diff --git a/.gitbook/assets/image (172).png b/.gitbook/assets/image (172).png new file mode 100644 index 000000000..4aa3a81c1 Binary files /dev/null and b/.gitbook/assets/image (172).png differ diff --git a/.gitbook/assets/image (190).png b/.gitbook/assets/image (190).png new file mode 100644 index 000000000..22e99f845 Binary files /dev/null and b/.gitbook/assets/image (190).png differ diff --git a/reversing/cryptographic-algorithms.md b/reversing/cryptographic-algorithms.md index 3cedf00d1..82965dc65 100644 --- a/reversing/cryptographic-algorithms.md +++ b/reversing/cryptographic-algorithms.md @@ -8,7 +8,28 @@ If you ends in a code **using shift rights and lefts, xors and several arithmeti #### CryptDeriveKey +If this function is used, you can find which **algorithm is being used** checking the value of the second parameter: +![](../.gitbook/assets/image%20%28190%29.png) + +Check here the table of possible algorithms and their assigned values: [https://docs.microsoft.com/en-us/windows/win32/seccrypto/alg-id](https://docs.microsoft.com/en-us/windows/win32/seccrypto/alg-id) + +#### RtlCompressBuffer/RtlDecompressBuffer + +Compresses and decompresses a given buffer of data. + +#### CryptAcquireContext + + The **CryptAcquireContext** function is used to acquire a handle to a particular key container within a particular cryptographic service provider \(CSP\). **This returned handle is used in calls to CryptoAPI** functions that use the selected CSP. + +#### CryptCreateHash + +Initiates the hashing of a stream of data. If this function is used, you can find which **algorithm is being used** checking the value of the second parameter: + +![](../.gitbook/assets/image%20%28172%29.png) + + +Check here the table of possible algorithms and their assigned values: [https://docs.microsoft.com/en-us/windows/win32/seccrypto/alg-id](https://docs.microsoft.com/en-us/windows/win32/seccrypto/alg-id) ### Code constants