Jump to content

How to decrypt an encrypted .dll file with GDB gcore (Root & ARM only)


ThePianoGuy

4 posts in this topic

Recommended Posts

Updated
Hi there,

 

 

 

 

I will show you how to decrypt and encrypted .dll file (when trying to MOD Unity based Android games) using Gcore dump and WinHex.

 

 

 

 

 

Before we start, how to check if a .dll file is encrypted?

 

 

 

 

 

Easy. When you open a .dll file into Reflector and you get:

 

 

 

 

 

"Assembly-CSharp (this could change, depending on the name of the file), File is not a portable executable. DOS header does not contain 'MZ' signature."

 

 

 

 

 

it means you have got an encrypted DLL!

 

 

 

 

 

See image:

 

 

 

 

 

Mt9bkqf.png

 

 

 

 

 

It means the DLL file does not have a valid MZ/PE header so you can't open/modify it. DLL files require MZ/PE headers in order to view its content and, to prevent hacking, some game developers protect their game erasing these MZ/PE headers from some dll files.

 

 

 

 

 

Now let's start with the requirements!

 

 

 

 

 

First of all, you need:

 

 

1. To have some Android Hacking experiences (otherwise you will not understand a single word of this Topic)

 

 

2. A rooted Android device

 

 

3. .NET Reflector or JustDecompile installed on your computer (if you've got hacking experience, you should already have this tool)

 

 

4. A computer running at least Windows XP

 

 

5. A Rooted Android device (Works with BlueStacks) running Android 4.2.2 and newer versions. Previous version might not work.

 

 

Works with Bluestacks. Custom roms with Android 4.2.2+ based are supported

 

 

6. At least 1 GB of RAM on your Device. A minimum of 300-400 MB free RAM space is required

 

 

7. Latest verison of SuperSU or other Superuser apps

 

 

8. BusyBox for Android. Get it from HERE

 

 

9. Terminal app for Android. You can download it from HERE

 

 

10. gcore installed on your device. Download it from: HERE

 

 

11. Any file explorer app installed on your Android device. I'd recommended X-plore

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

55NjVLk.jpg

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PtsKJ2l.pngVWiprRv.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

oMPbxeI.jpg

 

 

 

 

 

 

 

 

 

 

 

 

VEKB0Zp.png

 

 

 

 

 

 

 

 

 

 

 

 

dH2dx7q.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

su

 

 

 

 

 

 

 

 

 

 

YwQuPVl.png

 

 

 

 

 

 

 

 

 

 

 

root@[member='YourName'] #

 

 

 

 

 

 

 

 

fIzHnqp.png

 

 

 

 

 

 

 

 

 

 

 

dumpsys meminfo

 

 

 

 

 

 

 

 

 

 

or

 

 

 

 

 

 

dumpsys meminfo | grep com.*

 

 

 

 

 

 

 

 

 

 

or

 

 

 

 

 

 

dumpsys meminfo | grep th.*

 

 

 

 

 

 

 

 

 

 

UynNHbb.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

118740 kB: com.nhnent.SKQUEST (pid 383 / activities)

 

 

 

 

 

2f4kK8y.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

gdb -pid xxxxx

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

BjM722D.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(gdb)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

chmod 777 /system/bin/gdb && chmod 777 /system/bin/gdbserver

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

gcore /sdcard/anynames

 

 

 

 

 

 

 

 

 

 

evw3QCI.png

 

 

 

 

 

 

 

 

 

 

 

 

 

daIMwGJ.png

 

 

 

 

 

 

 

 

 

 

 

Saved corefile /sdcard/xxxxxxxx

 

 

 

 

 

1k2XoSb.png

 

 

 

 

 

 

 

 

 

 

 

 

qu0dUi6.jpg

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

21XDniJ.jpg

 

 

 

 

 

 

 

 

 

 

KyVpF3A.jpg

 

 

 

 

 

OR

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1zZ2okI.pnglDxOJBM.png

 

 

 

 

 

 

 

 

 

 

BLAMO2F.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

vwiY6Sl.jpg

 

 

 

 

 

 

 

 

 

 

G1TXfOH.png

 

 

 

 

 

 

 

 

 

 

nABBcma.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

HfbJdcY.png

 

 

 

 

 

 

 

 

 

 

AR43Mxe.jpg

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

MsPP0tr.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

eDtKnU0.png

 

 

 

 

 

 

 

 

 

 

 

Assembly-CSharp.dll

Assembly-CSharp-firstpass.dll

Assembly-UnityScript.dll

Assembly-UnityScript-firstpass.dll

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

mZB1PnI.png

 

 

 

 

 

 

 

 

 

 

 

Assembly-CSharp.dll = 000034.dll

Assembly-CSharp-firstpass.dll = 000030.dll

Assembly-UnityScript.dll = 000028.dll

Assembly-UnityScript-firstpass.dll = 000013.dll

 

 

 

 

 

 

 

 

 

 

B0CD3jO.png

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

AndnixSH

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Archived

This topic is now archived and is closed to further replies.

×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines