adplus-dvertising
frame-decoration

Question

How can you decipher the directory layout of Cryptex?

a.

By placing a breakpoint on the ReadFile API and tracing forward in the program.

b.

By restricting the ReadFile breakpoint to calls made on the archive file.

c.

By letting Cryptex run until it reaches the key-generation function and then stepping through the code until you reach interesting code areas that decipher the directory data structures.

d.

All of the above.

Posted under Reverse Engineering

Answer: (d).All of the above. Explanation:Multiple approaches to deciphering the directory layout, including placing a breakpoint on the ReadFile API and tracing forward, restricting the ReadFile breakpoint to calls made on the archive file, and letting Cryptex run until it reaches the key-generation function and then stepping through the code until you reach interesting code areas that decipher the directory data structures.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. How can you decipher the directory layout of Cryptex?

Similar Questions

Discover Related MCQs

Q. How can you reduce the number of calls when using a breakpoint on the ReadFile API?

Q. Where should you place your breakpoint in a real program to avoid tedious task of stepping through the program?

Q. What kind of compiler switch was most likely used to compile Cryptex?

Q. What is the purpose of the x command in Cryptex?

Q. Why is it important to reverse the extraction process in Cryptex?

Q. What is the purpose of the hash object created in the Cryptex file extraction routine?

Q. What type of algorithm is used to create the hash object in the Cryptex file extraction routine?

Q. What is the purpose of the "x command" in Cryptex?

Q. What is the purpose of the MD5 checksum in the Cryptex header?

Q. How is the triple-DES key generated in Cryptex?

Q. What algorithm does Cryptex use to encrypt its archives?

Q. What is the purpose of the 8-byte signature in the Cryptex header?

Q. What is the purpose of the 16-byte MD5 hash that ends up in the Cryptex header?

Q. What algorithm is used to encrypt all clusters in Cryptex archives?

Q. What is the maximum length of file names in Cryptex archives?

Q. How are unused entries in the Cryptex file list table indicated?

Q. What is the purpose of the MD5 hash stored in each file entry in the Cryptex file list?

Q. What is the size of a single cluster in Cryptex archives?

Q. How are clusters encrypted in Cryptex archives?

Q. What is the maximum length of a file name in Cryptex archives?