Reverse Engineering for Beginners

(avery) #1

CHAPTER 84. PRIMITIVE XOR-ENCRYPTION CHAPTER 84. PRIMITIVE XOR-ENCRYPTION


Here it is “encrypted” with a 4-byte key:


Figure 84.4:“Encrypted” file

It’s very easy to spot the recurring 4 symbols. Indeed, the header of a PE-file has a lot of long zero areas, which are the
reason for the key to become visible.

Free download pdf