Is that possible to decompile a C++(or Java) "exe" file enough to read a TEXT password,stored in the source?

.......just a regular string or char. no encryption or stuff

6 Years
Discussion Span
Last Post by Ancient Dragon

Are you positively sure that they will purley decompile the source to see the pswd text clearly? I heard that decompilers don't do a total convertion


Your post doesn't say the entire source :S

enough to read a TEXT password,stored in the source

The answer to that is yes. If the string isn't encrypted or obfuscated then yes.

Now if you meant decompile the entire program back into it's source then the answer is no. Not C++ unless it's .Net. In that case you can use .Net reflector.

For Java it decompiles into Bytecode. Most of the time, the string will be either obfuscated or plain text. When I used to crack games, I'd deob the jar first then use CJBE to go through the byte code and find what I want. Strings were sometimes obbed and sometimes plaintext. It all depends on who compiled it and with what.

But for bytecode there is a far higher chance of it being plaintext than pure C++. For .Net programs, you can decompile it all the way back to it's original source near 99% (estimation) of the time. Byte code is very very easy to follow as well. For C++ you'd need to know a bit of OP Codes/ASM.

Edited by triumphost


You don't need to decompile a compiled program just to read the strings, any program such as debug.exe will easily display that along with the hex values of all the non-text bytes.

This topic has been dead for over six months. Start a new discussion instead.
Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.