Jump to content

9 posts in this topic

Recommended Posts

Posted (edited)

Sorry to revive this topic, but I've been trying to work with this game for some time.

This game was built with cocos2d-x, so the main logic resides in LUA scripts.
The scripts have been compiled and encrypted, most likely with xxtea which is the default algorithm provided with cocos2d-x.

If you look at the luac files, they all begin with the string LAKYSIGN, which is the signature used by xxtea during encryption.
I've been trying to find the key to decrypt the files without success.

I've followed many tutorials but somehow the common methods used for findind the key in cocos2d games do not work with this game.
For instance, these are some of the things I've already tried:

  1. Using frida to intercept methods like setXXTEAKeyAndSign and luaL_loadbuffer, they are never called.
  2. Searching the main executable for the key ("LAKYSIGN") with a disassembler, it's not there or is probably hidden somehow!

If anyone wants to give it a try, you can get a decrypted IPA from the Decrypted App Store:
https://armconverter.com/decryptedappstore/Kings Throne

If you don't have access to the Decrypted App Store, I've also uploaded the main game executable and one of the luac files here:
https://mega.nz/folder/k8szHSgR#mmIpmmd5obaEF4vHTxFcxQ

 

Thanks!

Updated by Sputnik82
Update mega link
Posted
On 4/24/2022 at 8:51 PM, Sputnik82 said:

Sorry to revive this topic, but I've been trying to work with this game for some time.

This game was built with cocos2d-x, so the main logic resides in LUA scripts.
The scripts have been compiled and encrypted, most likely with xxtea which is the default algorithm provided with cocos2d-x.

If you look at the luac files, they all begin with the string LAKYSIGN, which is the signature used by xxtea during encryption.
I've been trying to find the key to decrypt the files without success.

I've followed many tutorials but somehow the common methods used for findind the key in cocos2d games do not work with this game.
For instance, these are some of the things I've already tried:

  1. Using frida to intercept methods like setXXTEAKeyAndSign and luaL_loadbuffer, they are never called.
  2. Searching the main executable for the key ("LAKYSIGN") with a disassembler, it's not there or is probably hidden somehow!

If anyone wants to give it a try, you can get a decrypted IPA from the Decrypted App Store:
https://armconverter.com/decryptedappstore/Kings Throne

If you don't have access to the Decrypted App Store, I've also uploaded the main game executable and one of the luac files here:
https://mega.nz/folder/k8szHSgR#mmIpmmd5obaEF4vHTxFcxQ

 

Thanks!

So u got it or na?

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines