Newest Questions
9,848 questions
0
votes
0
answers
8
views
How to calculate extra checksum in LIN bus data frame?
I'm trying to understand the format of the data sent over the LIN bus in a Volvo car.
I read a few frames from register 00. One loop looks like this:
40 00 44 01 00 00 00 01
40 00 95 03 00 00 00 01
...
0
votes
0
answers
18
views
HPE Gen10 SmartMemory Authentication Bypass: Need help identifying the secondary Digital Signature/HMAC in SPD
I am currently engaged in a deep reverse engineering challenge concerning the HPE SmartMemory authentication mechanism used in ProLiant Gen10 servers (specifically tested on a DL380 Gen10).
The goal ...
0
votes
0
answers
23
views
Is my flash dumped properly?
I am trying to dump a Macronix MX35LF1GE4AB NAND SPI flash chip. The way I do is via a custom pytohn script implemented upon: https://github.com/pc-magas/MX35LF1GE4AB_dump
The core logic is to iterate ...
0
votes
2
answers
68
views
Is this control flow graph reducible to a clear if/else chain?
I'm working on a decompiler for a language for which I only have the bytecode. I have this graph (and several others with similar patterns) for which I can't seem to figure out the actual pseudo-code ...
0
votes
1
answer
30
views
Vehicle Checksum Help
I have two long files, both with encrypted data at the top, when diffing both files the only parameters that change are the parameter itself and the checksum (last 4 bytes of data). If i have a pair ...
0
votes
0
answers
31
views
Annotating I/O address space addresses and bits
I'm trying to reverse engineer an old embedded system that has a NEC v40 on it, which is very similar to an 80186 (more like 80188) I guess. As a member of the x86 family, it has a separate I/O memory ...
0
votes
1
answer
29
views
Analyze task_struct in linux kernel
I have a Linux kernel that I open with Ghidra.
There is a task_struct that I want to map all the fields. The problem is that os big struct (around 3000 bytes) and have lot of ifdef in the source code.
...
0
votes
0
answers
24
views
Why does UTM Virtual Machine hang when windbg's break on access used with @esp
System Details (taken from details listed by UTM about the VM):
- Windows 10 Home Edition Virtual Machine via UTM running on ARM MacBook Pro M4
- Emulates x86_64: Standard PC (Q35 + ICH9, 2009) (alias ...
0
votes
0
answers
71
views
Why can't Frida function properly on Android 11?
I'm a beginner with Frida. When I first started using Frida, I encountered an error.
Android version: 11
frida-server version: 17.0.7
└─$ pip list | grep frida
frida 17.0.7
...
0
votes
0
answers
59
views
Why would a compiler generate such useless wrapper functions?
I am starring at a lot of assembly code for the Espressig ESP32 (Tensilica/Cadence Xtensa LX6 core) recently and I've been asking myself why I see a lot of functions which look like the following:
...
3
votes
0
answers
40
views
How to find out in what way an Android program stores persistent data?
I am currently researching a facial recognition attendance system for Android. I would like to know how it stores the list of people who have attended.
In my opinion, apart from sockets, the only way ...
0
votes
0
answers
23
views
How to disable Frida Protect on apps? cocos2d
Has anyone managed to disable Frida's protection in mobile games?
I'm not using an emulator, just a mobile phone.
I need to get information at the beginning of the game as soon as it opens, because ...
0
votes
0
answers
21
views
cocos2d libcocos TianJi
I've been working for a while on decoding libocos files from the company TianJi Information Technology Inc.
I tried using ida Pro debugger and Frida, but they have blocking mechanisms. I tried using ...
0
votes
1
answer
389
views
Why after patching (x32dbg/OllyDbg) a simple binary, executed triggers UAC and launches new shell window instead of running on present as original?
I am modifying and testing a very basic Windows executable made by me (using an old 32 bit gcc[MinGW] compiler and an up-to-date Windows 11), to start doing very basic reversing from a program ...
0
votes
0
answers
33
views
Help me solve a steganograhy challenge!
(original png)
It's a multi level challenge. While examining through zsteg I found 2 zlib compressed file and a binary executable. I have uncompressed one of the zlib which gave long hex string, which ...
0
votes
0
answers
64
views
How can I create FLIRT signature files for IDA V5.0?
I’m using IDA Version 5.0 to disassemble 16-bit DOS utilities (later versions of IDA don’t fully support 16-bit DOS code).
These utilities were created using custom (not commercial) libraries. I have ...
0
votes
0
answers
27
views
Is there a way to determine from an nanoMIPS ELF file whether floating point registers are used in the ABI?
