Articles on Reverse engineering
Last updated: 2023/02/09
Top deep-dives on Reverse engineering
An older series, sure, but does reverse engineering ever go out of style? That's like saying problem solving is old fashioned. In this informative series, Bruno Macabeus aims to create a web app that allows users to edit and create levels for the Gameboy Advance game Klonoa. In the process he teaches us how to reverse engineer the game from scratch.
Abhinav Thakur's series focuses on reverse engineering a common CS classroom assignment called the bomb binary.
Tim Leonard's series focuses on reverse engineering the networking mechanics of Dark Souls 3.
Alex Abramov's mini-series takes us through the steps for writing an aim bot for "Half-Life 2, running on the Source engine". Ah, good ol'Garry's mod shenanigans.
Ninji takes us on a reverse engineering through some of Nintendo's classics.
Harrison Green and Ian Dupont dissect what it takes to reverse engineer a MikroTik router.
Vladimir Martyanov does a deep dive into the technical workings of the Zloader 2 malware suite used to break into online banking accounts.
Parth Thakkar reverse engineered Github's Copilot extension and highlights some interesting points in this article.
- The extension uses a Codex-like model to make suggestions based on code from a user's project
- After 30s of either acceptance/rejection of a suggestion, copilot “captures” a snapshot around the insertion point for telemetry data which it probably uses to further train the model (your code is probably taken)
- Parth provides a tool to explore the reverse engineered codebase
Shawn Wang attempts to reverse engineer the prompts for Notion AI features.
- Prompt injection is a type of attack in which malicious text is injected into a trusted system, with the goal of compromising the system's trustworthiness
- The article discusses the different types of prompt injection outcomes, and argues that the vast majority of prompt injection examples are harmless
- I can't believe prompt engineering is an actual thing
Ken Shirriff takes us through reverse engineering "a hybrid module that was used for ground-testing of equipment from the Apollo space program".
Eta describes how mobile rail tickets work in the UK and her attempt to reverse engineer them.
- Mobile tickets are just an Aztec barcode, either displayed inside an app or on a PDF you can print out
- The data in the barcode is encrypted in some way
- Not really possible to copy the tickets
Ken Shirriff is back at it again with reverse engineering hardware. This time Ken dives into the circuit of a chip that is used to keep a reference voltage constant across different environments.