YoVDO

Cyber Necromancy - Reverse Engineering Dead Protocols - DefCamp - 2014

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Reverse Engineering Courses Packet Analysis Courses Packet Capturing Courses

Course Description

Overview

Explore the intricacies of reverse engineering defunct protocols in this 31-minute DefCamp 2014 conference talk titled "Cyber Necromancy: Reverse Engineering Dead Protocols." Delve into the world of Sony Dynamic Network Authentication, cheat devices, and packet analysis. Learn about overwriting memory, decoding payloads, and understanding cryptographic elements in online gaming protocols. Discover techniques for extracting player statistics, deciphering magic numbers, and reconstructing player sets. Gain insights into the challenges posed by defunct protocols and the innovative solutions employed by security specialists. The talk covers various aspects of cyber necromancy, including packet capture, crypto analysis, and the implications of DMCA on reverse engineering efforts.

Syllabus

Intro
Introduction
What is it
Problems
Solutions
Sony Dynamic Network Authentication
New DNAs Connect
Cheat Devices
Overwrite Memory
Packets
Whats in the packet
Prime numbers
Payloads
XOR
Missing lobbies
Packet capture
Crypto
Results
Player Stats
Strings
Magic Numbers
Player Sets
Online Games
DMCA
Questions


Taught by

DefCamp

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera