giulio8
08-11-2010, 03:19 PM
As I'm suggesting in my topic's description (navigator sw reversing), I think it's the same old story of what happened with decss: the reversers' group reportedly disassembled the object code of a player to obtain a player key http://en.wikipedia.org/wiki/DeCSS
I also posted a similar request in another forum: http://forum.mobilism.org/viewtopic.php?f=15&t=78827
Basically the tutorial should show how an application (the gps navigator) reads an encrypted file (the map) and elaborate data (finding a route). As a wrap-up it should show how to edit the file (the map) changing some encrypted data (changing one-way street to the opposite direction) in order to get a different behaviour of the application (the navigator picking up a different route).
By far and large unpacking a target is almost an automatic task with tons of tuts already available, this tutorial would reveal the real genius of a reverse engineer: if analysing a program to discover a new encryption algorithm and bettern its functionalities is not the aim of reverse engineering, what else?
Look forward to hearing from you
TFL
I also posted a similar request in another forum: http://forum.mobilism.org/viewtopic.php?f=15&t=78827
Basically the tutorial should show how an application (the gps navigator) reads an encrypted file (the map) and elaborate data (finding a route). As a wrap-up it should show how to edit the file (the map) changing some encrypted data (changing one-way street to the opposite direction) in order to get a different behaviour of the application (the navigator picking up a different route).
By far and large unpacking a target is almost an automatic task with tons of tuts already available, this tutorial would reveal the real genius of a reverse engineer: if analysing a program to discover a new encryption algorithm and bettern its functionalities is not the aim of reverse engineering, what else?
Look forward to hearing from you
TFL