 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 54
Members: 0
Total: 54
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Zinio |
 |
Posted: Fri Oct 15, 2010 8:00 pm |
|
|
java777 |
Regular user |

 |
|
Joined: Sep 25, 2010 |
Posts: 5 |
|
|
|
 |
 |
 |
|
Hi,
I`m tring to read the zinio magazines for free, I managed to download the full magazine in 2 different ways the zno file to be read offline ( wich I think is impossible to open it needs a dsa signature)
The online file is a zip file with all the thubnails and swf pages to be read online. But this swf files are some how encoded ( I`m starting to believe they are pdf) the online reader needs a key for each page like 0824c615632de28d8a19ab702599d1dd2695a40afd874fd868725619d32fa69a for page 0
Since I have all the pages and the keys for page 0 and 1 is it possible to get the other files key?
Has any one messed around with zinio and can give me a few tips thanks.
Here is the online files http://rapidshare.com/files/425297743/416141596.zip
Thanks
Edit
Ithink that the functioon to decode is this:
Code: |
package com.zinio.crypto
{
import flash.utils.*;
public class Drm11Decryptor extends Object implements IDecryptor
{
private var cipher:ICipher;
private static const ZNO_HEADER_LENGTH:int = 5;
private static const PREPEND_PACKING_LENGTH:int = 1024;
private static const HEAD_ENCRYPTED_LENGTH:int = 2048;
private static const TAIL_ENCRYPTED_LENGTH:int = 1024;
private static const CLEAR_LENGTH:int = 60;
private static const ENCRYPTED_LENGTH:int = 8;
public function Drm11Decryptor()
{
return;
}// end function
public function decrypt(param1:ByteArray, param2:ByteArray) : ByteArray
{
var _loc_4:uint;
var _loc_7:uint;
var _loc_8:uint;
var _loc_3:uint;
var _loc_5:* = new ByteArray();
var _loc_6:uint;
if (this.cipher == null)
{
this.cipher = new Arc4Cipher();
}
this.cipher.init(CipherMode.DECRYPT, param1);
_loc_3 = _loc_3 + ZNO_HEADER_LENGTH;
_loc_4 = Math.min(param2.length - _loc_3, HEAD_ENCRYPTED_LENGTH);
_loc_6 = _loc_6 + this.cipher.update(param2, _loc_3, _loc_4, _loc_5, _loc_6);
_loc_3 = _loc_3 + _loc_4;
while (param2.length - _loc_3 > TAIL_ENCRYPTED_LENGTH)
{
_loc_5.position = _loc_6;
_loc_5.writeBytes(param2, _loc_3, CLEAR_LENGTH);
_loc_6 = _loc_6 + CLEAR_LENGTH;
_loc_3 = _loc_3 + CLEAR_LENGTH;
_loc_6 = _loc_6 + this.cipher.update(param2, _loc_3, ENCRYPTED_LENGTH, _loc_5, _loc_6);
_loc_3 = _loc_3 + ENCRYPTED_LENGTH;
}
_loc_7 = param2.length - _loc_3;
this.cipher.update(param2, _loc_3, _loc_7, _loc_5, _loc_6);
var _loc_9:* = new ByteArray();
new ByteArray().writeBytes(_loc_5, PREPEND_PACKING_LENGTH, 0);
return _loc_9;
}// end function
}
}
|
|
|
|
|
|
 |
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|