reverse-engineering

Best way to inject functionality into a binary...

What would be the best way of inserting functionality into a binary application (3d party, closed source). The target application is on OSX and seems to have been compiled using gcc 3+. I can see the listing of functions implemented in the binary and have debugged and isolated one particular function which I would like to remotely call....

Is reverse engineering evil?

Lately I've been pondering on how a specific beloved old game actually works. I had some mild progress, but then a friend pointed out that if I really loved the game and appreciate it, I wouldn't try to reverse-engineer it. Note that the game is long considered an abandonware and is offerd for download publicly in lawful game sites, an...

What are the best ways to understand an unfamiliar database?

What kind of approaches and techniques can you employ to become familiar with an existing database if you are tasked with supporting and/or modifying it? How can you easily and effectively ramp up your knowledge of a database you have never seen before? ...

Open source ER diagramming tool for mysql

I want to reverse engineer (import into diagram form) the database definition dump of a database I have, then since no foreign keys are defined in this particular database, I want to be able to manually create the table to table key mappings (using crow feet notation if possible). I've taken a look at MySQL Workbench, and it gets me 85%...

Wrapping Visual C++ in C#

I need to do some process injection using C++ but I would prefer to use C# for everything other than the low level stuff. I have heard about "function wrapping" and "marshaling" and have done quite a bit of google searching and have found bits of information here and there but I am still really lacking. Things I have read in order of u...

Is there a program to decompile Delphi?

Someone just sent me a decompile of a program into C. It was a very good decompile, producing nice, mostly readabe C code (if you overlook the fact that none of the variables or functions had a human-readable name) that mostly looked like it would actually compile. There was one big problem, though. I happen to know that the program h...

Searching for my source code in a binary-only product

Let say I have a project that I have released under GPL, with the sources available to anyone. Later I find a very similar product, but as closed source, distributed binary-only by someone else. Is there a good way to find out they are using my source code in their product? If the solution is to somehow reverse-engineer the binary, is ...

Have you ever used code virtualizer or vmprotect to protect from reverse engineering?

I know that there is no way to fully protect our code. I also know that if a user wants to crack our app, then he or she is not a user that would buy our app. I also know that it is better to improve our app.. instead of being afraid of anticracking techniques. I also know that there is no commercial tool that can protec our app.... I al...

ORM/MDA/UML tool for VB6

I know of Rational Rose and we have got Rational Rose 6. But I am looking for some other tools which are more usable, which do not complain that they are not running in Windows 98/2000 (when installed and run in WinXP) and has got better features as compared to Rational Rose 6. ...

Has there been any serious effort made to reverse engineer the Amazon MP3 store azn file format?

Since the Amazon MP3 store launched in the UK, I really want to write a downloader application for my phone so I can buy mp3s wherever I am and listen to them without hassle. However, first I need to reverse engineer the amazon .azn file format it supplies to the downloader app. The outer layer is obvious, it is simply base 64 encoded. H...

How do you determine what technology a website is built on?

Quite often I come across a nice looking or functional website, and wonder what technology was used to create it. What techniques are available to figure out what a particular website was built with? Few frameworks seem to include any kind of generator meta tag like web editors do. Are there any tell-tale signs of particular languages a...

Anyone know of a decent free DB schema reverse engineering tool?

Looking for a tool that will automatically create a graphical representation of a MySQL DB schema from a live database, showing tables, columns, and relationships (an ER diagram). Ideally something that would run on OS X would be great but I'll take what I can get and run it on a different machine if necessary. I checked Google and del....

Finding and using memory offsets in an existing program?

Most game botting applications use a series of memory offsets they have found for that particular version of a game client to facilitate botting. They might have a memory offset for health, x/y position, etc. Every time the game releases an update the offsets for the various pieces of information the bot program uses must be re-found a...

How would you reverse engineer this?

I've got some code that was at the bottom of a php file that is in javascript. It goes through lots of weird contortions like converting hex to ascii then doing regex replacements, executing code and so on... Is there any way to find out what it's executing before it actually does it? The code is here: http://pastebin.ca/1303597 G-M...

How can I inspect form data being Posted?

I am reverse engeneering an app and I need to see what is in the post data without viewing the form source, is a there a decent app/plugin to see what is being posted? Any Browser on Windows I'm looking for something other then packet sniffing. ...

How can I protect MySQL username and password from decompiling?

sadly Java Classes can be decompiled pretty well, how can I protect my database if I have to use the login data in the code? ...

What's a good, free serial port monitor for reverse-engineering?

I'm reverse-engineering a serial protocol and getting frustrated by bad tools. Does anyone know of a good, free tool for logging data to/from serial ports on Windows? Requirements: Must be free Must not take control of the port (i.e. must hook the file APIs or the kernel rather than trying to open the device) Must have some sort of f...

Python Applications: Can You Secure Your Code Somehow?

If there is truly a 'best' way, what is the best way to ship a python app and ensure people can't (easily) reverse engineer your algorithms/security/work in general? If there isn't a 'best' way, what are the different options available? Background: I love coding in Python and would love to release more apps with it. One thing that I w...

Where can I get a list of all MSIL codes and their hex values?

Does anyone have a list or chart of all MSIL codes and their corresponding hex values? ...

Is there a tool to allow inspecting .NET objects in a running process?

I was thinking about a tool to inspect objects at runtime, primarily for reverse-engineering and I'm wondering if such a thing exists. The way I was thinking about it was that you had two views, a graph of objects and a class list. From the class list, you can select a class and see the instances of it, either in a list or in the graph...