gl2gb/public/categories/reverse-engineering/index.xml

74 lines
5.6 KiB
XML

<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>reverse engineering on GoatPr0n.farm</title>
<link>https://goatpr0n.farm/categories/reverse-engineering/</link>
<description>Recent content in reverse engineering on GoatPr0n.farm</description>
<generator>Hugo -- gohugo.io</generator>
<language>en</language>
<lastBuildDate>Thu, 28 Nov 2019 12:01:53 +0000</lastBuildDate>
<atom:link href="https://goatpr0n.farm/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reverse Engineering of a Flash Programmer :: EZP2010</title>
<link>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</link>
<pubDate>Thu, 28 Nov 2019 12:01:53 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</guid>
<description>Preface In today&amp;rsquo;s adventure I like to take you with me on my journey of reverse engineering another USB device. The EZP2010 is an USB programmer for flash memory as used by mainboard manufactures to store the BIOS, or embedded devices to store the firmware (or settings). When it comes to data recovery on hard drives, or similar storage devices, these flashers can also become handy.
EZP2010 USB-Highspeed programmer
This particular programmer can be bought on many Chinese store or Amazon.</description>
</item>
<item>
<title>Initial flashing/debricking the Proxmark V3 EASY (w/ Bus Pirate)</title>
<link>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</link>
<pubDate>Wed, 25 Sep 2019 15:22:58 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</guid>
<description>TL;DR; Short the ERASE pin with VDDCORE, if ERASE == PIN_55 &amp;amp;&amp;amp; VDDCORE == PIN_54
According to complains in the internet, users report bricking their Proxmark3 EASY, when they try to flash the latest firmware with the &amp;lsquo;flasher&amp;rsquo; software tool.
Sometimes flashing process of firmware can go wrong, but it can often be recovered with JTAG programmers, or similar programmers.
I will not about setting up the environment to build, and flash the firmware, but I will tell you what you might be missing out and why it might be not working.</description>
</item>
<item>
<title>Google CTF 2019 - FriendSpaceBookPlusAllAccessRedPremium.com</title>
<link>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</link>
<pubDate>Wed, 24 Jul 2019 12:19:47 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</guid>
<description>#MemeFreeEdition
The Challenge You are provided a zip file containing two files.
program vm.py The file program contains instructions encoded as emojis for a virtual machine called vm.py. At the bottom of vm.py I found a list, or lets call it a translation table, with emojis and their function name counter part.
OPERATIONS = { &amp;#39;🍡&amp;#39;: add, &amp;#39;🤡&amp;#39;: clone, &amp;#39;📐&amp;#39;: divide, &amp;#39;😲&amp;#39;: if_zero, &amp;#39;😄&amp;#39;: if_not_zero, &amp;#39;🏀&amp;#39;: jump_to, &amp;#39;🚛&amp;#39;: load, &amp;#39;📬&amp;#39;: modulo, &amp;#39;⭐&amp;#39;: multiply, &amp;#39;🍿&amp;#39;: pop, &amp;#39;📤&amp;#39;: pop_out, &amp;#39;🎤&amp;#39;: print_top, &amp;#39;📥&amp;#39;: push, &amp;#39;🔪&amp;#39;: sub, &amp;#39;🌓&amp;#39;: xor, &amp;#39;⛰&amp;#39;: jump_top, &amp;#39;⌛&amp;#39;: exit } To execute program with vm.</description>
</item>
<item>
<title>Reverse Engineering of the SkyRC MC3000 Battery Charger USB Protocol</title>
<link>https://goatpr0n.farm/posts/reverse-engineering-of-the-skyrc-mc3000-battery-charger-usb-protocol/</link>
<pubDate>Mon, 18 Mar 2019 16:49:39 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/reverse-engineering-of-the-skyrc-mc3000-battery-charger-usb-protocol/</guid>
<description>Software Requirements Decompiler for .NET programs
dotPeek The implementation of the protocol is then written in Python. Let&amp;rsquo;s hear what the curator has to say:
Tell me about Python.
&amp;gt; Wow. Much Snake. Easy programming! &amp;gt; &amp;gt; \- Doge Tell me about dotPeek.
&amp;gt; Easy decompilation. Readable syntax. Very easy. &amp;gt; &amp;gt; \- Doge Analyzing MC3000_Monitor Decompiling Start dotPeek and use Drag&amp;rsquo;n&amp;rsquo;Drop to load the Application. Or uSe CtRL+O anD LoCATe tHe fILe uSiNg ThE bOrwsEr.</description>
</item>
<item>
<title>[Teaser] How to reverse engineer communication protocols of embedded devices</title>
<link>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</link>
<pubDate>Sat, 16 Feb 2019 01:25:34 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</guid>
<description>Sneak Preview These letters. Such announcement. Many words.
In the next few days I will publish two - not one - but two articles on how to approach a problem on how to reverse engineer protocols. There have been to applications I looked into to code a library for my home uses.
#1 - MC3000 Charger MC3000_Charger provides an USB and Bluetooth (BT) interface (Spoiler: I am not covering the BT interface.</description>
</item>
</channel>
</rss>