Pricehacker Posted August 28, 2018 Share Posted August 28, 2018 Hello! I want to make a script that changes the filesize of program files while still having them run as usual. I tried FileWrite() but then the program wouldnt be recognized as a runnable program, could you guys help me to the right path? Link to comment Share on other sites More sharing options...
Developers Jos Posted August 28, 2018 Developers Share Posted August 28, 2018 Why would you want to do this? SciTE4AutoIt3 Full installer Download page - Beta files Read before posting How to post scriptsource Forum etiquette Forum Rules Live for the present, Dream of the future, Learn from the past. Link to comment Share on other sites More sharing options...
FrancescoDiMuro Posted August 28, 2018 Share Posted August 28, 2018 (edited) @Jos He wants to conquer the World with a mastodontic .exe file. P.S.: I was sarcastic. Edited August 28, 2018 by FrancescoDiMuro Click here to see my signature: Spoiler ALWAYS GOOD TO READ: Forum Rules Forum Etiquette Link to comment Share on other sites More sharing options...
careca Posted August 28, 2018 Share Posted August 28, 2018 Is this considered as a mod working on a thread, or can i answer? Spoiler Renamer - Rename files and folders, remove portions of text from the filename etc. GPO Tool - Export/Import Group policy settings. MirrorDir - Synchronize/Backup/Mirror Folders BeatsPlayer - Music player. Params Tool - Right click an exe to see it's parameters or execute them. String Trigger - Triggers pasting text or applications or internet links on specific strings. Inconspicuous - Hide files in plain sight, not fully encrypted. Regedit Control - Registry browsing history, quickly jump into any saved key. Time4Shutdown - Write the time for shutdown in minutes. Power Profiles Tool - Set a profile as active, delete, duplicate, export and import. Finished Task Shutdown - Shuts down pc when specified window/Wndl/process closes. NetworkSpeedShutdown - Shuts down pc if download speed goes under "X" Kb/s. IUIAutomation - Topic with framework and examples Au3Record.exe Link to comment Share on other sites More sharing options...
Moderators JLogan3o13 Posted August 28, 2018 Moderators Share Posted August 28, 2018 Yes, it is considered as a Mod working in a thread. Please wait. "Profanity is the last vestige of the feeble mind. For the man who cannot express himself forcibly through intellect must do so through shock and awe" - Spencer W. Kimball How to get your question answered on this forum! Link to comment Share on other sites More sharing options...
Pricehacker Posted August 29, 2018 Author Share Posted August 29, 2018 Not sure what "Mod working in a thread" means but the reason i want to make exe files bigger is becouse i want to store information at a "secret place" eighter by reading from the exe file afterwards, or by looking at the file size and using that as a source of information to store a short string lika a password. Also thanks for trying to help guys! Link to comment Share on other sites More sharing options...
Moderators Melba23 Posted August 29, 2018 Moderators Share Posted August 29, 2018 Pricehacker, Quote Not sure what "Mod working in a thread" means Then read this announcement. M23 Any of my own code posted anywhere on the forum is available for use by others without any restriction of any kind Open spoiler to see my UDFs: Spoiler ArrayMultiColSort ---- Sort arrays on multiple columnsChooseFileFolder ---- Single and multiple selections from specified path treeview listingDate_Time_Convert -- Easily convert date/time formats, including the language usedExtMsgBox --------- A highly customisable replacement for MsgBoxGUIExtender -------- Extend and retract multiple sections within a GUIGUIFrame ---------- Subdivide GUIs into many adjustable framesGUIListViewEx ------- Insert, delete, move, drag, sort, edit and colour ListView itemsGUITreeViewEx ------ Check/clear parent and child checkboxes in a TreeViewMarquee ----------- Scrolling tickertape GUIsNoFocusLines ------- Remove the dotted focus lines from buttons, sliders, radios and checkboxesNotify ------------- Small notifications on the edge of the displayScrollbars ----------Automatically sized scrollbars with a single commandStringSize ---------- Automatically size controls to fit textToast -------------- Small GUIs which pop out of the notification area Link to comment Share on other sites More sharing options...
Moderators Melba23 Posted August 29, 2018 Moderators Share Posted August 29, 2018 Pricehacker, One way to do what you want is to use Alternate data streams (ADS) - I believe that there are some examples on the forum on how to use AutoIt to with them. But as this method has been used for malware in the past and is not necessarily transferrable between machines, I would counsel against its use as it is likely to be more trouble that it is worth. M23 Any of my own code posted anywhere on the forum is available for use by others without any restriction of any kind Open spoiler to see my UDFs: Spoiler ArrayMultiColSort ---- Sort arrays on multiple columnsChooseFileFolder ---- Single and multiple selections from specified path treeview listingDate_Time_Convert -- Easily convert date/time formats, including the language usedExtMsgBox --------- A highly customisable replacement for MsgBoxGUIExtender -------- Extend and retract multiple sections within a GUIGUIFrame ---------- Subdivide GUIs into many adjustable framesGUIListViewEx ------- Insert, delete, move, drag, sort, edit and colour ListView itemsGUITreeViewEx ------ Check/clear parent and child checkboxes in a TreeViewMarquee ----------- Scrolling tickertape GUIsNoFocusLines ------- Remove the dotted focus lines from buttons, sliders, radios and checkboxesNotify ------------- Small notifications on the edge of the displayScrollbars ----------Automatically sized scrollbars with a single commandStringSize ---------- Automatically size controls to fit textToast -------------- Small GUIs which pop out of the notification area Link to comment Share on other sites More sharing options...
Moderators JLogan3o13 Posted August 29, 2018 Moderators Share Posted August 29, 2018 I would agree with Melba, any AV product worth its salt is going to do a checksum of executables against any binary-appending of data. Most of the time if you do this it goes into the package.nw and is easily detectable. Even if it doesn't go there, it is going to change the hashsum, which will be detected. And if you have to go to those lengths to get around AV detection, you're really beginning to stumble into the gray area between legitimacy and malware. "Profanity is the last vestige of the feeble mind. For the man who cannot express himself forcibly through intellect must do so through shock and awe" - Spencer W. Kimball How to get your question answered on this forum! Link to comment Share on other sites More sharing options...
iamtheky Posted August 29, 2018 Share Posted August 29, 2018 if you are just shooting for security by obscurity, seems it would be easier to reshack a dependency or bury it in the metadata. You still have to write a script that tells everyone where it is in order to use that string, so where you put it matters very little to a determined attacker, imho. ,-. .--. ________ .-. .-. ,---. ,-. .-. .-. .-. |(| / /\ \ |\ /| |__ __||| | | || .-' | |/ / \ \_/ )/ (_) / /__\ \ |(\ / | )| | | `-' | | `-. | | / __ \ (_) | | | __ | (_)\/ | (_) | | .-. | | .-' | | \ |__| ) ( | | | | |)| | \ / | | | | | |)| | `--. | |) \ | | `-' |_| (_) | |\/| | `-' /( (_)/( __.' |((_)-' /(_| '-' '-' (__) (__) (_) (__) Link to comment Share on other sites More sharing options...
careca Posted August 29, 2018 Share Posted August 29, 2018 Huh.. green light to answer? Spoiler Renamer - Rename files and folders, remove portions of text from the filename etc. GPO Tool - Export/Import Group policy settings. MirrorDir - Synchronize/Backup/Mirror Folders BeatsPlayer - Music player. Params Tool - Right click an exe to see it's parameters or execute them. String Trigger - Triggers pasting text or applications or internet links on specific strings. Inconspicuous - Hide files in plain sight, not fully encrypted. Regedit Control - Registry browsing history, quickly jump into any saved key. Time4Shutdown - Write the time for shutdown in minutes. Power Profiles Tool - Set a profile as active, delete, duplicate, export and import. Finished Task Shutdown - Shuts down pc when specified window/Wndl/process closes. NetworkSpeedShutdown - Shuts down pc if download speed goes under "X" Kb/s. IUIAutomation - Topic with framework and examples Au3Record.exe Link to comment Share on other sites More sharing options...
rudi Posted August 29, 2018 Share Posted August 29, 2018 Use a FileInstall() with some file meeting your size needs define a huge string variable in your script, filled with RANDOM characters. And that with "Mod Team working on a thread", I'm not sure, if I get this 100%... I assume, that this means, don't help, while the moderator's team is discussing, if a question is apropriate or prohibited. As Melba and Logan were putting valuable answers to the orignal question, I assume, we are past this "is-it-legitim-discussion" Regards, Rudi. Earth is flat, pigs can fly, and Nuclear Power is SAFE! Link to comment Share on other sites More sharing options...
Somerset Posted August 29, 2018 Share Posted August 29, 2018 This topic is borderline negative behavior, that almost always leans towards suspicious activities. They are trying to conceal a malicious file for ill intent. File hidden from either a program, or person. File storage in a compression state. Data storage is another possibility, but that too is suspicious. Link to comment Share on other sites More sharing options...
iamtheky Posted August 29, 2018 Share Posted August 29, 2018 or storing a product key, or a hardcoded password..... Also, any target a payload of this manner would work on could get rekt without all the legwork. Now if he said the D word or any of the keywords about putting it back together, then its piledriver time. I do love your cynicism though, im jealous, it seems healthy and well cared for. I have started leaning more towards: Don't attribute to malice, that which can be attributed to coding some shit in the jankiest way possible because i had a bad idea that ended up working. ,-. .--. ________ .-. .-. ,---. ,-. .-. .-. .-. |(| / /\ \ |\ /| |__ __||| | | || .-' | |/ / \ \_/ )/ (_) / /__\ \ |(\ / | )| | | `-' | | `-. | | / __ \ (_) | | | __ | (_)\/ | (_) | | .-. | | .-' | | \ |__| ) ( | | | | |)| | \ / | | | | | |)| | `--. | |) \ | | `-' |_| (_) | |\/| | `-' /( (_)/( __.' |((_)-' /(_| '-' '-' (__) (__) (_) (__) Link to comment Share on other sites More sharing options...
rudi Posted August 30, 2018 Share Posted August 30, 2018 If you want to *CHECK* a password, a user has to put in on program startup, don't store the password itself, but it's hash code: #Region Password Check $PWD = "" $PW_hash = "0x83CA415F8BA7FCE3163736F7BB472DA7F307B832" Do $PWD = InputBox("Password Check", "enter your password", "", "*") Until $PWD <> "" _Crypt_Startup() $Hash_Input = _Crypt_HashData($PWD, $CALG_SHA1) If $Hash_Input <> $PW_hash Then MsgBox(64, "Wrong Password", "Please type your password again, the SHA1 Hash calculated doesn't match!", 10) Exit EndIf _Crypt_Shutdown() #EndRegion That way the user cannot retrieve your password from the compiled EXE, but *YOU* can verify, he/she knows it. Regards, Rudi. JLogan3o13 1 Earth is flat, pigs can fly, and Nuclear Power is SAFE! Link to comment Share on other sites More sharing options...
Pricehacker Posted September 10, 2018 Author Share Posted September 10, 2018 Not exactly what i was looking for but that doesnt matter as encrypting the password is probably much safer anyways. Thanks to all of you for your help! Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now