Radio Netwatcher vom 6.3.2015 – Cyber Necromancy

Podcast
Radio Netwatcher
  • Radio Netwatcher vom 6.3.2015 - Cyber Necromancy
    60:00
audio
30:46 Min.
BBA Livestream-Video von Youtube weltweit gesperrt worden - jetzt spricht Georg Markus Kainz über Contentfilter und anderen Fragen
audio
1 Std. 56:45 Min.
20181025 Mitschnitt BBA Gala 2018 mit MusikAUDIO_CC by-nc 4.0 netwatcher24.tv
audio
1 Std. 00 Sek.
Radio Netwatcher vom 25.8.2017 – Hauke Löffler - Einführung in Go (GPN11) [letzte Folge Radio Netwatcher]
audio
1 Std. 00 Sek.
Radio Netwatcher vom 18.8.2017 – Fit mit Neti: New Running Music for 2017 #67
audio
1 Std. 00 Sek.
Radio Netwatcher vom 11.8.2017 – Fit mit Neti: Music for Running – New Running Music 2015 Mix #21 best running songs motivation music running music 2017 workout music
audio
1 Std. 01 Sek.
Radio Netwatcher vom 4.8.2017 – Fit mit Neti: Music for Running – Best Running Music 2017: Epic jogging top 100 music charts fitness training
audio
1 Std. 00 Sek.
Radio Netwatcher vom 28.7.2017 – Fit mit Neti: Running Workout Music #88
audio
1 Std. 00 Sek.
Radio Netwatcher vom 21.7.2017 – Pylon – Invasion der Roboter (zwischen Industrie und Kultur)
audio
1 Std. 00 Sek.
Radio Netwatcher vom 14.7.2017 – Volkszähler.org (GPN17) oder welche Schwächen Smartmeter haben
audio
1 Std. 00 Sek.
Radio Netwatcher vom 7.7.2017 – Nadja – Menstruation Matters (GPN17)

Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this talk we go into the gruesome details of how we dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch together the pieces necessary to bring our favorite game Metal Gear Online back to life.

We will be examining the process of reverse engineering the games custom network protocols in all angles from packet logs to low level disassembly of client code.

In this presentation we will be discussing the path we took to successfully develop our own private server for Metal Gear Online on the Sony PlayStation 2 and PlayStation 3 video game consoles. Interestingly enough this was a private server that was developed after the original was already taken offline, so we did not have a live active server to help with the reverse engineering. Due to this we ran into some issues but ultimately succeeded. We believe that the details of the techniques that we used will prove useful for anyone attempting similar actions in the future. The topics that we will discuss in this talk will cover a wide range of high and low level issues related to network protocol and binary reversing.

We will begin with an overall survey of the general problems faced by anyone attempting this type of work. The talk will quickly delve from the high-level and simple issues into the more technical aspects of reverse engineering in the blind. We will be including the techniques we used to determine the protocol and payload responses that the client was expecting. Describing in detail how we honed in on common traits that we expected to see on the network, using open source knowledge and binary level reverse engineering of client code to determine the expected response.

We expect the attendees of this talk to walk away with knowledge that will help them in the future when working on similar projects or any activities related to protocol reverse engineering.

Quelle: http://events.ccc.de/congress/2014/Fahrplan/events/5956.html

Playlist / Bonustrack:

– Alexander Marcus – Hundi
– Alexander Marcus – Hawai Tost Song

Schreibe einen Kommentar