Questions about this topic? Sign up to ask in the talk tab.

Cryptfuscate

From NetSec
Revision as of 06:53, 2 July 2012 by Gertie6661 (Talk | contribs) (Created page with "{{info|This perl script requires '''CBC::Blowfish'''. You can install '''CBC::Blowfish''' with CPAN. All other libraries are standard}} ==Description== ===Usage=== ...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
c3el4.png This perl script requires CBC::Blowfish. You can install CBC::Blowfish with CPAN. All other libraries are standard

Description

Usage

 perl ./cryptfuscate.pl

This script will generate a random encryption key with salt and encrypt text files using Blowfish and CBC. Cryptfuscate then encodes the text file in base 64. The idea of this script is to allow you to embed Perl modules in text files and encrypt them for execution by executer.pl, another script bundled with Cryptfuscate. Using Cryptfuscate and executer.pl, you no longer need to obfuscate Perl code. Without the correct key and salt, there is no way for local users to view your encrypted modules in plain text form leaving the function of you module unknown.

Upon execution of Cryptfuscate, you will be asked to pass multiple arguments. First you will be asked for the plain text module you wish to encrypt. Then, you will be asked the name in which you wish the encrypted module to be. Cryptfuscate will then generate a random key. You can utilize the random key by simply hitting return, or you can input your own key. Cryptfuscate will then use the same method for the salt.

Following creation of your encrypted module, place executer.pl and your encrypted module wherever you wish.

 perl ./executer.pl

executer.pl will ask for you to pass multiple arguments at runtime. You must first specify the path of your encrypted module. Then, you will be asked for the key and salt. Once all arguments are passed successfully, executer.pl will handle your encrypted module as a string, decrypt it, and execute the embedded code.