Join also our Discord channel! Click here.

Granado Espada .IPF format

Read or post about compression. And decompression. Or ask questions how to decompress your files.
noik
ultra-n00b
Posts: 5
Joined: Mon Apr 07, 2008 10:05 pm

Granado Espada .IPF format

Post by noik » Wed Apr 09, 2008 6:36 pm

The contents of this post was deleted because of possible forum rules violation.

User avatar
Strobe
Moderator
Posts: 411
Joined: Mon Oct 24, 2005 8:52 am
Location: Sweden
Been thanked: 16 times
Contact:

Re: Granado Espada .IPF format

Post by Strobe » Wed Apr 09, 2008 7:18 pm

the IPF file is a simple Zip file (rename it to .zip and open it), so repacking the files should be easy.

HOWEVER..... the Zip file is password encrypted. so you cant really exctract any files by hand and repack them without
knowing the password. so the the creator of the IPF unpacker knows the password. i can figure it out soon enough.
*brb*

noik
ultra-n00b
Posts: 5
Joined: Mon Apr 07, 2008 10:05 pm

Re: Granado Espada .IPF format

Post by noik » Thu Apr 10, 2008 12:22 pm

yo thx for the help^^

now im trying to brute-force these zip/ipf files lol lets see if i can find out the password o.o
well i will keep looking here if you figure out the password before me^^ (and i think you will lol)
thx a lot for the help \o/

User avatar
Strobe
Moderator
Posts: 411
Joined: Mon Oct 24, 2005 8:52 am
Location: Sweden
Been thanked: 16 times
Contact:

Re: Granado Espada .IPF format

Post by Strobe » Thu Apr 10, 2008 1:55 pm

Im downloading the Client now too see if i can get a clue of the Zip password.

an approach i use when finding out passwords for encrypted archives used in games or demos is by simply
looking in the Exe files or DLL files of the game, the password will almost 95% of the times be found unencrypted here.

Takes much less time than bruteforcing ;) , but if they have hidden the password too well then bruteforcing
is more convinient.

ill let you know if i find it!

Edit:
One of their mirrors have a faulty install file :X , i went with curse.com first, the file downloaded was only 1.2gb
in size (compared to the others at 3.6gb) , so i had an Unexpected End of Archive!

well well, redownloading!!!

noik
ultra-n00b
Posts: 5
Joined: Mon Apr 07, 2008 10:05 pm

Re: Granado Espada .IPF format

Post by noik » Thu Apr 10, 2008 3:49 pm

The contents of this post was deleted because of possible forum rules violation.

noik
ultra-n00b
Posts: 5
Joined: Mon Apr 07, 2008 10:05 pm

Re: Granado Espada .IPF format

Post by noik » Sun Apr 13, 2008 5:16 pm

well i found the password
but there still a problem, with that ipf extractor we can see the real names of files and folders, but when you open then with winrar/winzip, all the files is with strange letters, and when we get everything extracted, the files with strange letters lol

anyone can help??=D
any way to repack the files with the real names??
btw will try to repack using the password and the files extracted with the ipf-extractor and see if the game can regonize then

cya!! thx for the help^^

edit:
well you cant just repack all with winzip/winrar and put the password there, the game dont recognize the ipf file in this way
will see what i can do to repack the files right
cya all^^

noik
ultra-n00b
Posts: 5
Joined: Mon Apr 07, 2008 10:05 pm

Re: Granado Espada .IPF format

Post by noik » Wed Apr 30, 2008 12:37 am

well since im a little busy, so i got no time to work in a extractor/repack tool, here is the password for the ipf files:

%f %f %s %s ÿÿÿÿ?[ ÿÿÿÿ?%f %f %s h %s .?. Xÿ$$

yes this whole thing is the password lol
hope it can be usefull for anyone there
so maybe some mods for granado espada appear
when i have more time i will try to do something (:
these ipf files are encrypted zip files
i think it isnt so hard to figure out how to extract/repack everything
cya :wink:

liyafenix
ultra-n00b
Posts: 1
Joined: Fri Aug 14, 2009 7:50 pm

Re: Granado Espada .IPF format

Post by liyafenix » Fri Aug 14, 2009 8:56 pm

this password does not working :blue:
how you found this password?

pixellegolas
ultra-veteran
ultra-veteran
Posts: 423
Joined: Mon Aug 11, 2008 11:30 pm
Has thanked: 27 times
Been thanked: 15 times

Re: Granado Espada .IPF format

Post by pixellegolas » Sun Aug 30, 2009 9:57 am

I would like to bump this thread and ask if someone knows about a model viewer or converter or anything :)

User avatar
chrrox
Moderator
Posts: 2564
Joined: Sun May 18, 2008 3:01 pm
Has thanked: 57 times
Been thanked: 1308 times

Re: Granado Espada .IPF format

Post by chrrox » Fri Oct 16, 2009 4:58 am

I might know something :)
Image

MrMoonKr
beginner
Posts: 29
Joined: Fri Oct 16, 2009 7:18 am
Has thanked: 24 times
Been thanked: 3 times

Re: Granado Espada .IPF format

Post by MrMoonKr » Sat Oct 17, 2009 6:52 am

Help me
I want to know how to recover the real names fo files and folders in a ipf archive.

