FORUMS
Remove All Ads from XDA

[Q] Windows 8 file coding

8 posts
Thanks Meter: 0
 
By iamthecoder, Junior Member on 5th March 2014, 06:29 PM
Post Reply Email Thread
I was looking through some files and i found alot of files that had coding like this :¤¢±–§nLée˜»=“5ê{i!¿èb5n)–~
åðZá
¸cYœúÌ*pa%êÁR "çÓ+©qhÿ˜î™)ZÎmðxŒ)8`Íše*PD×Ú±#jMˆ’Zž1ú}(ñe4Ô*š ùØÕÖf[9A‰c
K6lZ®s^ô¢N€é-…BÄ~žÎäÃ6™® ̉ÐhxËòùQç6,mØFŠ,ÈFìoã¢‹™E¹ÆƍlóS–ñÇøÙ¿DR¶ä:T ZKFl/öô§q
s1x„ö÷Ùç½ÓšÃsäá!˜ˆ•Ä <:} @Óv˜£+×_ãOÉžéd—b#ùƒ
/EJàã$Ĺ2¸²Æ*Þ„œRbÜïÏ|W’]‹[П6Ðh‰’I»½FýšNÖBJ]tßüŸš!‰Óp 2’aåÖïS¢ ;´-N(’ÅHºuà§' åu£s°·#
•Ë÷¦ÒywÄ•˜š‚


Could someone help me with this!

FIle address

C:\Users\dasd\AppData\Local\Packages\GluGamesInc.S amuraivsZombiesDefense_2mkdfttccc4r6\LocalState

There is a file there called localsave_offline_Save.data it aroused my attention so i looked through it and im no wizard at decoding so help please!
 
 
5th March 2014, 06:57 PM |#2  
Senior Member
Thanks Meter: 326
 
More
That is because the file is not stored as plain text and is raw binary data. Notepad then attempts to try to load it as plain text and as you can see fails miserably to make anything of it.
5th March 2014, 07:44 PM |#3  
OP Junior Member
Thanks Meter: 0
 
More
Quote:
Originally Posted by SixSixSevenSeven

That is because the file is not stored as plain text and is raw binary data. Notepad then attempts to try to load it as plain text and as you can see fails miserably to make anything of it.

Then how could i turn it into plain text
5th March 2014, 08:07 PM |#4  
Senior Member
Thanks Meter: 326
 
More
Realistically you can't so I suggest learning how to play the game properly rather than editing your save state :P
The Following User Says Thank You to SixSixSevenSeven For This Useful Post: [ View ] Gift SixSixSevenSeven Ad-Free
5th March 2014, 08:15 PM |#5  
OP Junior Member
Thanks Meter: 0
 
More
Quote:
Originally Posted by SixSixSevenSeven

Realistically you can't so I suggest learning how to play the game properly rather than editing your save state :P

Eh im done with the game was just wondering thanks for the help though would've wasted unnecessary time
5th March 2014, 09:18 PM |#6  
Recognized Developer
Flag Seattle
Thanks Meter: 2,916
 
More
Yeah... the file could be anything from a binary representation of in-memory data structures to encrypted plain text. Without decompiling the app, I probably couldn't tell you which. Totally not worth the effort.
8th March 2014, 02:20 AM |#7  
OP Junior Member
Thanks Meter: 0
 
More
RE:
Quote:
Originally Posted by GoodDayToDie

Yeah... the file could be anything from a binary representation of in-memory data structures to encrypted plain text. Without decompiling the app, I probably couldn't tell you which. Totally not worth the effort.

Attached Files
File Type: txt localsave_offline_save.txt - [Click for QR Code] (3.4 KB, 4 views)
8th March 2014, 11:33 AM |#8  
Senior Member
Thanks Meter: 326
 
More
It is not necessarily a straight forward process.
Decompiling the app can be a hit and miss procedure, not really legal either. You would have to attempt to fully reverse engineer the file format from what may be partially broken code and then write your own code in order to load and edit the files.

Not a process which can be done by a newcomer in under half an hour (or insert any other time period), or one that you can easily write a straight up tutorial for.


If it was encrypted plaintext (unlikely) not raw binary structures (very very common), the point of encrypting it is that a person cant decrypt it. There are numerous encryption methods available and they could have used any one. Brute forcing encryption can be very very slow with times to decode ranging from minutes to months, and not knowing what encryption method is used your probably looking at years as you try each method separately. Again, not really something a tutorial can be done for, Cryptography is a fine art, reverse engineering encryption is perhaps the finest part of Cryptography, its an experts field.
8th March 2014, 12:10 PM |#9  
Recognized Developer
Flag Seattle
Thanks Meter: 2,916
 
More
Eh... depending on the encryption used, and the way the app is compiled, it may be easy to reverse. You'd be amazed how many apps (mobile or otherwise) use something stupid like AES-ECB with a hardcoded key of something like MD5("THESECRETKEY"), or even just XORing with a constant string. That said, Microsoft does make it easy to do better than that, with their incredibly-simple-to-use-but-hard-to-reverse Data Protection API for apps.
Post Reply Subscribe to Thread

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes