7/5/2023 0 Comments Hider 2 decrypt hvault![]() Hider2 is built upon the same concept by adding a sleek interface, system wide menu, and an AES-256 encryption system for all types of files and folders, as well as external drives. This application has received a major upgrade as compared to its predecessor MacHider, which let a user simply hide the files from public view by making it invisible. Hider 2 was initially launched at $20, but is now being offered for $10. There are countless overcomplicated ways to encrypt your files in order to protect your privacy, but MacPaw ( Mac Cleaner Software ), a software dev, has made it far easier to protect your files for an average Mac user. With the NSA fiasco a year ago, people are concerned over the security of their sensitive documents from privacy invaders. This software creates an encrypted digital vault, files once copied into the vault makes it invisible and inaccessible to everyone, but to the end user. Here is a simple script written by NinjaDoge24 that automates this whole process.Hider 2 provides a simple yet secure way to hide your files. ![]() Notice that only the initial bits are transformed, while the rest of the file remains the same. For example, in the above example, notice that only the first 128 bits are XOR-ed, and rest of the bits remain the same. So it’s all out there in the raw for the attacker to see. It is also discovered that the app performs this worthless encryption only for the first 128 bits of the user’s file, and stores the rest in plain format. Thus, an attacker who has access to the encrypted files just need to brute force XOR with 255 possible values to get the original files back! As explained by NinjaDoge24, here are some of the passcodes and their corresponding key values: What this suggests is, based on the passcode selected by the user, it generates a “key” (30 in this case) and just XORs the user’s file with this key! Upon investigation, it turned out that this key value is always between 00 and ff, which means 255 possible values.Now just XOR abc.png & the encrypted file:.Now see the HEX representation of this encrypted file:.As seen below, the file is stored with a. I used the adb pull command for this purpose. The next thing is to pull out this encrypted file to the local machine.But ‘ls’ with –a attribute would reveal all the hidden files, as shown in the following screenshot. So initially a simple ‘ls’ on the folder does not reveal anything. But these encrypted files are hidden from the user.Also at the above mentioned location, there is a text file saved by the app which says: How do I know this? Well just by looking at SQLite files in this case. These so called “encrypted” files are stored on the SD card at the location /mnt/sdcard/SystemAndroid/Data.This would mean the file apple.png is encrypted and should have been stored somewhere on the device. Now send the image to the NQ Vault using the app.You can use HEX Viewer tool to view an image’s hex representation. It uses sixteen distinct symbols, most often the symbols 0–9 to represent values zero to nine, and to represent values ten to fifteen. ![]() Note: HEX is a positional numeral system base of 16. Here is the HEX representation of the apple.png file:
0 Comments
Leave a Reply. |