Quote:
Originally Posted by surquizu
How do you get this data? : Blink:
|
I used a utility called XORSearch. Basically, feed it a file and a search string and it will list out all the locations that string is found in the file along with the XOR used to obfuscate the string. I run it from a batch file that passed the search string from the command line and pauses at the end of the search to give a chance to see the results.
For 3.1.1, running xorsearch.exe libnickel.so.1.0.0 ReadingFooter
Code:
Found XOR 00 position 1CDA20: ReadingFooterC1EP7QWidget
Found XOR 00 position 1CDD55: ReadingFooter7setTextERK7QString
Found XOR 00 position 1CF6E0: ReadingFooter7setFontERK7QString
Found XOR 00 position 1CFFB7: ReadingFooter6updateERK7QStringiibb
Found XOR 00 position 24E7BE: ReadingFooterD2Ev
Found XOR 00 position 24E7D6: ReadingFooter
Found XOR 00 position 24E7E9: ReadingFooterD1Ev
Found XOR 00 position 24E805: ReadingFooterD1Ev
Found XOR 00 position 24E822: ReadingFooterD1Ev
Found XOR 00 position 24E839: ReadingFooterD0Ev
Found XOR 00 position 24E855: ReadingFooterD0Ev
Found XOR 00 position 24E872: ReadingFooterD0Ev
Found XOR 00 position 24E889: ReadingFooter15getFooterMarginEv
Found XOR 00 position 24E8AF: ReadingFooter15setFooterMarginEi
Found XOR 00 position 24E8D5: ReadingFooterC2EP7QWidget
Found XOR 00 position 24E8F8: ReadingFooter7setupUiEP7QWidgetE11initialized
Found XOR 00 position 24E92F: ReadingFooter7setupUiEP7QWidgetE1c
Found XOR 00 position 24E95B: ReadingFooter7setupUiEP7QWidgetE11initialized_0
Found XOR 00 position 24E994: ReadingFooter7setupUiEP7QWidgetE1c_0
Found XOR 00 position 24E9C2: ReadingFooter7setupUiEP7QWidgetE11initialized_1
Found XOR 00 position 24E9FB: ReadingFooter7setupUiEP7QWidgetE1c_1
Found XOR 00 position 24EA25: ReadingFooter16staticMetaObjectE
Found XOR 00 position 24EA4B: ReadingFooter5eventEP6QEvent
Found XOR 00 position 24EA73: ReadingFooter5eventEP6QEvent
Found XOR 00 position 24EA95: ReadingFooter11changeEventEP6QEvent
Found XOR 00 position 2EF8D5: ReadingFooter10metaObjectEv
Found XOR 00 position 2EF8F6: ReadingFooter11qt_metacastEPKc
Found XOR 00 position 2EF91A: ReadingFooter11qt_metacallEN11QMetaObject4CallEiPP
Found XOR 00 position 2EF954: ReadingFooter
Found XOR 00 position 2EF968: ReadingFooter
Found XOR 00 position 115DF3C: ReadingFooter
Found XOR 00 position 11C57A0: ReadingFooter
Found XOR 00 position 11C580A: ReadingFooter
Found XOR 9C position 13FD538: ReadingFooter {..min-height: 70px;..max-height: 70
Found XOR 9C position 13FD58E: ReadingFooter[deviceCodeName="kraken"], .ReadingFo
Found XOR 9C position 13FD5B7: ReadingFooter[deviceCodeName="phoenix"] {..min-hei
Found XOR 9C position 13FD627: ReadingFooter[deviceCodeName="dragon"] {..min-heig
If I know the XOR key, I can also use another little program called XOR which reads in the first file, XORs it with the key and writes the result out.
I originally wrote a program similar to what ShellShock suggested but it was a pain searching through 256 files looking for a string manually and they took up a mass of disk space.
Regards,
David