(PS)
Sorry for my bad English ^^;;
I can do c++ programming.

Uli
advanced
Posts: 47
Joined: Fri Dec 11, 2009 7:42 pm
Has thanked: 3 times
Been thanked: 6 times

Re: Granado Espada .IPF format

Post by Uli » Fri Dec 11, 2009 8:47 pm

I can easily make a packer for this.

Only need to get an algorithm for encrypting the filenames.

Atm I have to manually rip them from the files to get them but heres some data on it


datatable_force.xml
Hex: 64 61 74 61 74 61 62 6c 65 5f 66 6f 72 63 65 2e 78 6d 6c
Encrypted Hex: 90 61 6b 96 b7 c2 19 43 27 4a e8 2a a0 c4 0f 26 19 26 52

datatable_force_kk.xml
Hex: 64 61 74 61 74 61 62 6c 65 5f 66 6f 72 63 65 5f 6b 6b 2e 78 6c
Encrypted Hex: 90 61 6b 96 b7 c2 19 43 27 4a e8 2a a0 c4 0f 57 ef 61 d3 3f 63 8d

As you can see the hex is the same until the characters go different and then they are completely different.
I'm not too great on encryptions like this (I'm only good at more basic stuff when it comes to encryption).
I tried all Encryption types I could get my hands on (RC2, RC4, IDEA etc) tried using the IPF password as a key and couldn't find one which would "match".

I can make IPF's if I know how it encrypts the current files which I know the encrypted names for are

2002.tff
attacker.scp
healer.scp
lib.scp
puppet.scp

script/
script/localize.scp

uiscp/
uiscp/game.scp

uixml/
uixml/autoinspect.xml


hotkey.xml
datatable_force_kk.xml
datatable_force.xml
tooltext.xml
datatable_watch.xml

usa/
usa/datatable_itemcharge.ies

Interesting ones are the folders which Encrypted Hex is:

usa/ = a1 89 66 b3

Now it begins with u and is hex encrypted is a1 where as

uiscp/ = 81 58 06 39 4e 16

and

uixml/ = 81 58 0d 6a 6c 81

So the second character obviously affects what the first character will be.

Any help on how it encrypts the filename will be appreciated, once its worked out I will gladly make a tool for it.

piratesephiroth
beginner
Posts: 26
Joined: Sun Nov 08, 2009 11:05 am
Location: Brazil
Has thanked: 3 times
Been thanked: 10 times

Re: Granado Espada .IPF format

Post by piratesephiroth » Mon Dec 14, 2009 7:58 pm

I thought of another approach... maybe someone could rip the decryption routine from the extractor and then encrypt the filenames via brute force.

Uli
advanced
Posts: 47
Joined: Fri Dec 11, 2009 7:42 pm
Has thanked: 3 times
Been thanked: 6 times

Re: Granado Espada .IPF format

Post by Uli » Mon Dec 14, 2009 10:59 pm

piratesephiroth wrote:I thought of another approach... maybe someone could rip the decryption routine from the extractor and then encrypt the filenames via brute force.
Ripping the decryption routine aint that easy need someone who can reverse programs pretty well.

As for encrypting filenames via brute force I got no idea why you would do that, decrypting is harder then encrypting normally.

I'm guessing there encryption algorithm for the filenames will be something like:

Letter XOR b

and every time a letter gets Xor'd it does
b = (b + x)

It will be something simple like that most likely.
So it changes with every byte encrypted.

piratesephiroth
beginner
Posts: 26
Joined: Sun Nov 08, 2009 11:05 am
Location: Brazil
Has thanked: 3 times
Been thanked: 10 times

Re: Granado Espada .IPF format

Post by piratesephiroth » Tue Dec 15, 2009 6:57 am

Yeah I agree that the encryption is something simple like that. Looking at the first bytes of the unencrypted/encryped files in ai.ipf, it seems that they all start with XOR F4... but this is not true for font.ttf, inside font.ipf.

hmm maybe I'm starting to understand something now... it seems that for the next letters it does some other operation. the characters no longer follow their original order... it's like they're split into groups of 8 and then the groups are scrambled. Plus, sometimes they come in order and other times they come in reverse order... I wonder if it's some bit shifting...

Post Reply