reverse-engineering

iOS 8 - How to determine the foreground app as well as get list of running apps

空扰寡人 提交于 2019-12-03 11:21:55
On iOS 7.0 and below, SBFrontmostApplicationDisplayIdentifier from the Springboard framework specified the app running in the foreground, but that capability has been blocked (considered as a vulnerability, see the Common Vulnerabilities and Exposures page dedicated to it here ) in iOS 8. Does anyone have an iOS 8 alternative for this? It is not possible to do it on iOS 8 since a vulnerability was discovered. More info here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4361 来源: https://stackoverflow.com/questions/26161001/ios-8-how-to-determine-the-foreground-app-as-well-as-get-list

How to unzip, edit and zip an android apk

我的梦境 提交于 2019-12-03 10:42:55
问题 I have an android apk and I deleted my source code and dont have the project again, I want to change the version code of the old apk. my question is how do I unzip and repack the apk so I can use the. am using a mac system. I saw so many things for windows but i couldnt find for mac.I need help please 回答1: You want to use APKTool. It will handle the unzip and rebuild for you: http://ibotpeaches.github.io/Apktool/ 回答2: The simplest method is executing unzip command: unzip xxx.apk -d xxx A

Raw floating point encoding

删除回忆录丶 提交于 2019-12-03 09:41:08
Update The original question is no longer the appropriate question for this problem, so I'm going to leave this alone to demonstrate what I tried/learned and for the background. It's clear that this is not just a "Base64 variation" and is a bit more involved. Background: I program in python 3.x mainly for use with the open source program Blender. I'm a novice/amateur level programmer but I understand the big concepts fairly well I've read these articles relevant to my question. Wikipedia on Base64 Base64 can get you pwned (pdf) stackoverflow discussion Some others Problem: I have a binary file

Any tool/software in windows for viewing ELF file format? [closed]

只愿长相守 提交于 2019-12-03 09:27:44
问题 Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for Stack Overflow. Closed last year . There are lots of PE file browsers. Here is a list of good ones if you are interested: PE File format viewers: PE Explorer http://www.pe-explorer.com/ PE VIew: http://www.magma.ca/~wjr/ PEBrowse Professional http://www.smidgeonsoft.prohosting.com/pebrowse-pro-file-viewer.html PE Browse Professional Interactive -

Replicate Netflix login and generate cookie

送分小仙女□ 提交于 2019-12-03 09:07:20
Since there is no official public Netflix API anymore, I'm trying to reverse engineer some things on my own. But I'm kind of stuck at the login. What I'm doing: GET request on https://www.netflix.com/Login Follow the redirects to end up on something like /Login?locale=en-DE Extract the authURL value (required for the login POST later on) GET request on https://assets.nflxext.com/us/ffe/siteui/logging/clientNotifications.min.20150626.js [Failed] Generate and set the "cL" cookie from the content of that JavaScript POST request on https://www.netflix.com/Login?locale=en-DE using the following

Anti-debug using prefetch queue doesn't work with my cpu

梦想的初衷 提交于 2019-12-03 09:05:17
Why does this code enable me to detect a debugger? The link above told me the way to use prefetch queue to anti-debug, then I tried to use the code below to test, but I failed. Can anyone help me point out if my code is wrong. My cpu is Intel(R) Core(TM) i7-2630QM 2.00GHz. Thanks a lot ML : D:\Programs\masm32\Bin\ML.EXE /c /coff /Cp /nologo /I"D:\Programs\masm32\Include" "AntiDebug.asm" Link : D:\Programs\masm32\Bin\LINK.EXE /SECTION:.text,RWE /SUBSYSTEM:WINDOWS /RELEASE /VERSION:4.0 /LIBPATH:"D:\Programs\masm32\Lib" /OUT:"AntiDebug.exe" "AntiDebug.obj" It always executes the debug label no

Changing the package name

梦想与她 提交于 2019-12-03 08:59:36
I planned to change the package name through smali(reverse) when I open up apktool.yml, I saw this forced-package-id: '127' I have tried to change it but it crash why should i do? Assuming your goal is to rename the package name of the apk, the package names used for the classes are irrelevant. The package name of the apk is mostly unrelated to the package names of any classes in the apk. And there's no reason you need to touch the package id. I would recommend unpacking the apk with apktool, and then edit the apktool.yml, setting renameManifestPackage to the new package name. Then when you

What exactly does _malloc do in assembly?

北战南征 提交于 2019-12-03 08:58:43
问题 public main main proc near push ebp mov ebp, esp and esp, 0FFFFFFF0h sub esp, 30h mov dword ptr [esp], 8 ; size call _malloc mov [esp+2Ch], eax mov dword ptr [esp+4], 4 mov eax, [esp+2Ch] mov [esp], eax call __start The code above represents a portion of a large project I am working on. I am trying to reverse this code into C equivalent but I am having difficulty understanding how malloc works. I am figuring 8 bytes would be the size of the memory being allocated; however, I am not sure about

How would you reverse engineer this?

泄露秘密 提交于 2019-12-03 08:50:19
I've got some code that was at the bottom of a php file that is in javascript. It goes through lots of weird contortions like converting hex to ascii then doing regex replacements, executing code and so on... Is there any way to find out what it's executing before it actually does it? The code is here: http://pastebin.ca/1303597 You can just go through it stage by stage - since it's Javascript, and it's interpreted, it needs to be its own decryptor. If you have access to a command-line Javascript interpreter (such as the Console in Firebug ), this will be fairly straightforward. I'll have a

Monitoring API calls [duplicate]

[亡魂溺海] 提交于 2019-12-03 08:18:56
This question already has an answer here: Hook processes 5 answers I am doing some reverse engineering and want to know which APIs are called from the executable. I am mostly interested in the APIs called on a particular Windows system DLL. I guess one way to do that is to get all APIs exposed from the DLL using dumpbin and put breakpoints on all those from Windbg. Any other approach? This seems like lot of time if I need to monitor many system DLLs. BTW, I am working on Windows XP and want to monitor one executable which calls some Windows system DLL functions. Agnel Kurian http://www.rohitab