Главная
Study mode:
on
1
Intro
2
Introduction
3
What is it
4
Problems
5
Solutions
6
Sony Dynamic Network Authentication
7
New DNAs Connect
8
Cheat Devices
9
Overwrite Memory
10
Packets
11
Whats in the packet
12
Prime numbers
13
Payloads
14
XOR
15
Missing lobbies
16
Packet capture
17
Crypto
18
Results
19
Player Stats
20
Strings
21
Magic Numbers
22
Player Sets
23
Online Games
24
DMCA
25
Questions
Description:
Explore the intricacies of reverse engineering defunct protocols in this 31-minute DefCamp 2014 conference talk titled "Cyber Necromancy: Reverse Engineering Dead Protocols." Delve into the world of Sony Dynamic Network Authentication, cheat devices, and packet analysis. Learn about overwriting memory, decoding payloads, and understanding cryptographic elements in online gaming protocols. Discover techniques for extracting player statistics, deciphering magic numbers, and reconstructing player sets. Gain insights into the challenges posed by defunct protocols and the innovative solutions employed by security specialists. The talk covers various aspects of cyber necromancy, including packet capture, crypto analysis, and the implications of DMCA on reverse engineering efforts.

Cyber Necromancy - Reverse Engineering Dead Protocols - DefCamp - 2014

DefCamp
Add to list
0:00 / 0:00