Cracking yeti.ini.enc and trace.ucd files

News and discussions about new, recent and work-in-progress security vulnerabilities affecting games and game-related software
lifecoder
Posts: 12
Joined: Sun Dec 24, 2017 12:40 am

Cracking yeti.ini.enc and trace.ucd files

Post by lifecoder »

Hi everyone,

I have been trying to decrypt the config file for Ghost Recon Phantoms(the yeti.ini.enc)
But have so far been unable to decrypt it since I dont know the used algorithm or key. Since the latest version uses VMProtect I have not been able to reverse the game and look at the decryption procedure. Also the game seems to store interesting information in trace*.ucd files in the logs directory which seem to partially encrypted. I was wondering if anyone ever managed to decrypt one of these files? (Added yeti.ini.enc and 1 ucd file as attachment in zip)
aluigi
Site Admin
Posts: 12984
Joined: Wed Jul 30, 2014 9:32 pm

Re: Cracking yeti.ini.enc and trace.ucd files

Post by aluigi »

Honestly I don't remember if I checked that yeti.ini.enc file when I tried the game years ago to test my archives extraction script, there is nothing about that in my collection of scripts so I guess I didn't.
lifecoder
Posts: 12
Joined: Sun Dec 24, 2017 12:40 am

Re: Cracking yeti.ini.enc and trace.ucd files

Post by lifecoder »

Oh sadly, I've tried for the past 3 weeks to crack it. But I cant even find the function where it decrypts the file. There is something I'm not seeing....