.comment-link {margin-left:.6em;}
Xavier's Security Post
Wednesday, May 10, 2006
  Google/Sony promotional game source code
Due to request, I went ahead and created an upload of the source code.

The archive file is in .RAR format, so if you have WinRAR or some utility to extract the files within, then great.

Also, it should be noted I put all the main Action Script code into individual text files, but if you have Macromedia 8 and ant access to all the images and other misc. source code, then go open up "main-src.fla". It contains everything from the font to sound and back.


P.S: if the link doesn't work, just let me know.
Thanks for posting this!

Link works great, but what's up with the file named "Spriite245.txt"? Was that a typo in the original?

Also, why is there only one instance of each type of game? Many of the games, such as the Restoration puzzle, would give you a new instance every time you hit reload. Is the "onData()" function used for getting a new puzzle from a server?
The typo is completely my own fault. I should have noticed that before throwing it into the archive :)

I only decompiled the .swf loaded once you go to the da vinco code game url. The source code makes references to other .swf files being loaded for some puzzles, while others (like the observation game) had its answers shoved into a variable. But I didn't decompile those.

I very much assume there's a lot of game data and puzzle functions that are missing. and yes onData() is used to grab new puzzle data (based on your level reference id)

On the last game, I noticed Google/Sony/Bigwhatevertheyare removed the Observation answers from the previous variable they had used and loaded the answers from another file off the google.com server. Meanies ;)
Post a Comment

<< Home
This public blog will be a place for me to output any Security findings, both technological and physical, that I have come about. I will post Security advisories I was apart of, and also other interesting bits of knowledge. email: xavier [at] tigerteam.se

Rocks Clusters <=4.1 mount-loop local root
Rocks Clusters <=4.1 umount-loop local root
TSEAD-200606-6 - Rocks Clusters <=4.1 local root
xorgmodroot.py - Xorg-server 1.0 / <=X11R6.9.0-7.0 local root
TSEAD-200509-5 - Multiple Netscape.com vulnerabilities.
TSEAD-200512-3 - Multiple vulnerabilities in KISBG <=v5.1.1
fsigk_exp.py - FSIGK for Linux <=2.10-431 local root
TSEAD-200510-4 - FSIGK for Linux <=2.10-431 advisory
ritk.php - remote inclusion pentest tool
owm_exp.py - openwebmail <=2.51+ local root
perliodebug_exp.py - perlIO_debug 5.8.* local root
bankfix.py - bank card number lookup tool
TSEAD-200412-2 - AOL XSS/file read vuln
TSEAD-200412-1 - AOL redir vuln

September 2005 / October 2005 / November 2005 / December 2005 / March 2006 / April 2006 / May 2006 / June 2006 / July 2006 / September 2006 / October 2006 /