reverse-engineering

Make an app wirelessly connect to an Xbox 360 (ala Connect360, Rivet, Vuze)

Programs like Connect360, Rivet, and Vuze can wirelessly connect to an Xbox 360 and share videos and pictures on your Mac with it. How do they do this? The simplest answer would be that Microsoft offers some sort of API, but I haven't been able to find one. Furthermore, the programs I listed have wildly different feature sets, and Micro...

Can i reverse engineer my own dll?

Hi folks, We've got a .NET project at work, which we lost (human error). The person who wrote the code said she had three projects in the solution => one webform, one winform and one class library. Now, we have the final DLLs and website. Is there anything we can do with this? For the class library, I was thinking about using Reflect...

How to estimate FPGA utilization for designing a work a like core?

I was considering some older generation FPGA's to interface with a legacy system. So I want a good way of estimating how much space is necessary to replace an ASIC given its transistor count. Does Verilog versus VHDL affect the utilization? (According to one of our contractors it affects the timing, so utilization seems likely.) What...

Adding custom struct types to strace

I'm trying to reverse-engineer a user-mode shared object that interacts with a kernel driver via ioctl syscalls. I have a header file with definitions for the kernel driver's ioctl interface (i.e. #defines for ioctl command numbers, and struct definitions for the various data sent to ioctl). I see that strace has the ability to de-refe...

convert ASM to C (not reverse engineer)

I googled and I see a suprising amount of flippant responses basically laughing at the asker for asking such a question. Microchip provides some source code for free (I don't want to post it here in case that's a no-no. Basically, google AN937, click the first link and there's a link for "source code" and its a zipped file). Its in AS...

Hacker proofing a jar file

What techniques could I use to make my "jar" file Reverse Engineer proof? ...

How do I go about reverse engineering a UDP-based custom game protocol with nothing other than Wireshark?

How do I go about reverse engineering a UDP-based custom game protocol with nothing other than Wireshark? I can log a bunch of traffic, but then what? My goal is to write a dissector plugin for Wireshark that will eventually be able to decode the game commands. Does this seem feasible? What challenges might I face? Is it possible the com...

Reversing an MD5 Hash

I have passwords stored in a database using md5, and was wondering if there was a way to reverse the hash to email the user's password to him in case they forget it. If that's not the most appropriate method, what is the appropriate method for dealing with a lost password? ...

How can I reverse engineer an existing workflow in moss

I know that we can reverse engineers sites definitions and other sharepoint moss entities but can we take a workflow that has been created via the UI and reverse engineer it to a vs.net based workflow? ...

C# - Executables decompilable (can be reverse engineered)?

Is that right that C# can be reverse engineered? How is easy to do that? Can we say the C# is not enough good from safety aspect? And what about C++ compared with C# against decompiling? ...

How to make sure that your code is secure?

I am a programmer. I have about 5 years experience of programming in different kind of languages. I was concerning about my code speed, about optimizing the memory that uses my code, and about good coding style and so on. But have never thought how secure my code is. So I have disassembled my code to see what can do a hacker. Would it be...

Reversing CRC32

I'm looking for a way to reverse a CRC32 checksum. There are solutions around, but they are either badly written, extremely technical and/or in Assembly. Assembly is (currently) beyond my ken, so I'm hoping someone can piece together an implementation in a higher level language. Ruby is ideal, but I can parse PHP, Python, C, Java, etc. ...

gdb not hitting breakpoints

To learn a bit more about FreeBSD and *nix systems in general, I'm starting to look at the binaries from the DEFCON 17 Capture The Flag game. Right now, I'm reversing the tucod binary. Here's some possibly useful information on tucod: tucod: ELF 32-bit LSB executable, Intel 80386, version 1 (FreeBSD), for FreeBSD 7.2, dynamically link...

Fix bugs in .NET program without access to source

I have a program i frequently use that is made with .NET. This program has a small bug that is very annoying and the developer to the app is nowhere to be found. I have found the location of the problem in reflector and just want to add a single if-statement here and then recompile the program. What is the easiest way to do this? I ha...

How can I determine which framework was used to build a particular Windows desktop application?

How can I determine which platform or programming language was used to build a particular Windows desktop application? ...

How can you reverse engineer a binary thrift file?

I've been asked to process some files serialized as binary (not text/JSON unfortunately) Thrift objects, but I don't have access to the program or programmer that created the files, so I have no idea of their structure, field order, etc. Is there a way using the Thrift libraries to open a binary file and analyze it, getting a list of th...

Get a look at the temporary files a process creates

I'm trying to reverse-engineer a program that does some basic parsing: text in, text out. I've got an executable "reference implementation" and the source code to what must be a different version, since the compiled source output != executable output. The process creates and deletes temporary files very quickly in a multi-step parsing ...

reverse engineering in symfony

I have a database. I am trying to reverse engineer using symfony to create schema.yml. I get this error message: [propel-schema-reverse] There was an error building XML from metadata: SQLSTATE[HY000]: General error: 2030 This command is not supported in the prepared statement protocol yet I can generate the schema.xml using Creole but ...

Which methods and class will Safari call when it's launched?

I want to class-dump methods and class of safari launching for get the DOM OBJECT in the webpage. But I didn't know which methods and class will be called when it launch ? Thank you very much ! ...

Reverse Engineering steps

Everyday we are reading through large amounts of code not well documented. Understanding the code by jumping into it might not be easy for everyone until they have an idea about the code structure. If you have to reverse engineer code and want to bring it into some diagrammatic form, what steps do you follow? I know there are tools, li...