Overview
Explore the intricacies of reverse engineering defunct protocols in this 31-minute DefCamp 2014 conference talk titled "Cyber Necromancy: Reverse Engineering Dead Protocols." Delve into the world of Sony Dynamic Network Authentication, cheat devices, and packet analysis. Learn about overwriting memory, decoding payloads, and understanding cryptographic elements in online gaming protocols. Discover techniques for extracting player statistics, deciphering magic numbers, and reconstructing player sets. Gain insights into the challenges posed by defunct protocols and the innovative solutions employed by security specialists. The talk covers various aspects of cyber necromancy, including packet capture, crypto analysis, and the implications of DMCA on reverse engineering efforts.
Syllabus
Intro
Introduction
What is it
Problems
Solutions
Sony Dynamic Network Authentication
New DNAs Connect
Cheat Devices
Overwrite Memory
Packets
Whats in the packet
Prime numbers
Payloads
XOR
Missing lobbies
Packet capture
Crypto
Results
Player Stats
Strings
Magic Numbers
Player Sets
Online Games
DMCA
Questions
Taught by
DefCamp