Dear,

A short reaction on this soapbox.

  • RE-LLigetfa: decrypt in batch that a memory dump would defeat it.
    - people who analyze memory dumps aren't normal users. kacking of any
    program is always possible. TIP: only not existing programs are secure.
    Richard Howarth calls it: a sophisticated user.
    Popovk tals about: You have users, not hackers.
    - it is true to create a high encruption to reduce possible
    attacks, but it is also important that a decryption doesn't cost
    too much time.
  • RE-GCrumply: passing passwords to scripts as command line arguments
    This isn't necessary. We have think about some modifications to our
    tool codec.exe, which will personalize your CODEC version.
    Suggestion 1:
    By such a personalizing we think about f.e. domain-name or other
    unique element of your environment.
    During the encryption with this personalized version and YOUR password
    a file will be created, which can only decrypt with CODEC when the
    environment is correct. Reason: environment characteristics and password
    will be inserted as scramble information on random locations in your
    encrypted file and the general version of CODEC recognized this additio-
    nal information. So you can keep your personalized version secure.
    Benefit
    code:

    copy such encrypted file isn't interesting because such script can't never
    be decrypted in another environment.


    Possible problem is by using of kixtart call command (see later
    for a suggestion about the possibility of reading plain text scripts or
    one-way encrypted scripts by kix32.exe).
  • RE-CJ: used passwords that do not look like passwords
    Such way of thinking we like, but by the usage of username + passwords in
    f.e. BAT file we encrypt it with BAT2EXEC + SECURE21 andin f.e. kix-scripts
    we do it with CODEC + Compress.
  • RE-Richard Howarth: generates a self decrypting executable
    - you can use any location for your temporary decrypt scripts. It isn't
    necessary to use the %temp% location.
    Suggestion 2:
    create a BAT file which decrypts your script and runs script by
    kix32.exe. the location of source and destination are possible
    unexpected location on your server and clients.
    with BAT2EXEC + SECURE21 we make those information secure.
    See topic:
    http://kixtart.org/cgi-bin/ultimatebb.cgi?ubb=get_topic&f=1&t=002750 how to make your script secure
    - In another topic we mention a possible SECURITY LEAK for kix32.exe
    Problem: how can an user steel your script.
    Simple: when an user can replace the kix32.exe file. it is easily to
    read the script file and write it to a floppy-disk. the input for kix32.exe
    will never be an encrypted file. it is plain text.
    Most user can have problems with a script file with very very long lines.
    Special tricks must be done to read in such cases all lines.
    Also it is easily to catch parameters which were added by the kix32.exe
    call.
    Suggestion 3:
    A self decrypting executable with kix32.exe and script included
    can be a good solution.
    Popovk talks about: it would be completly independant (an EXE file
    created by a builder which combine kix32.exe and specified script file[/i]
    See topic
    http://kixtart.org/cgi-bin/ultimatebb.cgi?ubb=get_topic&f=1&t=002053 security leak
  • RE-Shawn: MCA mentioned that VBScript (WSH) has an encryption feature.
    Indeed it was a topic, but we discover that it doesn't its work very well and
    also the way of encryption is very poor.
    Also in a topic we warn that such encrypted file can be hacked easily.
    For us is the way of encryption/decryption by VBScript not an acceptable
    result.
  • RE-Richard Howarth: a trojan KIX32.EXE which simpy prints the script rather than running it.
    Suggestion 4:
    code:

    encrypt your scripts with an additional program (one-way)
    and
    make it possible that kix32.exe can handle plain text scripts or an encrypted scripts.

    possible kixtart CALL commands can also handle both script files.
    temporary files are not necessary by such method.



    Benefit: for a torjan KIX32.EXE is an one-way encryption not interesting.
    Only the released KIX32.EXE program can decrypt your encrypted file and he
    isn't using any temporary file at all.

We hope that above suggestions and reactions give Ruud more ideas.
Greetings.


See also topic
http://kixtart.org/cgi-bin/ultimatebb.cgi?ubb=get_topic&f=4&t=000093 one-way encryption

_________________________
email scripting@wanadoo.nl homepage scripting@wanadoo.nl | Links | Summary of Site Site KiXforms FAQ kixtart.org library collection mirror MCA | FAQ & UDF help file UDF kixtart.org library collection mirror MCA | mirror USA | mirror europe UDF scriptlogic library collection UDFs | mirror MCA