Contents • • • • • • • • • • • • • • • • • About Currently NSIS installers cannot be fully decompiled. The installer itself doesn't provide any method to extract files or the script without installation. It is the developer's choice whether the source code and/or the files for the installer are available to the public or not. Extraction Tools There are, however, external tools that allow this: • Since version 4.42[may 2006] supports decompressing NSIS installers. Since version 9.34 [Jun 2014] 7-zip is also able to extract the compiled scriptcode. • The decompression plug-in InstallExplorer is also available for TotalCommander. Beside the files it'll create the file 'script.bin' compiled scriptcode.For use without the TotalCommander the is a good option. Well since [Feb 2014] InstExpl suffers from problems naming file names and dirs correctly that were created with NSIS 3. That's because the implementation was slightly changed so names like $INSTDIR, $PROGRAMFILE. Inside strings are not expanded correctly. Windows device setup wizard. • Extract the files from the RealPort zip file and run the RealPort setup wizard. Decompilers • Since version 9.34 [Jun 2014] ] it'll extract *beside the files of the setup* the compiled script code to a file named [NSIS].nsi • or NSIDis NSIDis is a open source Python script that'll help you to nearly fully recover your NSIS-installation scripts. Its state is currently alpha - and so not very user friendly and stable. • NRS is a set of Python librairies used to unpack and analysis NSIS installer's data. It also has an IDA plugin used to disassembly the NSIS Script of an installer. • Protection against Decompilers As a general note to software developers, you should use a plugin like if you need to protect certain files in your installer. Or if ya in the mood for compiling the NSIS have a look into nsis-3.xx-src Source exehead fileform.h. Mixing up the order of the enum with all the EW_* a little bit as recommend in the Comment. Extraction Tools. There are, however. NSIS Reversing Suite NRS is a set of Python librairies used to unpack and analysis NSIS installer's data. Extraction Tools. There are, however. NSIS Reversing Suite NRS is a set of Python librairies used to unpack and analysis NSIS installer's data. It will mess up decompilers output that expect these tokes to be in the standard order. Or shift or enlarge the.reloc section in the PE-header by 0x400. = 7) operators changed because the old 7 (~ bneg) is implemented using ^ • 3.03 [r6926] Added >>> (SHR) operator (parm3 == 13) EW_SETFLAG • 3.02 [r6841] alter_reg_view can be KEY_WOW64_32KEY in 64-bit stubs. EW_SHELLEXEC • 3.02 [r6839] Parameter count changed. Parm4 is SHELLEXECUTEINFO.fMask and SEE_MASK_NOCLOSEPROCESS is set for ExecShellWait. EW_DELREG • 3.02 [r6871] ent.offsets[4] can also contain (shifted) KEY_WOW64_xxKEY bits. EW_WRITEREG • 3.02 [r6829] ent.offsets[5] is REG_MULTI_SZ for WriteRegMultiStr.
0 Comments
Leave a Reply. |
Details
АвторНапишите что-нибудь о себе. Не надо ничего особенного, просто общие данные. АрхивыКатегории |