Reverse Engineering for Beginners

(avery) #1

CHAPTER 84. PRIMITIVE XOR-ENCRYPTION CHAPTER 84. PRIMITIVE XOR-ENCRYPTION


84.2 Simplest possible 4-byte XOR encryption


If a longer pattern was used for XOR-encryption, for example a 4 byte pattern, it’s easy to spot as well. For example, here
is the beginning of the kernel32.dll file (32-bit version from Windows Server 2008):


Figure 84.3:Original file
Free download pdf