Could we possibly access resources on a server protected by security tokens? [on hold]











up vote
0
down vote

favorite












I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.





An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259



In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]



From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.





I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.



Any information or insights are welcomed.










share|improve this question







New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











put on hold as off-topic by DavidPostill Nov 20 at 20:38


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill

If this question can be reworded to fit the rules in the help center, please edit the question.









  • 1




    Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
    – davidgo
    Nov 20 at 18:05










  • Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
    – K7AAY
    Nov 20 at 18:38















up vote
0
down vote

favorite












I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.





An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259



In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]



From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.





I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.



Any information or insights are welcomed.










share|improve this question







New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











put on hold as off-topic by DavidPostill Nov 20 at 20:38


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill

If this question can be reworded to fit the rules in the help center, please edit the question.









  • 1




    Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
    – davidgo
    Nov 20 at 18:05










  • Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
    – K7AAY
    Nov 20 at 18:38













up vote
0
down vote

favorite









up vote
0
down vote

favorite











I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.





An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259



In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]



From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.





I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.



Any information or insights are welcomed.










share|improve this question







New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I am thinking of archiving some resources in a web Flash game. Instead of traversing throughout the game to have them downloaded according to game client's requests, I wonder if I could traverse by the filenames and make those requests directly.





An example resources address would be like:
http://img-senpro.cdn.dmmgames.com/assets/sound/voice/unit_1919_1918_06_12.mp3?s=6fsuhZBEHsHB8GvvMcm-sA&t=1542733200&2000.259



In a format of:
[protocol] [server] [domain name] [file path & name] ? [s] [t]



From what I observed, I suppose [t] could be a timestamp which increments from time to time, while [s] could be the security token that is different for each file on the server and not to be changed until the timestamp does.





I suppose such encrypted security tokens are designed to be unbreakable, or at least not by brute force, and the most instinctive answer to my question might be a "NO". Yet, since I am not quite familiar with networking so I wonder if there could be ways that are beyond my knowledge to bypass such security tokens
and retrieve files with given filenames.



Any information or insights are welcomed.







security internet encryption webserver flash-player






share|improve this question







New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question







New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question






New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked Nov 20 at 17:38









Samuel

1




1




New contributor




Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Samuel is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.




put on hold as off-topic by DavidPostill Nov 20 at 20:38


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill

If this question can be reworded to fit the rules in the help center, please edit the question.




put on hold as off-topic by DavidPostill Nov 20 at 20:38


This question appears to be off-topic. The users who voted to close gave this specific reason:


  • "This question is not about computer hardware or software, within the scope defined in the help center." – DavidPostill

If this question can be reworded to fit the rules in the help center, please edit the question.








  • 1




    Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
    – davidgo
    Nov 20 at 18:05










  • Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
    – K7AAY
    Nov 20 at 18:38














  • 1




    Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
    – davidgo
    Nov 20 at 18:05










  • Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
    – K7AAY
    Nov 20 at 18:38








1




1




Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05




Looking at the network layer to bypass security built at the application layer (as appears to be the case here) is likely to be a dead end. Network access by itself does not allow you to traverse filesystems, and the apparent availability will be controlled by the application running on the web server.
– davidgo
Nov 20 at 18:05












Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38




Although the possibility may be enticing, such would be bypassing the rules of the game, and therefore out of bounds for discussion here.
– K7AAY
Nov 20 at 18:38















active

oldest

votes






















active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes

Popular posts from this blog

"Incorrect syntax near the keyword 'ON'. (on update cascade, on delete cascade,)

Alcedinidae

RAC Tourist Trophy