Hi everyone,
I have been trying to decrypt the config file for Ghost Recon Phantoms(the yeti.ini.enc)
But have so far been unable to decrypt it since I dont know the used algorithm or key. Since the latest version uses VMProtect I have not been able to reverse the game and look at the decryption procedure. Also the game seems to store interesting information in trace*.ucd files in the logs directory which seem to partially encrypted. I was wondering if anyone ever managed to decrypt one of these files? (Added yeti.ini.enc and 1 ucd file as attachment in zip)
Cracking yeti.ini.enc and trace.ucd files
-
- Site Admin
- Posts: 12984
- Joined: Wed Jul 30, 2014 9:32 pm
Re: Cracking yeti.ini.enc and trace.ucd files
Honestly I don't remember if I checked that yeti.ini.enc file when I tried the game years ago to test my archives extraction script, there is nothing about that in my collection of scripts so I guess I didn't.
-
- Posts: 12
- Joined: Sun Dec 24, 2017 12:40 am
Re: Cracking yeti.ini.enc and trace.ucd files
Oh sadly, I've tried for the past 3 weeks to crack it. But I cant even find the function where it decrypts the file. There is something I'm not seeing....