View Single Post
Old 02-09-2011, 10:14 AM   #3
KevinH
Sigil Developer
KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.KevinH ought to be getting tired of karma fortunes by now.
 
Posts: 8,864
Karma: 6120478
Join Date: Nov 2009
Device: many
Hi,

This is not actually a reverse engineering forum. You would probably be better off going to a place like http://www.openrce.org/ which specializes in reverse engineering projects of all kinds. They talk about debuggers, reverse compilers, disassemblers, and the tools of the trade. For example, tools like wireshark may help or may simply show you encrypted packets going back and forth that are pretty much worthless. The source of the app matters, some platforms use encrypted binaries and code obfuscation to try to prevent decompiling, etc. Unless you are a programmer and understand how to read assembler, run a debugger at assembler level: breakpoints, back-traces, have access to a decompiler, etc, you are pretty much out of luck unless the original developers were incredibly stupid.
KevinH is online now   Reply With Quote