I have a nanoMIPS binary that uses the __adddf3 low-level functions to software-emulate floating point. It's clearly intended to be used on a machine with no floating point hardware. Is there a ...
0
votes
0
answers
39
views
Is it legal to make a custom client from scratch for a game with SDK?
What I'm going to do is writing a client for Half-Life, that can connect to a server, process it's packets and reply with new packets, as if it was a normal game's client. There's plenty of custom ...
1
vote
1
answer
176
views
How can I forge a minimal C program that analyzed through ROPgadget catches at least one sub rsp, {some-offset} ; ret?
Is just a very concrete question. If is it possible to write a C program (and how) that once passed through ROPgadget app, it throws, at least, this/one/a: sub rsp, 0x{some-offset} ; ret
I would like ...
0
votes
0
answers
41
views
Ghidra: How to merge two functions separated by a few bytes which cannot be disassembled
i have a PowerPC RE project with a large function (about 3600 lines in decompile) which several times a day Ghidra by itself decides to split in two parts, since there are a few bytes it cannot ...
0
votes
0
answers
176
views
How can I extract/decompile Lua code from a Unity Android game?
I'm currently creating a private server for a game that closed almost a year ago, and I'm stuck at a point where my server has to respond to the game to populate the server list.
The problem is that I ...
0
votes
0
answers
18
views
Kernel object code coverage?
I research kernel object (ko file that loaded into kernel) in Android aarch64 .
Is there any way to make code coverage to kernel object? That ko don't print any log to kmesg.
Maybe is there any way to ...
0
votes
1
answer
194
views
Installing python's labeless (needs protobuf) module and then linking it with x64dbg/x32dbg as a plugin
I am trying to install the labeless plugin for x64dbg (and IDA Pro) in Windows 11 (64 bit). I don't know why I am not succeeding. Perhaps packages are incomplete, because are too old (as tutorials [e....
0
votes
0
answers
39
views
How to let Ghidra support exact CPU PowerPC 603/604?
I am having trouble with interleaved ROMs on Ghidra. It does not disassemble the binary instructions to the expected assembly language.
I am trying to find out how to turn tire wear off in the arcade ...
1
vote
0
answers
151
views
Decoding .dat files in the Unity game
I'm localizing a Unity IL2CPP game. All data files, as well as localization files, are encrypted in a custom .dat format. I'm currently trying reverse engineering to decode them.
I found out that the ...
0
votes
0
answers
69
views
Hooking decryption functions in IL2CPP Unity game: Classes/methods not found at runtime despite dump.cs output
I've been working on reverse engineering a Unity game (IL2CPP) to analyze its encryption methods, but I've hit several roadblocks and would appreciate guidance from more experienced reversers.
What I'...
0
votes
0
answers
47
views
Decompiling techniques to achieve round-trip?
I have some object code produced by a Fortran compiler, which claims to be optimizing, for a legacy mainframe platform. I am trying to figure out the source code which would compile to the same object ...
0
votes
0
answers
40
views
Help: serial works only when debugger attached — crackme ID 67124a279b533b4c22bd16a1
Hey folks — stuck on this crackme:
https://crackmes.one/crackme/67124a279b533b4c22bd16a1
I found a serial that only works when the debugger is attached. Run the EXE normally and the serial gets ...
0
votes
0
answers
28
views
Is there any checksum for *.abs files, if so where is it located?
I am trying to replace an old YouTube API key from my old STB receiver firmware.
I first dumped my receiver firmware to my USB, located the YouTube API key in the firmware file at 4126535 (0x3ef747 in ...
0
votes
0
answers
40
views
Trying to compile GhidraEmulatorUI, problem with Eclipse Jython and Ghidra 11.4.2
I am developing Ghidrascripts with Eclipse Version: 2025-09 (4.37.0).
I want to compile the module GhidraEmulatorUI, GhidraEmulatorUI
but Eclipse does not find class GhidraPythonInterpreter used in a ...
0
votes
1
answer
66
views
Huawei HG8145C Router PPOE Password Decyption
I have tried every tool to decrypt the following PPOE password but I failed. Does anyone know how to decrypt it? I Wana shift it to my new Router for Better Wifi Signal.
PPOE Password:
...
1
vote
0
answers
53
views
Transfer function names from IdaPro to x64dbg
IdaPro newbie question here: I have analyzed an Delphi executable with Ida and the function names and variables were "demangled" as in
.text:00000000008008AE loc_8008AE: ; CODE XREF: ...
0
votes
0
answers
82
views
How to retrieve specific instructions from an app's source code
I decompiled the code of an Android app. I'd like to find the portion of code that forces the user to update when a new version is detected. This is, however, complicated due to the significant amount ...
0
votes
0
answers
71
views
IDA Pro Python: How to programmatically set a persistent decompiler type for a local variable (like pressing "Y")?
In IDA Pro 8.4 (Hex-Rays), I want to replicate what pressing Y on a local variable does: change its type so
The declaration updates,
All uses are rewritten (casts added if needed),
The change ...
2
votes
1
answer
222
views
Is there a procedure to disassemble ROMs with a header?
I would like to disassemble some of the ROMs of an ancient computer, an IBM System/23 Datamaster, but I am lost. The computer has a ROM from which it performs IPL and the rest of them have some sort ...
1
vote
0
answers
72
views
IDA Pro 9.1 displaying wrong values of local variables in locals window
Could you please advise on how to resolve the issue with variable display in the Locals window during debugging?
When execution is halted at a breakpoint at the beginning of a function, the variables ...
0
votes
0
answers
68
views
Ghidra assembling the wrong jump address
I am trying to change a JC instruction to a JMP instruction, but keep the same jump address. When I tried using the assemble function in ghidra.app.plugin.assembler.AssemblyBuffer it kept changing the ...
0
votes
1
answer
164
views
code coverage for Ida /Ghidra
Long time ago I used lighthouse that attach Frida and output a file that I can load to Ida to see code coverage .
I see that the repo is not maintenance. 1. 2 etc.
Do you know another tool that do ...
0
votes
0
answers
59
views
Nvidia DLSS data extraction - IDAPro
I have a display from TurzX where I can display CPU, GPU, etc info. I want to show the DLSS version and preset in the display. The reason for this is I just want to disable the in-game DLSS overlay ...
0
votes
1
answer
368
views
What does "unpacks" mean in the phrase "Unpacks an 64-bit integer" in the context of pwntools function u64()?
Can somebody explain the unpacking/packing concept in this context?
(Packing can mean different things in computing, like for example, compressing different numbers to make the most of the space in a ...
0
votes
1
answer
376
views
Reverse engineering Google's Block Breaker
I am building an AI agent to play this Block Breaker game by Google. My goal is to provide my agents with precise information about the game state, but also the ability for me to manipulate the game ...
0
votes
0
answers
99
views
Can't use PIN Tracer by IDA Pro debugger
IDA Pro's debugger has a PIN Tracer.
To use the PIN Tracer, I installed the PIN and built idadbg64.dll.
I referred to https://docs.hex-rays.com/user-guide/debugger/debugger-tutorials/debugger_pin and ...
16
votes
1
answer
5k
views
Reverse engineering images from an old Japanese videogame
I am trying decode some images from an old Japanese videogame. I am not very good at reverse engineering, nor at programming, and I can't make sense of what file format this is or how to go about ...
0
votes
1
answer
86
views
Workaround/debug ELF 32-bit executable returning "terminate called after throwing an instance of 'std::logic_error'"?
I'm trying to run Piracálculos, a game made for the OLPC XO. I downloaded the .xo file, renamed it to .zip, extracted it, and then tried to work with the sugarPiracalculos file at /Piracalculos....
0
votes
1
answer
88
views
What is the decoding of the Matsushita/Panasonic MN103 instruction F0 C0
I'm writing a MN103 disassembler for the Reko decompiler. I'm basing the disassembler on documentation like MN1030/MN103S Series Instruction Manual (Pub.No.13250-040E). The sample binaries I have ...
0
votes
0
answers
69
views
Reverse engineering of firmware update files for Crumar Mojo Classic
Hello all,
The Crumar Mojo Classic is a type of organ (the musical kind, not the body kind) that tries to emulate the old Hammond/B3 organ sounds that are well known from Rock, Jazz et cetera as ...
0
votes
0
answers
103
views
Need help reverse engineering a android unity game
so I'm trying to extract assets like sounds and images out of a game called Road To Valor: WW2. I pulled the apks and eventually got to a file called resourcemain. I set its extension to bundle and ...
0
votes
1
answer
185
views
Found a conhost command on clipboard after visiting website for reverse phone lookup
conhost cmd /c powershell /ep bypass /e ...
0
votes
0
answers
44
views
I am looking to decrypt this file type (.hds), and import it into a custom code, but I need help
The vendor is charging thousands for a software that can do much more than I need... I need the following:
Take the .hds file, and import it into a python program in a pandas dataframe or numpy array. ...
0
votes
1
answer
122
views
How to reverse engineer communication encryption logic from the application?
I would like to reverse engineer a communication protocol encryption (ccTalk BNV), where I have access to the following:
a windows application (test program), that can send unencrypted and encrypted ...