• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

odd xCrypt file to decrypt...

TheBluesMan

Junior Member
hey all,
have any of you mess'd around with the xCrypt program?

reason being,.. I got a file from a friend. this file was supposedly encrypted using xCrypt (actually, he said "doubly" encrypted it). this file is a .jpg, and there are none of the file extensions on the file that xCrypt usually puts. he also hinted at having used another program on it, though, the butthead wouldn't say which prog.

now, of course, I get the feeling that he just sent me a normal .jgp file and is pulling my leg about any sort of encryption.

can anyone offer any advice on this? thanks all 🙂
 
Open the fine in a hex editor / binary viewer and look at the first few bytes. Do the same with a file that is know to be a real xCrypt and compare.

Many file formats include recognizable patterns or even the format name in the first 16-32 bytes of data.

Or get a new friend 😉
 
ok ok...
I got a binary file viewer (actually, I think it's viewing the file in hex), and ran the .bmp through it..

now, what in the world should I be looking for???

I get a "grid-like" read out, 16 units across and down, with each unit being a 2 digit hex number. this is only one screen's worth.. I hit return, and I get the next screen (same description as 1st screen).

should I be translating the units into base-10 r' somthing? I ran both the original .bmp and the .bmp.enc through the program. I don't see any sort of readable description.

any help is appreciated..
mucho thanks-o
 
Any good binary viewer will have the hex grid AND the characters / letters for the bytes, e.g.

41 42 30 31 32 34 41 42 -and- A B 0 1 2 3 A B


If the "pattern" isn't obvious (look at a GIF image as binary to see what I mean) then open -2- known good xCrypt files and see what they have in common for the first few lines, then compare that to your (evil) firend's file.
 
Back
Top