Radio Netwatcher vom 6.3.2015 – Cyber Necromancy
Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this talk we go into the gruesome details of how we dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch together the pieces necessary to bring our favorite game Metal Gear Online back to life.
We will be examining the process of reverse engineering the games custom network protocols in all angles from packet logs to low level disassembly of client code.
In this presentation we will be discussing the path we took to successfully develop our own private server for Metal Gear Online on the Sony PlayStation 2 and PlayStation 3 video game consoles. Interestingly enough this was a private server that was developed after the original was already taken offline, so we did not have a live active server to help with the reverse engineering. Due to this we ran into some issues but ultimately succeeded. We believe that the details of the techniques that we used will prove useful for anyone attempting similar actions in the future. The topics that we will discuss in this talk will cover a wide range of high and low level issues related to network protocol and binary reversing.
We will begin with an overall survey of the general problems faced by anyone attempting this type of work. The talk will quickly delve from the high-level and simple issues into the more technical aspects of reverse engineering in the blind. We will be including the techniques we used to determine the protocol and payload responses that the client was expecting. Describing in detail how we honed in on common traits that we expected to see on the network, using open source knowledge and binary level reverse engineering of client code to determine the expected response.
We expect the attendees of this talk to walk away with knowledge that will help them in the future when working on similar projects or any activities related to protocol reverse engineering.
Quelle: http://events.ccc.de/congress/2014/Fahrplan/events/5956.html
Playlist / Bonustrack:
– Alexander Marcus – Hundi
– Alexander Marcus – Hawai Tost Song
Ähnliche Beiträge
- Radio Netwatcher vom 8.5.2015 – #1 Teil 2: THE TIME IS RIGHT / #2 Lecture: Magnus... aus der Sendereihe „Radio Netwatcher“ 09.05.2015 | Orange 94.0
- Radio Netwatcher vom 1.5.2015 – THE TIME IS RIGHT (Teil 1) aus der Sendereihe „Radio Netwatcher“ 30.04.2015 | Orange 94.0
- Radio Netwatcher 24.4.2015 – Mareike Foecking: Die Krise der Bilder ist... aus der Sendereihe „Radio Netwatcher“ 23.04.2015 | Orange 94.0
- Radio Netwatcher vom 17.4.2015 – lecture: Jugend hackt aus der Sendereihe „Radio Netwatcher“ 17.04.2015 | Orange 94.0
- Radio Netwatcher vom 13.3.2015 – Why is GPG “damn near unusable”? aus der Sendereihe „Radio Netwatcher“ 13.03.2015 | Orange 94.0
- ln_0005: a new dawn | das war der chaos communication congress (31c3) aus der Sendereihe „Lets Netz | Der Chaostalk | Technik Web Politik“ 05.03.2015 | Radiofabrik
- ln_0005: a new dawn | das war der chaos communication congress (31c3) aus der Sendereihe „Lets Netz | Der Chaostalk | Technik Web Politik“ 05.03.2015 | Radiofabrik
- Radio Netwatcher vom 27.2.2015 – How I Learned to Stop Reinventing and Love... aus der Sendereihe „Radio Netwatcher“ 28.02.2015 | Orange 94.0
- Radio Netwatcher vom 30.1.2015 – Die Krise der Bilder ist die Krise der Politik aus der Sendereihe „Radio Netwatcher“ 29.01.2015 | Orange 94.0