[2010-05-18 00:04:42 UTC] meh its just a thought... [2010-05-18 00:07:21 UTC] Thoughts can turn into plans and plans can turn into disappointments. [2010-05-18 00:08:36 UTC] Going to meet Wily... I either have three or four extra lives. [2010-05-18 00:09:01 UTC] Make that five, I forgot about the one chilling at the entrance level. [2010-05-18 00:10:45 UTC] Or Six. This will be easy if I can stop being stupid for the next half hour. [2010-05-18 00:11:31 UTC] muhahahha [2010-05-18 00:12:39 UTC] Turtle generator dead. [2010-05-18 00:14:15 UTC] hhahah [2010-05-18 00:14:50 UTC] You won't think it so funny when we have to import turtles from now on. [2010-05-18 00:14:59 UTC] Those tariffs are going to be excruciating. [2010-05-18 00:16:43 UTC] Rock lobster.... I mean rock monster... dead... [2010-05-18 00:19:43 UTC] And now I've killed my three evil twins, two of which were holograms. [2010-05-18 00:21:25 UTC] :o [2010-05-18 00:24:19 UTC] Going into first Wily battle with nine extra lives. This isn't as hard as I thought it would be. [2010-05-18 00:26:19 UTC] WHAT? HE'S A DOLL WITH A SPRING FOR A HEAD? HOW COULD THIS HAVE POSSIBLY HAPPENED? [2010-05-18 00:28:02 UTC] Okay I won and had ten lives to spare. This exercise was stupid. [2010-05-18 00:30:21 UTC] MUAHAHHA [2010-05-18 00:31:08 UTC] seams that windoes cant hack wifi.... BUT IMA TRY >:( [2010-05-18 00:34:32 UTC] Trying often leads to positive or negative results. [2010-05-18 01:03:57 UTC] Voodoo programming: your compile fails, so you try again. [2010-05-18 01:04:04 UTC] Nothing's changed, but now it compiles. [2010-05-18 01:09:22 UTC] Hulls uptore spale chat, where we discuss what happens when submarines surface under wood ships. [2010-05-18 01:58:45 UTC] WHAT! [2010-05-18 01:58:58 UTC] A 15 MIN POST AND IT DOESN'T WORK!!!! [2010-05-18 02:00:05 UTC] Wargh [2010-05-18 02:02:09 UTC] never mind, he deleted the truck [2010-05-18 02:03:26 UTC] Was it rock of the bomb? [2010-05-18 02:03:39 UTC] I was kind of disappointed, I wanted to know what he said. [2010-05-18 02:04:14 UTC] I wonder if SuperJer caches replies that fail... [2010-05-18 02:04:43 UTC] so do I [2010-05-18 02:08:38 UTC] I was asking how to build a runtime crypter, but I've decided I'm done dealing with malware, so its irrelevant now. [2010-05-18 02:08:41 UTC] I wonder if he'll tell us. [2010-05-18 02:09:08 UTC] There are more exciting programming topics anyway! [2010-05-18 02:09:44 UTC] For instance, in the shower this [s]morning[/s] evening, I was thinking about how best to make a game of my own devising. [2010-05-18 02:10:00 UTC] Mostly based on X-COM but with quite a few differences. [2010-05-18 02:16:13 UTC] RB disagrees that Serpent or Blowfish is the right algorithm for a runtime [b]en[/b]crypter. [2010-05-18 02:16:25 UTC] I see [2010-05-18 02:16:36 UTC] I don't know what either of them are. [2010-05-18 02:16:43 UTC] I'm convinced that all you need is a good symmetrical block algorithm. [2010-05-18 02:16:58 UTC] I agree with you unconditionally. [2010-05-18 02:17:42 UTC] once it is [b]en[/b]crypted (with a good algorithm) then there is nothing to worry about. [2010-05-18 02:18:05 UTC] I'd use a one-time pad. [2010-05-18 02:19:19 UTC] Who cares if an AV picks it up, its [b]en[/b]crypted! The AV can't do anything about that. Sure it can delete it, put if it can't tell if it is malicious why would it delete it? [2010-05-18 02:19:27 UTC] but* [2010-05-18 02:19:40 UTC] heuristics? [2010-05-18 02:19:46 UTC] If it does funny things... [2010-05-18 02:20:00 UTC] Plus, at some point, unencrypted code will need to appear. [2010-05-18 02:20:10 UTC] but its encrypted [2010-05-18 02:20:21 UTC] Yes [2010-05-18 02:20:26 UTC] and I am not worried about the decrypted code [2010-05-18 02:20:40 UTC] At some point if you want to execute it then it will need to be unencrypted. [2010-05-18 02:21:34 UTC] yes, but that is all relative to you, doesn't matter what algorithm you use, if you use it wrong or "bad" then its your fault [2010-05-18 02:21:54 UTC] hmmm? [2010-05-18 02:22:17 UTC] if you tell the program to decrypt itself while the AV is scanning the computer you cannot blame the algorithm you are using [2010-05-18 02:22:37 UTC] What do you mean who cares if an AV picks it up? The entire point of crypting malware is so that AV's DONT pick it up. [2010-05-18 02:22:42 UTC] Well, theoretically the antivirus will be antivirusing all the time. [2010-05-18 02:23:21 UTC] Because then as soon as your malware does something, whatever that might be, it will likely be picked up by the antivirus. [2010-05-18 02:23:25 UTC] how are you going to do that? AV scans the entire hard drive. [2010-05-18 02:23:33 UTC] Not the HDD [2010-05-18 02:23:47 UTC] no that was to RB [2010-05-18 02:23:49 UTC] All code executed on a computer has to be loaded into RAM, yesno? [2010-05-18 02:24:03 UTC] ^^ [2010-05-18 02:24:41 UTC] So as soon as your unencrypted code is in memory - or even, best case, when it is executed, it will be discovered. [2010-05-18 02:24:51 UTC] As I said sprinkles, if you want to see how its done, look up how a runtime filecrypter works. [2010-05-18 02:25:49 UTC] most "good" "viruses" only decrypt the code that is need right then, so it is constantly decrypting and encrypting code, it doesn't decrypt all the code at once before it runs [2010-05-18 02:26:33 UTC] But then your AV can detect that kind of code and using heuristics work out that something funky is going on. [2010-05-18 02:26:56 UTC] Also that becomes diffcult to code - you need code that works out which code to decode. [2010-05-18 02:27:13 UTC] that's why most "viruses" are caught, and your computer is, mostly, safe. [2010-05-18 02:27:28 UTC] ... [2010-05-18 02:27:35 UTC] So what's your bleedin' point?! [2010-05-18 02:27:38 UTC] :p [2010-05-18 02:28:35 UTC] Tbh sprinkles, I think your arguing on something that you don't know much about. I took the liberty of looking this up for you, I haven't read it, but it looked decent http://sandsprite.com/CodeStuff/Build_your_own_executable_crypter.html [2010-05-18 02:29:30 UTC] My bleedin' point is that, when using a good algorithm, it doesn't matter how it encrypts it, whether asymmetrical, symmetrical, block, stream, or whatever, it is all dependent on how you implement it. [2010-05-18 02:30:01 UTC] Yes, I agree. [2010-05-18 02:31:44 UTC] My problems with that article already: it's very based on Windows, which is kind of fair enough. [2010-05-18 02:31:59 UTC] Next problem: 28k for Hello, World? [2010-05-18 02:32:07 UTC] Jesus titties christ. [2010-05-18 02:32:19 UTC] I don't give a fuck about how a runtime encryptor works, I care about how the algorithm is implemented. That is what will determine whether or not you program is detected or not by AV. [2010-05-18 02:33:36 UTC] Well, seeing as how your going to keep arguing with me no matter what I say, I'm out. I'll be on tomorrow, feel free to do lots of research in the emantime. Peace [2010-05-18 02:36:01 UTC] emantime! [2010-05-18 02:36:06 UTC] That sounds awesome [2010-05-18 02:37:30 UTC] I believe it is more of an obfuscator then an encryptor [2010-05-18 02:37:47 UTC] created multiple false entry-points [2010-05-18 02:38:03 UTC] creating* [2010-05-18 02:41:36 UTC] What? The link rockbomb made? [2010-05-18 02:42:25 UTC] He changed the entry point such that the first thing the program did was decrypt the program code, then muck around with the next instruction thingy so it went to the actual code. [2010-05-18 02:46:07 UTC] Ever looked at esoteric languages? [2010-05-18 02:49:39 UTC] I'm done with this. [2010-05-18 02:53:13 UTC] With what? [2010-05-18 02:53:15 UTC] D: [2010-05-18 02:54:14 UTC] This stupid runtime encryptor shit, and with the words "crypt," "cryptor." [2010-05-18 02:58:44 UTC] Coool. [2010-05-18 02:59:21 UTC] http://en.wikipedia.org/wiki/INTERCAL [2010-05-18 03:01:24 UTC] No, I am done. I am going to take out my frustration on some Middle Eastern kids with horrible ping. [2010-05-18 03:05:52 UTC] Lol, I wanna learn intercal, just for kicks. And sprinkles you shoulda clicked it and saw what it was before assuming what you think it might have been ;) [2010-05-18 03:10:42 UTC] I can also recommend looking at the underhanded C contest, it's fucking hilarious. [2010-05-18 03:10:49 UTC] For now I must be gone [2010-05-18 03:10:53 UTC] Crimefighting calls. [2010-05-18 03:27:50 UTC] I'm going to try to beat Mega Man 4 without continuing now. [2010-05-18 03:28:48 UTC] Yes, I know 2 would be the biggest challenge probably. You can go to hell. I don't feel like playing that one. [2010-05-18 03:57:15 UTC] Well, it was all going fine until I picked Dive Man out of order on accident and he hollowed out my skull and drank Pina Coladas out of that. [2010-05-18 04:24:11 UTC] What makes web pages load slowly? And do you know a web page that loads really slow? [2010-05-18 05:58:39 UTC] Nature: YOU CRAZY FOOL!! [2010-05-18 15:15:26 UTC] Like a VIRGIN! [2010-05-18 16:02:24 UTC] Always. [2010-05-18 17:12:02 UTC] ...sometimes? [2010-05-18 17:42:31 UTC] DR! [2010-05-18 17:53:17 UTC] Heyheyhey! [2010-05-18 18:09:42 UTC] How's it going? [2010-05-18 19:51:23 UTC] Rockbomb what the fuck man? [2010-05-18 20:07:45 UTC] huh? [2010-05-18 22:01:36 UTC] DR! [2010-05-18 22:31:41 UTC] you forgot a couple letters, I think you meant... DERP! [2010-05-18 23:25:46 UTC] how 'bout STFU. [2010-05-18 23:25:53 UTC] does that work for you? [2010-05-18 23:50:24 UTC] How about I go download 3ds max and model out my buggy? Does that work for you?