reverse-engineering

Swift reverse engineering:swift function name rule?

安稳与你 提交于 2019-12-09 04:08:41
问题 I have a question about swift function name rule. As I tried in IDA Pro to analyze a iOS app (Maybe OS X is the same case) written in swift, such as swift-2048, I got function name like this : EXPORT __TFC10swift_204811AppDelegate27applicationWillResignActivefS0_FCSo13UIApplicationT_ __text:00022FAC __TFC10swift_204811AppDelegate27applicationWillResignActivefS0_FCSo13UIApplicationT_ ... __text:00022FCC __TToFC10swift_204811AppDelegate27applicationWillResignActivefS0_FCSo13UIApplicationT_

Reverse Engineering the DOM, Javascript events & “what's going on”?

好久不见. 提交于 2019-12-08 17:30:40
问题 I'm trying to figure out what's going on in the javascript of Google's live page preview. Why aren't the links I'm adding to the DOM with Javascript clickable? (for a bit more context) http://chesser.ca/2010/11/google-visual-image-search-hack-marklet/ for the "latest demo" If you search on google, the results come up on page via live search. Then, if you mouseover one of the magnifying glasses in your result set, a number of things happen. the mousover event for the magnifying glass fires

I have apk file, Is it possible to get android studio project from apk?

随声附和 提交于 2019-12-08 15:35:04
问题 I have completed apk file, but lost my project. Is it possible to get android studio project from my apk file? If possible, which tools can I use? I want IDE tool name, tried with dex2jar, but not works. 回答1: I don't think it is possible however you can the kind of files, resources, used packages, etc from the apk. But i doubt if you can see the actual code. 来源: https://stackoverflow.com/questions/54339913/i-have-apk-file-is-it-possible-to-get-android-studio-project-from-apk

Reverse engineering a Docker deployment on private cloud

隐身守侯 提交于 2019-12-08 08:52:49
问题 I am working on a software that has to be deployed on private cloud of a client. The client has root access, as well as hardware. I don't want the client to reverse engineer our software. We can control two things here: we have access to a secure port of the server, which we can use to send tokens to decrypt the code, and shut it down if necessary; we can do manual installation (key in a password at the time of installation) or use Tamper resistance device if we have to. Can a Docker

Entity Framwork 7.0.0-rc1-final reverse engineer from existing db “Database first”

你说的曾经没有我的故事 提交于 2019-12-08 07:00:20
问题 I am doing reverse engineering in my project. because our project we follows database first approach. Through this command, i achieved reverse engineering but not with RevEng command. dnx ef DbContext Scaffold "Server=databasename;Database=data;UserID=*;Password=*;" EntityFramework.MicrosoftSqlServer I have tried many things but still unable to find RevEng command under the ef . In a project, i am using "commands": { "web": "Microsoft.AspNet.Server.Kestrel", "ef": "EntityFramework.Commands" }

tool to trace application without code changes?

白昼怎懂夜的黑 提交于 2019-12-08 06:09:12
问题 I've inherited a rather large WPF application, and I need to generate application traces for a significant portion of it. Because of the complexity of the project, I'd like to do this without making any changes to the code base, if possible. I mostly need to know the stack deltas, ie when a function call or return takes place. Is there a tool or methodology that will get me this trace with (preferably) no code changes? Is this even possible to do without writing a tool to add Trace calls to

should I store an encription key as hardcoded in my iOS or Android App

萝らか妹 提交于 2019-12-08 05:04:40
问题 I plan on using One-Time Password encription for the comunication between the server and the client(which is a mobile app). But I need to hardcode the key in the mobile App. So all my mobile Apps installed by different users will have the same key. How easy is to reverse engineer on the builds for Android and iOS and extrat the hardcoded value? some other infomation about the security I plan: I plan also to add extra security by sending each user an SMS with a 4 digit number that will be used

What Is the Algorithm Behind Photoshop's “Black and White” Adjustment Layer?

若如初见. 提交于 2019-12-08 05:04:13
问题 I did lot's of research but I didn't find anything (but I also don't know what kind of keywords to search for exactly). I want to be able to convert an input RGB image to grayscale but I want to be able to add more or less Reds/Yellows/Greens/Cyans/Blues/Magentas like in Photoshop . Do you know what are the equation or where I can found these equations so that I can implemented my own optimized RGB to Grayscale conversion? Edit : In Photoshop it is called Black/White adjustment layer . I have

Reverse engineering a Docker deployment on private cloud

自古美人都是妖i 提交于 2019-12-08 04:29:28
I am working on a software that has to be deployed on private cloud of a client. The client has root access, as well as hardware. I don't want the client to reverse engineer our software. We can control two things here: we have access to a secure port of the server, which we can use to send tokens to decrypt the code, and shut it down if necessary; we can do manual installation (key in a password at the time of installation) or use Tamper resistance device if we have to. Can a Docker deployment prevent our client from reverse engineering our code? We plan to open a single port and use SSL to

RE - IDA finding function offset

孤者浪人 提交于 2019-12-08 01:49:08
问题 I am just starting out with Reverse Engineering. I've created a small C++ ConsoleApplication and I am trying to call the NewFunction via an injected DLL. void NewFunction() { DWORD dwImageBase = (DWORD)GetModuleHandle(NULL); std::cout << "ImageBase: " << ToHex(dwImageBase) << std::endl; std::cout << "NewFunction: " << ToHex((DWORD)&NewFunction) << std::endl; std::cout << "Offset: " << ToHex((DWORD)&NewFunction - dwImageBase) << std::endl; } Example Output: ImageBase: F90000 NewFunction: