[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

WannaCry Ransomware Decryption Tool Released; Unlock Files Without

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 25
Thread images: 4

>Good news is that another security researcher, Benjamin Delpy, developed an easy-to-use tool called "WanaKiwi," based on Guinet's finding, which simplifies the whole process of the WannaCry-infected file decryption.

>All victims have to do is downloadWanaKiwi tool from Githuband run it on their affected Windows computer using the command line (cmd).

http://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html

Is this the end of wannacry?
>>
I dont trust this any further than i trust facebook
>>
>>60491264
>disconnect from internet in case of botnet
>run it
>remove it fully
What's it going to do? Fuck your already encrypted computer even more? Who cares?
>>
>>60491284
Plant a file on a timer
Do exactly as advertised
A month later the guys own ransom ware takes over
>>
>>60491246
https://github.com/aguinet/wannakey

only works for xp?
>>
>>60491246
>thehackernews.com
I know for a fact that this website is NOT good.

HOWEVER
I did check out the github page and here it is
https://github.com/gentilkiwi/wanakiwi

I do not know C language
>>
>>60491246
You need to run it before you restart/turn off and before any other program claims the RAM that wannacry free'd up (but didn't clear).
>>60491330
There is a version that works on 7/8/8.1 but NOT 10
>>
>CryptDestroyKey and CryptReleaseContext does not erase the prime numbers from memory before freeing the associated memory
So the kiddies behind Wannacry are about as skilled as the average /g/ "programmer". That's the kind of silly oversight I'd make
>>
>>60491349
Windows 10 was not affected by WannaCry because Windows 10 does not use SMB1 by default. Plus Windows 10 machines were forced to install security patches months ago.
>>
>>60491301
>New decrypter tool is released
>Cycle is repeated
>>
>>60491384
>Windows 10 does not use SMB1 by default
It was enabled in programs and features on my Windows 10 installs. Maybe only on some it's disabled by default.
>>
>>60491301
>Implying you wouldnt save the files you need and wipe the computer and reinstall everything.
>>
>>60491384
>>60491401
smb1 is enabled by default on windows 10. people keep saying other otherwise though.
>>
>>60491246
Thats not how encryption works pal
>>
File: 1491573532663.jpg (62KB, 462x402px) Image search: [Google]
1491573532663.jpg
62KB, 462x402px
>ran the decryptor tool
>its now demanding pictures of my penis as payment
>>
>>60491284
>>disconnect from internet in case of botnet
>>run it
>encrypted files get encrypted again
>mfw I now have to pay two people to get my files back
>>
>>60493882
Too bad you had it turned inside out.. how every will you get your files back now?
>>
>>60491246
>All victims have to do is downloadWanaKiwi tool from Githuband run it on their affected Windows computer using the command line (cmd).
>using the command line (cmd).
welp, guess how many normies aren't having their files decrypted?
>>
File: costanza.jpg (34KB, 600x600px) Image search: [Google]
costanza.jpg
34KB, 600x600px
>>60495597
With any luck someone will release a tool for that
>decryption tools all the way down
>>
File: 1473748207707.png (200KB, 547x402px) Image search: [Google]
1473748207707.png
200KB, 547x402px
>>60495597
>I now have to pay two people to get my files back
>>
>Its a tool that tries to fetch keys from the malware memory
So its only useful if you run the thing along the malware and only if you haven't rebooted once since encryption
>>
>>60491246

Or, instead of trying to undo the damage done by untrusted application x by running untrusted application y you can just restore the infected PCs with their last good image and restore data from backups.
>>
>>60491246
This is piracy
you have to properly support the industry
>>
Or just backup all your data somewhere right now and format your HDD when/if infected?
>>
>>60491246
>download a ransomware decryptor
>open elevated cmd to execute it
>it already has been encrypted
t-thanks, at least I can chC:\ from my windows liveusb
Thread posts: 25
Thread images: 4


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.