
"Screenshots won't get you in", but Chrome DevTools will.

Reverse Engineering is a community about all aspects of RE!
Please be kind to each other!
"Screenshots won't get you in", but Chrome DevTools will.
After over two decades, players are now forbidden from flying a seaplane, all thanks to undefined code behavior.
Adventures of My Oven (Pinocchio) with ChipWhisperer
You probably wouldn't consider power analysis & fault injection being a required skill set for your oven repair person. But when your oven is actively lying to you and not just broken, a new type of repair is needed beyond just replacing a heating element. This talk starts from a common complaint: h...
Hacking a Rechargeable Lamp With Non-Standard USB-C Connector
Click to view this content.
How does BadUpdate (hypervisor exploit) work
Click to view this content.
In this post we discuss how to commuinicate with an unsupported chip using OpenOCD and review how to write flash programming algorithms in OpenOCD. We also demonstrate how to flash custom firmware to the target device.
From black screens and boot issues to rendering quirks and PAC puzzles, here’s what we learned getting iOS to finally say hello.
Anyone able to help me determine the contents of this "pu.jp" file?
Hi, so am doing some research on some free vpns, and in one of them found a random google drive url, that downloads a "pu.pj" file. While the internet says .pj files belong to a nintendo64 emulator, I am not able to use it to open the pj-file. The contents of the pj- file is a 4608 long of ASCII characters. Which i've tried to decode but dont seem to be able to. However, the Linux command "file -C pu.pj" does give a bunch of strings, but it contains a bunch of random stuff, im not sure what to make of it. Anyone able to help me pinpoint this?
(ill re-upload if necessary) The contents of "pu.pj" here: https://paste.centos.org/view/953ab256 The contents of "file -C pu.pj" here: https://paste.centos.org/view/abfbdefc
Interesting findings within a VPN app
cross-posted from: https://slrpnk.net/post/8481443
I am currently investigating and reverse engineering free VPNs for a master thesis, and just came across something I thought I'd share. Not sure if I'll name-drop the VPN that this code is from, but it's not the one mentioned within the hardcoded links... Nor do I encourage visiting any of the links in the screenshot.
I'm sharing this as a warning as to never use free vpns! They are most often the opposite of what they promise to be. (by free I do not mean the free versions of premium services). But either way; be careful about your VPN choice, as they have access to a lot of sensitive data. I'm sure most peeps here know of this already, but next time you hear someone using a free vpn, let them know...
This first image/code was sitting inside a file called NetworkModule, with some hella weird external links.
BinaryNinja Cloud
Binary Ninja Cloud is a completely free, online, collaborative reverse engineering suite, which uses Binary Ninja for analysis.
Is binja cloud abandoned? I liked the idea of a shared database, especially for CTF problems but it doesn’t really seem like the cloud option is supported. Apparently it was for ML training data for binja but I haven’t seen any new features related to ML in binja either…
Problem Statement You attempt to analyze a binary file compiled in the Rust programming language. You open the file in your favorite disassembler. Twenty minutes later you wish you had never been born. You’ve trained yourself to think like g++ and msvc: Here’s a loop, there’s a vtable, that’s a glob...
Ghidra 10.3.1 released!
What's New Change History Installation Guide SHA-256: 0413b679436039cc136b950a6d8c24e80ce79da0a0a48993dfacee671b1c7974
Improvements!