TransWikia.com
  1. All Categories
  2. Reverse Engineering

Reverse Engineering : Recent Questions and Answers (Page 36)

Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.

Decoding messages sent/received by Python websocket client

I am using the websocket module for my client in python3, and I am trying to troubleshoot some errors I am getting that lead to the client disconnecting after seemingly...

Asked on 12/27/2020 by FlackOverstow

0 answer

apk crashed on launch when re-signed with debug key

I sometimes decompile and recompile apks and make changes (like changing graphics, text etc...) normally I use apktool to decompile and recompile and then use testsign.jar to resign the apk...

Asked on 12/26/2020 by garbb

1 answer

Calling imported DLL functions from an injected DLL?

If I have injected my own DLL into an executable (a game specifically) which imports a DLL to draw its graphics, camera, etc. How can I go about calling the...

Asked on 12/26/2020 by Nikita Buyevich

1 answer

can a stdout captured at a parameter to python script

I'm working on a CTF challenge that is find a secret password.This secret password base on the username and password that i input and the hash value had print out...

Asked on 12/25/2020 by y_man

1 answer

How to go to the variable's stored location directly in decompiler mode of IDA?

When i'm debugging a code in decompiler mode, one problem i face is that when i double click on a variable, it goes to "stack locations" instead of the actual...

Asked on 12/25/2020 by Notoriouss

0 answer

The Graph view in Cutter is empty

Following this question, I'm trying to figure out how cscript.exe parses the .wsh Windows Script Host control files. First I tried WinDbg, but Radare2-Cutter seems like a much...

Asked on 12/23/2020

1 answer

How the return address of the notesearch program was calculated in "The Art Of Exploitation"

I am reading the book "The Are Of Exploitation" 2nd Edition by Jon Erikson and there is something I don't understand about the calculation of the return address. In page...

Asked on 12/23/2020 by E235

0 answer

Bypass anti memory dump with process hacker and dump the malware?

I have a malware that has some sort of anti dumping technique, so when i dump a region of memory with process hacker it dumps a 0 byte file, i...

Asked on 12/20/2020

0 answer

[Please help]Same code but doesn't work on server

I copied encryption code from jadx-gui and place for my own java class.The result of my code is the same pattern as the orignal apkbut mine doesn't work...

Asked on 12/20/2020 by johns yager

0 answer

Getting empty files using firmware modification kit

im having trouble to extract a file system of a ZTE zxv10 h201 router. Im a beginner in reverse engineering so I am probably doing something wrong. This is what...

Asked on 12/19/2020 by tehcereal

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP