YoVDO

Cyber Necromancy - Reverse Engineering Dead Protocols - DefCamp - 2014

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Reverse Engineering Courses Packet Analysis Courses Packet Capturing Courses

Course Description

Overview

Explore the intricacies of reverse engineering defunct protocols in this 31-minute DefCamp 2014 conference talk titled "Cyber Necromancy: Reverse Engineering Dead Protocols." Delve into the world of Sony Dynamic Network Authentication, cheat devices, and packet analysis. Learn about overwriting memory, decoding payloads, and understanding cryptographic elements in online gaming protocols. Discover techniques for extracting player statistics, deciphering magic numbers, and reconstructing player sets. Gain insights into the challenges posed by defunct protocols and the innovative solutions employed by security specialists. The talk covers various aspects of cyber necromancy, including packet capture, crypto analysis, and the implications of DMCA on reverse engineering efforts.

Syllabus

Intro
Introduction
What is it
Problems
Solutions
Sony Dynamic Network Authentication
New DNAs Connect
Cheat Devices
Overwrite Memory
Packets
Whats in the packet
Prime numbers
Payloads
XOR
Missing lobbies
Packet capture
Crypto
Results
Player Stats
Strings
Magic Numbers
Player Sets
Online Games
DMCA
Questions


Taught by

DefCamp

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam