perl2exe compiled perl

From: LordDoskias (lorddoskias@gmail.com)
Date: Sat Jan 05 2008 - 15:25:47 EST


Hello and best wishes for the new year ;)

Now, I have a file compiled with perl2exe and I want to extract the
original perl source code. A search with google, revealed that earlier
versions of the aforementioned program used Bogocrypt(XOR) for
"encrypting the files, unfortunately newer version seem not to use XOR
because using what is mentioned on
http://www.net-security.org/vuln.php?id=2464 didn't work. Looking at
http://web.archive.org/web/20030413002553/http://ddtm.simon-cozens.org/~simon/perl2exe

I saw there were other 2 attack vectors - bytecode to plain text attack
or the bytecode sitting in the interpreter's memory and therefore making
it vulnerable to dumping and feeding it to B::Deparse

So I'm asking all the perl monks here is there an easier way and what it
is. If not, can you give me some url explaining the process of dumping
the memory and feeding it to B::Deparse. All other ideas are more than
welcome.

Regards.

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:18 EDT