ;) (No license agreement is presented when the Java applet is loaded, nor is one implied or provided in the package when you download it to view an image. Yvan Boily
-----Original Message----- From: Sajeeva S. Arangalla [mailto:flyguy () sajeeva net] Sent: Thursday, August 19, 2004 4:28 PM To: webappsec () securityfocus com Subject: Re: ArtistScope Well i am (and also everyone else) aware of the screen capture. Since this is the first thing that anyone would do try to get the images :). But the prob is that some web masters use annoying java running test in front of the imagine .. this can be done using Artist Scope Secure Image. So when u capture it like that u and up with a image full of garbage in the middle !!! Of course u can use Photoshop to fix it .. but it's lot of work and not worth the time ... So that's why i am interested in decoding the .class file. There should be a way to extract the image inside these class files right ??? SSA
Current thread:
- ArtistScope Sajeeva S. Arangalla (Aug 19)
- Re: ArtistScope Ivan Krstic (Aug 20)
- Re: ArtistScope Denis Pankratov (Aug 20)
- Re: ArtistScope Ian (Aug 20)
- Re: ArtistScope E.Kellinis (Aug 21)
- <Possible follow-ups>
- Re: ArtistScope Sajeeva S. Arangalla (Aug 20)
- RE: ArtistScope Yvan Boily (Aug 21)
- Re: ArtistScope Edward Miller (Aug 20)