reverse-engineering

How to deobfuscate this JavaScript code? [duplicate]

狂风中的少年 提交于 2020-01-03 05:43:05
问题 This question already has answers here : Closed 7 years ago . Possible Duplicate: Decode obfuscated JavaScript Question: I have the following javascript code: var _0xe91d=["\x28\x35\x28\x24\x29\x7B\x24\x2E\x32\x77\x2E ... x5F\x63\x6F\x6E\x74\x5F\x64\x75\x72\x7C\x76\x5F\x74\x61\x62\x73\x5F\x61\x6C\x69\x67\x6E\x7C\x76\x5F\x74\x61\x62\x73\x5F\x64\x75\x72\x7C\x76\x5F\x73\x63\x72\x6F\x6C\x6C\x7C\x63\x6F\x6E\x74\x5F\x61\x6E\x69\x6D\x7C\x63\x6F\x6E\x74\x5F\x66\x78\x7C\x74\x61\x62\x5F\x66\x78\x7C\x72

How does ltrace() display rand()

纵然是瞬间 提交于 2020-01-03 04:40:12
问题 When ltrace hits a rand function, it shows it with 4 paramters, like this: rand(0, 0x5649bd4e6010, 0x7f0955490760, 0x7f09551cf7b0) = 0x17382962 rand doesn't take any arguments. What is ltrace showing here? Edited to add example: #include <stdio.h> #include <stdlib.h> #include <time.h> int main() { srand((unsigned int)time(NULL)); int r = (rand() % 4096); printf("The number is: %d\n", r); } Compile and run with ltrace: $ ltrace ./demo __libc_start_main(0x4005f6, 1, 0x7ffe1e719fa8, 0x400650

Tried to reverse engineer my app, but got some weird-looking file tree

匆匆过客 提交于 2020-01-01 19:28:17
问题 I lost the code from all the apps I built last year (thunder against my hard disk, no backup for any app). As they were rather simple apps, I put them under reverse engineering process. I have already done this a dozens of time in the past, each time I had no problems at all (if we do not count hours of work to put together all the files into a single project). I have already finished 3 apps I lost during hard disk burnout. They were reversed almost flawlessly, but I got stuck with this one.

Find out CRC or CHECKSUM of RS232 data

六眼飞鱼酱① 提交于 2020-01-01 11:46:10
问题 I need to communicate with a RS232 device, I have no specs or information available. I send a 16 byte command and get a 16 byte result back. The last byte looks like some kind of crc or checksum, I have tried using this http://miscel.dk/MiscEl/miscelCRCandChecksum.html with no luck. Anyone can reverse engineer the crc/checksum algorithm? here is some data captured with an RS-232 monitor program: 01 80 42 00 00 00 00 00 00 00 00 00 00 00 01 B3 01 80 42 00 00 00 00 00 00 00 00 00 00 00 02 51 01

Reverse Engineering?

冷暖自知 提交于 2020-01-01 09:26:29
问题 I have *.ipa file which is the iphone application. Is that possible to use reverse engineering in that ipa and extract code..? 回答1: Well, its not really a hacking but it can surely help you identify some parts of the UI... Do the following: 1- Create a new project on the Xcode (doesn't really mater what you choose) 2- Connect your device to your computer 3- Profile your project on your device. 4- On the Profile, pick Core Animation 5- On the options choose Color Blended Layers It will look

How can I reverse engineer my JavaScript files with js/uml?

a 夏天 提交于 2020-01-01 09:18:18
问题 Goal My goal is to get an UML model out of my JavaScript project (consisting of several .js files) and store it as XMI. How far I've come I searched the internet and found out js/uml is the first place to go. I've managed it to get the js/uml plugin running with Eclipse 3.7.1 (Win32) and a local installation of my pre-downloaded additional plugins: mdt-uml2tools-Update-incubation-I201103290512.zip (installs required org.eclipse.uml2.diagram.clazz 0.10.0) jsuml-eclipse-0.8.4.zip (only works

How can `kernel32.dll` export an ordinal of 0, when its `OrdinalBase` field is set to 1?

狂风中的少年 提交于 2020-01-01 07:22:05
问题 Looking at kernel32.dll as it is loaded into memory, I see the following export ordinal table: (gdb) x /400hd $eax 0x776334b0 <Wow64Transition+71576>: 3 4 5 6 7 8 9 10 0x776334c0 <Wow64Transition+71592>: 11 12 13 14 15 16 17 18 0x776334d0 <Wow64Transition+71608>: 19 20 21 22 23 24 25 26 0x776334e0 <Wow64Transition+71624>: 27 28 29 30 31 32 33 34 0x776334f0 <Wow64Transition+71640>: 35 36 37 38 39 40 41 42 0x77633500 <Wow64Transition+71656>: 43 44 45 46 47 48 49 50 0x77633510 <Wow64Transition

Reverse Engineering a C# Solution

China☆狼群 提交于 2020-01-01 03:27:11
问题 I know Visual Studio 2010 Ultimate has some abilities, and I would normally do this by instinct, but I am on a very tight schedule. I also have Visio 2010 installed and integrated into VS, but its reverse engineer function doesn't seem to do much, and has to be run on a per project basis, and a hindrance here is the solution structure, with several solution folders each holding a multitude of projects. I would like some advice on how to go about reverse engineering a C# solution into

How to reverse engineer an Xcode project from an app?

只愿长相守 提交于 2019-12-30 11:54:07
问题 Xcode deleted my project and everything is gone. The only thing that I have is the app in my iPhone 6. So is there any way that I can retrieve the Xcode project of the app? .. Update .. i found all the files now i just need to reassemble them in a new project . but I don't know how . 回答1: Unfortunately, There is no current way to un-archive an app. You must have the .xcodeproj file in order to make changes. The .ipa is useless in terms of editing or changing your app. And if there was a way

executable sections flag

纵饮孤独 提交于 2019-12-30 10:32:33
问题 The sections of Portable Executable files are tagged with differents flags. Can someone explain the difference between IMAGE_SCN_MEM_EXECUTE (the section can be executed as code) and IMAGE_SCN_CNT_CODE (the section contains executable code)? Thanks. 回答1: IMAGE_SCN_MEM_EXECUTE is the one that is actually used by the PE loader to set up page permissions. IMAGE_SCN_CNT_CODE is not used, I guess it's just a descriptive flag. 来源: https://stackoverflow.com/questions/3912129/executable-sections-flag