reverse-engineering

How would I reverse engineer a cryptographic algorithm?

孤者浪人 提交于 2019-12-03 03:19:50
问题 I wrote an application that encrypts text in this way: Get the input text Reverse the text Convert to hexadecimal XOR with a key Base64 encode Now, I didn't do a lot of encryption/encoding myself, so my question might sound stupid, but, say I get a file which has a content from the above algorithm and I didn't know about this algorithm. How would one start "breaking" the text, are there any guidelines, principals, rules to follow? My question is not tied to those 5 steps, that was a pure

GCC C++ Exception Handling Implementation

蓝咒 提交于 2019-12-03 02:58:26
I would like to know how GCC implements exception handling for C++ programs. I couldn't find an easy-to-understand and self-explanatory article on the Web (although there are many such articles for Visual C++). All I know is that GCC's implementation is called DWARF exception handling. I have written a small C++ program and translated it into assembly with the command: g++ main.cpp -S -masm=intel -fno-dwarf2-cfi-asm The main.cpp and main.s files are given here. Could anyone please explain the contents of the main.s file, especially the sections .gcc_except_table and .eh_frame line-by-line? (My

Assembly language for Reverse Engineering [closed]

旧街凉风 提交于 2019-12-03 02:32:24
问题 As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. Closed 7 years ago . What should I choose NASM or MASM for learning assembly. I want to learn assembly, motivation being Reverse Engineering. So that when

Has anyone reversed engineered the protocol used by Apple's iOS Remote app for controlling an Apple TV over IP?

烂漫一生 提交于 2019-12-03 02:06:07
I'm curious if it's possible for me to write programs that can control an Apple TV, specifically an Apple TV 4th gen running tvOS 9.1.1, like Apple's Remote app for iOS can. I'd like to send it commands for navigating in the four cardinal directions, selecting an item on the screen, going up the navigation stack -- essentially what Apple's Remote app can do. Has anyone done any work reverse engineering the protocol it uses? Cursory Googling only has so far yielded out of date results about earlier generation Apple TVs and the DAAP protocol which looks like something different than what I want.

How to unzip, edit and zip an android apk

折月煮酒 提交于 2019-12-03 01:14:07
I have an android apk and I deleted my source code and dont have the project again, I want to change the version code of the old apk. my question is how do I unzip and repack the apk so I can use the. am using a mac system. I saw so many things for windows but i couldnt find for mac.I need help please You want to use APKTool. It will handle the unzip and rebuild for you: http://ibotpeaches.github.io/Apktool/ The simplest method is executing unzip command: unzip xxx.apk -d xxx A directory xxx will be generated to store unzipped files. Actually, .apk files are same as .zip files. Execute command

Any tool/software in windows for viewing ELF file format? [closed]

我与影子孤独终老i 提交于 2019-12-03 00:06:07
There are lots of PE file browsers. Here is a list of good ones if you are interested: PE File format viewers: PE Explorer http://www.pe-explorer.com/ PE VIew: http://www.magma.ca/~wjr/ PEBrowse Professional http://www.smidgeonsoft.prohosting.com/pebrowse-pro-file-viewer.html PE Browse Professional Interactive - http://www.smidgeonsoft.prohosting.com/pebrowse-pro-interactive-debugger.html I'm still working on windows & I want to view the ELF files. Are there any tools? I'm googling but couldn't find any till now. bdmcbri readelf and objdump are both excellent utilities if you are on a Unix box

What exactly does _malloc do in assembly?

我们两清 提交于 2019-12-02 22:57:38
public main main proc near push ebp mov ebp, esp and esp, 0FFFFFFF0h sub esp, 30h mov dword ptr [esp], 8 ; size call _malloc mov [esp+2Ch], eax mov dword ptr [esp+4], 4 mov eax, [esp+2Ch] mov [esp], eax call __start The code above represents a portion of a large project I am working on. I am trying to reverse this code into C equivalent but I am having difficulty understanding how malloc works. I am figuring 8 bytes would be the size of the memory being allocated; however, I am not sure about this line. mov eax, [esp+2ch] What does malloc do to eax? Furthermore would this be equivalent C code?

How is the photoshop cutout filter implemented?

笑着哭i 提交于 2019-12-02 21:11:17
Photoshop has a lot of cool artistic filters , and I'd love to understand the underlying algorithms. One algorithm that's particularly interesting is the Cutout filter (number 2 at the link above). It has three tunable parameters, Number of Levels, Edge Simplicity, and Edge Fidelity. Number of levels appears to drive a straightforward posterization algorithm, but what the other sliders do technically eludes me. I would think that they're doing something related to Vornoi diagrams or k-means partitionion, but poking around on wikipedia hasn't resulted in anything that maps obviously to what

Reverse Engineering Flash [closed]

烂漫一生 提交于 2019-12-02 20:57:24
As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. I have some Flash SWF files that I need some insight into how they are working. Are they any good tools out there to reverse engineer a SWF file? Thanks. Disassemble the SWF with Flasm . Note: Only works for flash 8 or earlier unfortunately. SWFTools might

Deconstructing Pokémon glitches?

谁说我不能喝 提交于 2019-12-02 18:52:02
(I apologize if this is the wrong place to ask this. I think it's definitely programming related, though if this belongs on some other site please let me know) I grew up playing Pokémon Red and Blue, games that were great fun but are somewhat notorious for having numerous exploitable glitches (for example, see this ridiculous speedrun of the game that uses memory corruption to turn the item screen into a hex editor). Recently, I found an interesting speedrun of the game that uses a glitch called the "ZZAZZ glitch" to corrupt important memory locations and allow the player to almost immediately