4 comments

  1. DawnWJPDewhuya · December 14, 2014

    Admiring the commitment you put into your website and in depth information you offer. It’s great to come across a blog every once in a while that isn’t the same out of date rehashed information. Fantastic read! I’ve saved your site and I’m including your RSS feeds to my Google account.

  2. Bkoenig · December 14, 2014

    I just wanted to thank you for this analysis and offer an enhancement to your script. I modified the ‘a = string1’ to ‘a – raw_input(“Please enter a: “)’, and the same for b, this way you don’t have to edit the script each time you run it. Also the output is Hex that needs to be converted to ascii, which I did by modifying the last lines in the script as follows:

    ….
    xored = xor_strings(binary_a, binary_b).encode(“hex”)
    hexed = xored.decode(“hex”)
    print “Hex_Output: %s” % xored
    print “Ascii_Output: %s” % hexed
    …..

    With the above it will output as follows:
    $python /tmp/decrypt.py
    Please enter a: 3539120A3D592721070A381407251E093F
    Please enter b: 665177
    Hex_Output: 5368656c6c2e4170706c69636174696f6e
    Ascii_Output: Shell.Application

    Hope this helps you as it certainly helped me.
    -Ben.

  3. Pingback: OfuscaciĆ³n de malware en macros de MS Office
  4. Jose · December 14, 2014

    One question when you will finish your articles of securityinsider you are very nice and it’s useful for learning more about security thx