top of page
piotranarrunrata

Decompiler Installshield Scripting: How to Extract and Modify InstallShield Cabinet Files



I want the setup.rul file of one of the installshield exe that we have which was made using InstallShield 2012 I believe but I am unable to find any way on how to reverse engineer an InstallScript project from the installation media files i.e. its exe and get the setup.rul files which has the installscript code written in it.


[3] If the script isSetup. RebootIt indicates that the version is relatively high, which is produced by 6.x and 7.x. This is basically used now. You can use InstallShield decompiler and InstallShield 6/7 script decompiler to decompile the source code. InstallShield decompiler is a DOS window, which can be output to view the source code. InstallShield 6/7 script decompiler is a graphical interface and can edit the operator. However, it does not support Chinese characters well.




Decompiler Installshield Scripting




ThereforeSetup. RebootIn general, we first use InstallShield decompiler to export the script source code, get the correct Chinese information, and write down the offset address and machine code. Run InstallShield 6/7 script decompiler to open the script file and compile and modify the file according to the obtained offset address.


Then, find sensitive information such as "serial number error" in the TXT file. You can see the offset address before, and write it down to InstallShield 6/7 script decompiler to modify the script. Now there is no example to explain, it's boring.


XtremeMac, there is a installshield decompiler here I would take a look at those, I have not yet as I just found it, but I am going to soon...the only thing I can see is there is a version it doesnt go past, so if the installer is made with a newer version, it prolly wont work, but there ya go.


If you want to determine in more detail what is different between two MSI files (for example version 1 and 2 of a package), you can get a little more involved using a proper MSI file viewer or MSI decompiler.


IMHO, there is no need to do so. This could be easily done via scripting. NSIS allows you to access command line parameters. See NSIS documentation ->Appendix C: Useful Scripts -> Get command line parameters.


The previous two commenters are only thinking of optionsavailable to developers. It's not that developers are unableto create installers with flexible silent options, it's thatthey don't bother to. This feature request is aimed atmaking silent installations easier for USERS, not givingNSIS script writers more scripting options. I'm talkingabout administrators that need to easily deploy anapplication to many desktops with absolutely no userinteraction, or people that want to quickly install all oftheir favorite programs at once, such as from an unattendedWindows install disk (see \).Currently, if an application's installer does not allow youto silently set the options you require, it has to be"repackaged" instead, which means you lose all thelogic/checking that was in the installer and just know whatfiles/registries were changed. There is currently no way Iknow of to decompile NSIS installers and set the options Iwant, therefore being able to add these options with NSISscript is useless. Some NSIS installers don't even obey thesingle /D=C:\Bla parameter for the install directory! I knowthis is the developer's fault, and usually they just wreckedthat functionality accidentally. But seriously, when wouldNSIS script authors EVER need to disable command line options?


2ff7e9595c


0 views0 comments

Recent Posts

See All

Baixar jogo de speed runner

Download do jogo Speed Runner: como encontrar e jogar os melhores jogos Se você gosta de jogar videogame, já deve ter ouvido falar em...

Comments


bottom of page