TransWikia.com
  1. All Categories
  2. Reverse Engineering

Reverse Engineering : Recent Questions and Answers (Page 15)

Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.

What is the mdisp field in RTTI for throw used for?

First of here is the article from which I'm looking up the fields. I was trying out different combinations to see how they affect the RTTI for...

Asked on 06/23/2021

1 answer

Detect which type of SSL Pinning is being used on Android Applications

Is there a way to detect what the Android Application is using as SSL Pinning. Whether it is certificate Pinning , Public Key Pinning or Hash Pinning ? I am...

Asked on 06/23/2021 by Angele Aquilina

0 answer

Writing a file with radare2 `w`?

Radare2 supports a w which writes a string.w foobar write string 'foobar'However, it doesn't seem to work...

Asked on 06/21/2021 by I Support The Boycott

3 answer

debugging a android built in shared library (which comes with android rom)

suppose I have a .so file (android built-in shared object ) {lets suppose a camera .so file } now I am writing an android application and using high-level API provided...

Asked on 06/20/2021 by NOOB Gamer

0 answer

Hooking an interface method with Frida in an Android application

I'm trying to understand what an android application is sending over the network and as such am trying to hook into it with Frida, specifically a method called storeKeys ....

Asked on 06/19/2021 by OBones

0 answer

On reverse engineering an udp protocol to control a drone

My goal is to control my drone with my raspberry pi using python and not the app that is being delivered together with it. First I connected the app to...

Asked on 06/15/2021

1 answer

Analyzing a Composite Document File V2 Document MSI Installer malware

I have a malware to analyze with md5sum - 000cbfb28e750f2e321551c03e4fe488When I run the command on linux : file {malware-file-name} it shows :Composite Document File V2 Document, Little Endian,...

Asked on 06/15/2021

0 answer

Decompilation of CIL code into some high level code - do I need to introduce new variables during data flow analysis?

I'm writing a compiler from .NET CIL code to some high level language. Process is similar to decompilation. I have done some control flow analysis - detecting loops, ifs, and...

Asked on 06/12/2021 by Zmirlacz

1 answer

How to force run a method triggered with a series of keys in a game?

This is my first time asking something on SE and I'll do the best I can to provide all of the required information, but I apologize in advance if I'm...

Asked on 06/11/2021 by SplitHorizon

2 answer

How to calculate Opcode Length from Ollydbg

Suppose I reverse a dll, and searching for a Function, say for instance Send(), I have reversed the ws2_32.dll now How Can i calculate the number of bytes from there...

Asked on 06/10/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP