reverse-engineering

How can I reverse engineer my JavaScript files with js/uml?

丶灬走出姿态 提交于 2019-12-04 04:44:23
Goal My goal is to get an UML model out of my JavaScript project (consisting of several .js files) and store it as XMI. How far I've come I searched the internet and found out js/uml is the first place to go. I've managed it to get the js/uml plugin running with Eclipse 3.7.1 (Win32) and a local installation of my pre-downloaded additional plugins: mdt-uml2tools-Update-incubation-I201103290512.zip (installs required org.eclipse.uml2.diagram.clazz 0.10.0) jsuml-eclipse-0.8.4.zip (only works with Eclipse 3.7.1 (Indigo)) I loaded the provided example project jsuml-example-yui-0.8.4.zip into

Bestpractice approaches for reverse engineering VB6 code with out knowledge of the domain

旧巷老猫 提交于 2019-12-04 04:03:39
问题 target state: Porting VB6 Code into C#, undertake the whole project with all conceivable processes that are involved. What would be your approach if you do not have knowledge about the domain? There is nearly any documentation, just legacy code (up to 100.000 - 300.000 lines of code and comments vb6 files that contain up to 14.000 lines of code) written in VB6. 回答1: Disclaimer: I work for Great Migrations We rewrite large VB6/ASP/COM applications to .NET (primarily C#) for a living and we

Fix bugs in .NET program without access to source

那年仲夏 提交于 2019-12-04 03:00:51
I have a program i frequently use that is made with .NET. This program has a small bug that is very annoying and the developer to the app is nowhere to be found. I have found the location of the problem in reflector and just want to add a single if-statement here and then recompile the program. What is the easiest way to do this? I have tried using the export-function in reflector but it doesn't seem to work perfectly. For example alot of using-directives are missing and enums that are cast back and forth to ints are also not exported properly. I believe i can fix this with some work but i'm

How to decompile c++ dll? [duplicate]

久未见 提交于 2019-12-04 02:21:50
问题 This question already has answers here : How does one disassemble Pro*C/C++ programs? [closed] (3 answers) Closed 6 years ago . I am doing research on reverse engineering. I am able to decompile .net dll files with reflector. But in reflector we can't decompile c++ dll files. Is there any other decompiler available to decompile c++ dll Files? 回答1: It's not that easy. C++ gets translated into (sometimes) very optimized machine code. There's a detailed article on http://www.codeproject.com

Is it legal to reverse engineer binary file formats [closed]

蓝咒 提交于 2019-12-04 00:03:54
Is it legal to add support for a 3rd party file format in my application by reverse engineer a unencrypted binary file format from another application, and reading the contents? Depends on your location. In the EU it is specifically permitted (article 6 EU software convention) to "reverse engineer file formats for the purpose of interoperability" In general it's hard to prevent someone reading a file format, there have been examples where you are prohibeted from writing a file because the format contains patented technology (if software patents are allowed in your country). This was the case

Trying to reverse engineer a function

冷暖自知 提交于 2019-12-03 22:00:33
问题 I'm trying to understand assembly in x86 more. I have a mystery function here that I know returns an int and takes an int argument. So it looks like int mystery(int n){} . I can't figure out the function in C however. The assembly is: mov %edi, %eax lea 0x0(,%rdi, 8), %edi sub %eax, %edi add $0x4, %edi callq < mystery _util > repz retq < mystery _util > mov %edi, %eax shr %eax and $0x1, %edi and %edi, %eax retq I don't understand what the lea does here and what kind of function it could be.

How can `kernel32.dll` export an ordinal of 0, when its `OrdinalBase` field is set to 1?

ぐ巨炮叔叔 提交于 2019-12-03 21:36:42
Looking at kernel32.dll as it is loaded into memory, I see the following export ordinal table: (gdb) x /400hd $eax 0x776334b0 <Wow64Transition+71576>: 3 4 5 6 7 8 9 10 0x776334c0 <Wow64Transition+71592>: 11 12 13 14 15 16 17 18 0x776334d0 <Wow64Transition+71608>: 19 20 21 22 23 24 25 26 0x776334e0 <Wow64Transition+71624>: 27 28 29 30 31 32 33 34 0x776334f0 <Wow64Transition+71640>: 35 36 37 38 39 40 41 42 0x77633500 <Wow64Transition+71656>: 43 44 45 46 47 48 49 50 0x77633510 <Wow64Transition+71672>: 51 52 53 54 55 56 57 58 0x77633520 <Wow64Transition+71688>: 59 60 61 62 63 64 65 66 0x77633530

How can I determine which framework was used to build a particular Windows desktop application?

半城伤御伤魂 提交于 2019-12-03 17:41:28
How can I determine which platform or programming language was used to build a particular Windows desktop application? Igal Tabachnik There are several ways to try and detect in which language a particular software was written. Usually, the tools that do that examine the PE Header and try to make an educated guess. Sometimes authors compress/encrypt the PE in such way that makes this detection next to impossible. There is an old tool called PEiD which can help you identify in which language was the software written. the_mandrill The Dependency walker may also shed some light by showing all the

Finding constants from a decrypted iOS app executable

送分小仙女□ 提交于 2019-12-03 17:35:11
I'm trying to find a constant (something like a secret token) from inside of an iOS app in order to build an app using an undocumented web API (by the way, I'm not into something illegal). So far, I have the decrypted app executable on my Mac (jailbreak + SSH + dumping decrypted executable as file). I can use the strings command to get a readable list of strings, and I can use the class-dump tool ( http://stevenygard.com/projects/class-dump/ ) to get a list of interface definitions (headers) of the classes. Although this gives me an idea of the app's inner workings, I still can't find what I'm

Load a Mac binary as a dynamic library

江枫思渺然 提交于 2019-12-03 17:01:02
问题 I am doing some reverse engineering with a binary executable without sources. On Windows what I can do is load an executable file (EXE) with LoadLibrary, just as it was a DLL file. If the loaded file is not relocatable I can simply relocate my loader code to "make space" for the other module. When I have the binary loaded, I can call it's functions (assuming I where where they are, of course), and do other stuff. Is there some way to do the same or similar on Mac? I have a mach-o executable,