The VTech Socratic Method (the teardown of a VTech’s computer from the 90´s) https://www.leadedsolder.com/2025/04/22/vtech-socrates-pickup.html #teardown #retro #reverseengineer
The VTech Socratic Method (the teardown of a VTech’s computer from the 90´s) https://www.leadedsolder.com/2025/04/22/vtech-socrates-pickup.html #teardown #retro #reverseengineer
2/2…the technology necessary to produce them . You can only #ReverseEngineer your way up to the edges of your own knowledge. The drop offs are usually steep.
There are a few things in all this that are extremely troubling. If you want to understand #NHI tech the most obvious thing would be to go to the source. So far the best the cave dwellers can come up with is retrieving crash materials or causing crashes and then retrieving. Not good but about what you’d expect.This will not end well
Excited to conduct my 5th guest lecture at George Mason University on February 14th 6pm where we have another juicy #Embedded #CTF where they are given the firmware in .uf2 format and will need to #ReverseEngineer the binary and figure out a way to attack its wireless access point. This is part of a larger #DEFCON #DC540 Chapter CTF series. Link below with the story and the binary! Hope to see you there! #ReverseEngineering https://github.com/mytechnotalent/dc540-0x00008
Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into t hat function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!
#GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.
How important is it for kids to learn #Python in 2025? With the explosion of #AgenticAI the abstractions will widen as the complexity of the #RAG and #Transformerarchiture grows. We need a generation that can successfully #ReverseEngineer these models when they begin to wreak havoc. https://youtu.be/b4V13Lvk_jM?feature=shared
I’d love to try and #ReverseEngineer the Yoto Mini (https://uk.yotoplay.com/yoto-mini) — if anyone has/has access to a broken one, I’d love to buy it off you ☺️
This thing is asking me to #reverseengineer its outdated pairing app, not available anymore for newer android versions, to be able to use it. #walledgarden #obsolescence
After I got frustrated with the layout of my code, I took another crack at transcribing the open source portion of the project that's inspiring me. I came much further along in understanding the logic, all except for how they calculate what the top end of the progress bar should be. Their method was so off the wall and I plugged in a few test values to find out that it basically doesn't even work. So I came up with my own methodology and it turns out I almost perfectly nailed the way Excel calculates the maximum of an axis for a graph. I have yet to decide whether or not to be insulted by this. #cplusplus #arduino #reverseEngineer
broke the thread but https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036909 it's not directly in https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2024/04/windows10.0-kb5036909-x64_786040b0b0d000b17d6a727ea93ff77d733d1044.msu
I'll let a better #ReverseEngineer take over from here.
Michael Karcher (#OSINT #ReverseEngineer) about #xz #backdoor #obfuscating #regex:
"the code does not contain any ASCII strings, neither in clear text nor in obfuscated form. Instead, it recognizes all relevant strings using one single deterministic finite automaton..." (DFA ~= regex)
"... script that decodes the tables for the table-driven DFA and outputs the strings recognized by it accompanied with the "ID" assigned to the terminal accepting state"
https://github.com/karcherm/xz-malware
@natsume_shokogami @fuchsiii @gamingonlinux *nodds in agreement*
AFAIK all those #Projects are doing #Cleanroom #Emulation because that has been de-jure safe from litigation in terms of claims fo "using stolen IP/trade secrets/documentation" as they basically fuzz around to make stuff work.
In fact, even big corporations like #EA did that: In order to pressure #SEGA to give them a better #Licensing deal for #Megadrive / #Genesis game releases they did cleanroom-#ReverseEngineer the #CopyProtection system (unlike #Atari / #Tengen they didn't blatantly copy code!) and then basically went to SEGA and told them that if they don't get the deal the way they want it they'd release their compatible cartridges and not pay a single cent to the Platform Owner...
And SEGA did bow before them.
- - -
#Nintendo's arguments against #yuzu are as flimsy as those against the #GameGenie were:
Both neither allow #piracy of retail games nor allow running #homebrew on retail systems.
That happened due to fuckups by Nintendo & #nvidia:
https://www.youtube.com/watch?v=xQmN-cxg21M
Unlike the #MIGswitch which is basically a #piracy #cartridge allegedly made by #TeamXecuter...
https://www.youtube.com/watch?v=53ttoD8GYJE
Next Friday at #gmu #georgemasonuniversity I will present my 3rd guest lecture where we will #reverseengineer a real-world scenario which is an #OT #IT #hack on the #powergrid. We will use #ghidra and #reverse a stripped binary and undo a #vuln in #bonded and #encrypted #bluetooth #ble #bluetoothlowenergy. #reverseengineering
In a message to Eric Migicovsky (CEO of Beeper, a 3rd party iMessage service), a 16 year old developer claimed that he reverse engineered Apple iMessage.
Astounded by the claim, the Beeper team looked into the claim & his prototype to find that it actually worked. They were able to register the Android device as if it's an iPhone and was able to send/receive messages as if nothing is amiss.
After months of work, Beeper is now releasing the Beeper Mini app which allows an Android device directly send/receive iMessage with Apple's servers without the use of relay servers. At launch, the app will cost US$2/month.
While something like this is a novelty outside of the US. For a market like the US while iMessage dominates, this can be a game changer (assuming it doesn't get legally shut down by Apple).
For more: www.theverge.com/2023/12/5/23987817/beeper-mini-imessage-android-reverse-engineer
#iMessage #ReverseEngineer #Android #Beeper #Messaging #MessageApps
#MichaelCohen testified that #Trump directed him to #ReverseEngineer the stmnts to reach TFG’s desired #NetWorth.
#Cohen began calmly & clearly about his role at the #TrumpOrganization, where he reported directly to Trump.
“I was tasked by Mr. Trump to increase the total assets based upon a number that he arbitrarily elected,” Cohen testified, saying that it was his responsibility to “increase those assets in order to achieve the number.”
Why #Rust is such an issue to #ReverseEngineer?
fn main() {
let tup = (1337, 3.14, 42);
let (x, y, z) = tup;
println!("x: {x}");
println!("y: {y}");
println!("z: {z}");
let x = [1, 2, 3];
let one = x[0];
let two = x[1];
let three = x[2];
println!("one: {one}");
println!("two: {two}");
println!("three: {three}");
}
This simple program's Assembler results in the following screenshots.