Could we possibly access resources on a server protected by security tokens? [on hold]
up vote
0
down vote
favorite
I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.
An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259
In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]
From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.
I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.
Any information or insights are welcomed.
security internet encryption webserver flash-player
New contributor
put on hold as off-topic by DavidPostill♦ Nov 20 at 20:38
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill
If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
up vote
0
down vote
favorite
I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.
An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259
In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]
From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.
I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.
Any information or insights are welcomed.
security internet encryption webserver flash-player
New contributor
put on hold as off-topic by DavidPostill♦ Nov 20 at 20:38
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill
If this question can be reworded to fit the rules in the help center, please edit the question.
1
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38
add a comment |
up vote
0
down vote
favorite
up vote
0
down vote
favorite
I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.
An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259
In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]
From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.
I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.
Any information or insights are welcomed.
security internet encryption webserver flash-player
New contributor
I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.
An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259
In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]
From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.
I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.
Any information or insights are welcomed.
security internet encryption webserver flash-player
security internet encryption webserver flash-player
New contributor
New contributor
New contributor
asked Nov 20 at 17:38
Samuel
1
1
New contributor
New contributor
put on hold as off-topic by DavidPostill♦ Nov 20 at 20:38
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill
If this question can be reworded to fit the rules in the help center, please edit the question.
put on hold as off-topic by DavidPostill♦ Nov 20 at 20:38
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill
If this question can be reworded to fit the rules in the help center, please edit the question.
1
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38
add a comment |
1
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38
1
1
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38
add a comment |
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
1
Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05
Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38