Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cyber Necromancy - Reverse Engineering Dead Protocols - DefCamp - 2014

DefCamp via YouTube

Overview

Explore the intricacies of reverse engineering defunct protocols in this 31-minute DefCamp 2014 conference talk titled "Cyber Necromancy: Reverse Engineering Dead Protocols." Delve into the world of Sony Dynamic Network Authentication, cheat devices, and packet analysis. Learn about overwriting memory, decoding payloads, and understanding cryptographic elements in online gaming protocols. Discover techniques for extracting player statistics, deciphering magic numbers, and reconstructing player sets. Gain insights into the challenges posed by defunct protocols and the innovative solutions employed by security specialists. The talk covers various aspects of cyber necromancy, including packet capture, crypto analysis, and the implications of DMCA on reverse engineering efforts.

Syllabus

Intro
Introduction
What is it
Problems
Solutions
Sony Dynamic Network Authentication
New DNAs Connect
Cheat Devices
Overwrite Memory
Packets
Whats in the packet
Prime numbers
Payloads
XOR
Missing lobbies
Packet capture
Crypto
Results
Player Stats
Strings
Magic Numbers
Player Sets
Online Games
DMCA
Questions

Taught by

DefCamp

Reviews

Start your review of Cyber Necromancy - Reverse Engineering Dead Protocols - DefCamp - 2014

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.