Chapter 10 Unpacking of documents
After dinner, Lin Qingya and the others continued to discuss the robot football game, and Yang Lin declined Lin Qingya's proposal to send him downstairs and left.
When he got home, it was close to eight o'clock in the evening, Yang Lin hurriedly took a shower, returned to his room, and opened his laptop.
In the past two days, he has been at home with his sister, and he has not had time to deal with the matter of "Resident Evil: Apocalypse".
Now that Yang Ying has returned to school, it is time for Yang Lin to start his own work.
Cracking a single-player game is a big project that requires teamwork, especially in today's increasingly developed anti-piracy technology, and it is becoming more and more difficult to crack a large-scale single-player game.
At present, there are only a few really well-known game cracking teams in China, and the vast majority of large-scale stand-alone games are cracked by foreign teams, and then the Chinese patches are launched by the domestic cracking team, and then they appear in front of players.
Games like Resident Evil: Revelations, which have not even been released for Windows, are often more difficult to crack, and even those experienced top teams abroad will find it tricky, which is why some pirates and copyright publishers are looking for the "Immortal" team and the "Lemming" team to work together.
After all, these two teams,One is experienced in encryption and decryption、Disassembly、Reverse engineering and other fields,The team has a top hacker like Yang Lin,The other is good at Chinese translation、CG art,The two cooperate and can complement each other。
Even so, if it had been placed in the past, a big project like "Resident Evil Apocalypse" would have been busy for at least a month or two to be completed, but with the help of the mysterious WIN7 system in his brain, Yang Lin was confident that he could complete it in a short time.
Yang Lin entered the mailbox, downloaded the data package attached to the email to the hard drive of his laptop, and then he activated the system in his brain and transferred some professional hacking tools stored in it to his laptop.
Here I have to mention the special binary matrix language running in Yang Lin's brain.
After two days of exploration, Yang Lin found that this binary matrix code language is actually a very powerful programming tool.
It not only retains the advantages of machine language that can be read directly by hardware, but also is much more simplified than cumbersome machine language when programming.
Yang Lin can easily construct some binary matrices with different functions in his mind, and then match them together to form an organic whole.
For example, this variant version of the Win7 system running in Yang Lin's brain,It was precisely because Yang Lin optimized all the code data in the C disk,The system desktop、QQ and browsers have shown such an incredible 3D effect。
And the mutated Win7 system is much more powerful than the Win7 system in the computer in terms of fluency and functional diversity.
Although Yang Lin is still in the exploration stage for this set of languages, some unpacking tools optimized by the binary matrix language are more than enough to process the data packets of "Resident Evil Apocalypse".
The game data package is about 4.5G, and it took Yang Lin nearly an hour and a half to download it.
After opening the file, Yang Lin found that these data packages had been processed by other members of the team, and were classified according to file formats, mainly text file packages, CG picture file packages, and audio music file packages.
In order to prevent piracy, these packages have been shelled.
The so-called packing is actually to add a cloak to the executable file. All the user is doing is this shell. When you execute this program, the shell will unravel the original program in memory, and after unraveling, the future will be handed over to the real program.
These jobs only run in memory, and the cracker has no way of knowing exactly how the game runs in memory.
Shell encryption usually refers to a lot of free or non-free software on the Internet, which is packed by some special packing programs, which is basically compression or non-compression of the program. Because sometimes the program will be too large and need to be compressed. However, most of the programs are because they prevent anti-tracking, prevent the program from being tracked and debugged, and prevent the algorithm program from not wanting to be statically analyzed by others. Encrypt code and data to protect the integrity of your program data from being modified or peeping into the inside of your program.
What Yang Lin has to do is to unwrap these data packets, obtain their internal text, character materials, models and audio materials, and then repackage them and send them to other members of the team.
This work is the most critical part of cracking a large-scale game, which not only requires the cracker to be proficient in assembly, C, C++, J**A and other intermediate and high-level languages, but also requires you to have deep attainments in software algorithms, programming technology and other fields.
Only in this way can you deduce the ideas, principles, structures, and algorithms used in the packet packing process, and complete the real unpacking work.
In this process, no matter which step goes wrong, it is easy to cause errors in the file itself, garbled characters, and all previous efforts are wasted.
Yang Lin opened the rewritten unpacking software in his laptop, and the unpacking software in his brain also started instantly, and the two began to run synchronously.
In fact, as long as Yang Lin is willing, he doesn't need to open the unpacking software in his brain.
However, in this way, he had to manually operate the computer and rely on the software itself to unpack these data packets, which not only slowed down the unpacking, but also did not help Yang Lin deepen his understanding of the binary matrix code.
Yang Lin slowly closed his eyes, and soon appeared in the dense number matrix.
"This should be what the game text file looks like when it is converted into binary matrix code."
Yang Lin's thinking began to spread in the matrix space, and the source code of the packing program and text file was unobstructed in Yang Lin's eyes.
Soon, on the laptop desktop, packets representing text files had been exported, and strings of hexadecimal codes were dazzling.
Yang Lin opened his eyes again and smiled slightly, don't look at these hexadecimal codes are very cumbersome, but the next work is very simple, he just needs to find the corresponding font map table and convert it into Japanese.
In the following hours, Yang Lin successfully decoded the CG picture model data package, character data package, and audio music data package, and then converted these pictures and audio into data formats suitable for the Windows platform.
By the time all the work was done, it was already close to two o'clock in the morning.
In just six hours, he actually completed the workload that used to take at least one or two months, such an amazing efficiency, even Yang Lin himself was a little dumbfounded, when did he become so powerful?