reverse-engineering

Raw floating point encoding

∥☆過路亽.° 提交于 2019-12-04 15:34:05
问题 Update The original question is no longer the appropriate question for this problem, so I'm going to leave this alone to demonstrate what I tried/learned and for the background. It's clear that this is not just a "Base64 variation" and is a bit more involved. Background: I program in python 3.x mainly for use with the open source program Blender. I'm a novice/amateur level programmer but I understand the big concepts fairly well I've read these articles relevant to my question. Wikipedia on

Can I combine all the sections “Objdump -S -d elf-file” generate into a re-assemble capable file?

[亡魂溺海] 提交于 2019-12-04 15:32:33
THe elf file is static linked and currently the objdump's output is something like: Disassembly of section: .init: xxxxxx Disassembly of section: .plt: xxxxxx Disassembly of section: .text: xxxxxx basically what I want to achieve is "elf-file -(disassemble by objdump)-> assemble file --(re-compile)--> same functionality " I don't need the re-compiled binary has the binary content same as the original one, only same functionality is enough. After a quick search, basically the answer is no , and they argued that disassemble file lost some stuff like symbolic information or others, but I think by

Android: Java: Proguard: How to: verify if my jar (different jar project)/apk are successfully processed? (I am thinking to reverse engineer it)

醉酒当歌 提交于 2019-12-04 15:09:03
I successfully processed my jar and apk. Then, want to verify if is it truly hard to reverse engineer or truly did the obfuscation. I am thinking to try to reverse engineer it by myself to see what I did. But don't know how to do it. For manual reverse engineering, you can try dex2jar and then Java Decompiler . I assume you have a set of tests (unit/functionality). Run them against the obfuscated jar file. They should pass as if you had the original program. 来源: https://stackoverflow.com/questions/7478809/android-java-proguard-how-to-verify-if-my-jar-different-jar-project-apk-ar

Wrapping Visual C++ in C#

☆樱花仙子☆ 提交于 2019-12-04 14:39:57
I need to do some process injection using C++ but I would prefer to use C# for everything other than the low level stuff. I have heard about "function wrapping" and "marshaling" and have done quite a bit of google searching and have found bits of information here and there but I am still really lacking. Things I have read in order of usefulness; http://msdn.microsoft.com/en-us/library/ms235281(VS.80).aspx http://www.drdobbs.com/cpp/184401742 http://geeklit.blogspot.com/2006/08/calling-c-lib-from-c.html How can I wrap all the lower level stuff (native C++) in C# so I can easily command those

Changing the package name

痴心易碎 提交于 2019-12-04 14:25:29
问题 I planned to change the package name through smali(reverse) when I open up apktool.yml, I saw this forced-package-id: '127' I have tried to change it but it crash why should i do? 回答1: Assuming your goal is to rename the package name of the apk, the package names used for the classes are irrelevant. The package name of the apk is mostly unrelated to the package names of any classes in the apk. And there's no reason you need to touch the package id. I would recommend unpacking the apk with

Biztalk Orchestration reverse engineer

自作多情 提交于 2019-12-04 12:58:41
My situation is: Old developer left without the code so I can not add any enhancement or fix the bug. Do we have any service/tool that I can reverse the Orchestration (+ Mapping) to original format (from DLL/MSI, or Running BizTalk application)? If the reverse won't work I would like to see the Orchestration flow like the Visual studio designer. That's is good enough for me to trace everything You have several options Use a de-compiler (such as .NET Reflector ). You can then extract a string that is the contents of the ODX file as well as the XSLT for any maps. (I copied the string called

Monitoring API calls [duplicate]

女生的网名这么多〃 提交于 2019-12-04 12:57:34
问题 This question already has answers here : Hook processes (5 answers) Closed 5 years ago . I am doing some reverse engineering and want to know which APIs are called from the executable. I am mostly interested in the APIs called on a particular Windows system DLL. I guess one way to do that is to get all APIs exposed from the DLL using dumpbin and put breakpoints on all those from Windbg. Any other approach? This seems like lot of time if I need to monitor many system DLLs. BTW, I am working on

Find out CRC or CHECKSUM of RS232 data

*爱你&永不变心* 提交于 2019-12-04 12:50:23
I need to communicate with a RS232 device, I have no specs or information available. I send a 16 byte command and get a 16 byte result back. The last byte looks like some kind of crc or checksum, I have tried using this http://miscel.dk/MiscEl/miscelCRCandChecksum.html with no luck. Anyone can reverse engineer the crc/checksum algorithm? here is some data captured with an RS-232 monitor program: 01 80 42 00 00 00 00 00 00 00 00 00 00 00 01 B3 01 80 42 00 00 00 00 00 00 00 00 00 00 00 02 51 01 80 42 00 00 00 00 00 00 00 00 00 00 00 03 0F 01 80 42 00 00 00 00 00 00 00 00 00 00 00 04 8C 01 80 42

How would you reverse engineer this?

我的梦境 提交于 2019-12-04 12:33:32
问题 I've got some code that was at the bottom of a php file that is in javascript. It goes through lots of weird contortions like converting hex to ascii then doing regex replacements, executing code and so on... Is there any way to find out what it's executing before it actually does it? The code is here: http://pastebin.ca/1303597 回答1: You can just go through it stage by stage - since it's Javascript, and it's interpreted, it needs to be its own decryptor. If you have access to a command-line

Understanding disassembly of Dalvik code?

百般思念 提交于 2019-12-04 12:31:43
问题 I am playing around with smali and baksmali on a small Hello World Android application I have written. My source code is: package com.hello; import android.app.Activity; import android.os.Bundle; public class Main extends Activity { /** Called when the activity is first created. */ @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.main); } } which was then disassembled to: .class public Lcom/hello/Main; .super Landroid/app