Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012
From being a mere curiosity in the 70’s, computer gaming has become mainstream and grown into being one of the world’s biggest digital entertainment industries. Its popularity has drawn the attention of hackers and exploiters, who quickly put game software security on the agenda. The games of the 90’s and early 00’s were easy to hack, and this effectively ruined online play in some games.
Modern games employ various anti-cheat mechanisms, but different kind of cheats still exist and are being sold through cheater websites. This master thesis seeks to perform an analysis of what kind of cheats exists in the modern gaming market, and what countermeasures are employed.
Also:
DFT article
#reverse #coding
From being a mere curiosity in the 70’s, computer gaming has become mainstream and grown into being one of the world’s biggest digital entertainment industries. Its popularity has drawn the attention of hackers and exploiters, who quickly put game software security on the agenda. The games of the 90’s and early 00’s were easy to hack, and this effectively ruined online play in some games.
Modern games employ various anti-cheat mechanisms, but different kind of cheats still exist and are being sold through cheater websites. This master thesis seeks to perform an analysis of what kind of cheats exists in the modern gaming market, and what countermeasures are employed.
Also:
DFT article
#reverse #coding
👍3❤1🤔1
Реверсивный инжиниринг приложений под Windows, Бирюков А. А., 2024
Реверсивный инжиниринг считается одним из наиболее сложных направлений в информационной безопасности (ИБ). В книге автор предлагает приоткрыть завесу тайны над этой темой и с помощью практических примеров рассмотреть, как работают приложения под ОС Windows, а также разобраться в том, как эксплуатировать уязвимости переполнения буфера, размещать свой код в выполнимых файлах, находить полезную информацию в дампах памяти и многое другое.
Книга предназначена как для начинающих специалистов, желающих разобраться в реверс-инжиниринге, так и для опытных специалистов по ИБ, интересующихся данной темой.
#book #reverse #windows
Реверсивный инжиниринг считается одним из наиболее сложных направлений в информационной безопасности (ИБ). В книге автор предлагает приоткрыть завесу тайны над этой темой и с помощью практических примеров рассмотреть, как работают приложения под ОС Windows, а также разобраться в том, как эксплуатировать уязвимости переполнения буфера, размещать свой код в выполнимых файлах, находить полезную информацию в дампах памяти и многое другое.
Книга предназначена как для начинающих специалистов, желающих разобраться в реверс-инжиниринге, так и для опытных специалистов по ИБ, интересующихся данной темой.
#book #reverse #windows
🔥13👍3
eCRE – Reverse Engineering Professional, INE Version, 2021
The eLearnSecurity Certified Reverse Engineer (eCRE) is awarded to reverse engineers after passing a rigorous, practical examination.
ECRE is a now retired certification created by INE Security. It certifies that the individual is capable of performing reverse engineering on Windows-based applications. Candidates have to pass a challenging theoretical exam and successfully complete a practical test where they prove their ability to analyze complex algorithms and code, and to bypass different code obfuscation methods
Password:GREENARMOR
#education #reverse
The eLearnSecurity Certified Reverse Engineer (eCRE) is awarded to reverse engineers after passing a rigorous, practical examination.
ECRE is a now retired certification created by INE Security. It certifies that the individual is capable of performing reverse engineering on Windows-based applications. Candidates have to pass a challenging theoretical exam and successfully complete a practical test where they prove their ability to analyze complex algorithms and code, and to bypass different code obfuscation methods
Password:
#education #reverse
👍5🤔1
Reverse-Engineering-Course by FaxHack, 2024
Reverse engineering focusing on x64 Windows. This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
GitHub
#reverse #education
Reverse engineering focusing on x64 Windows. This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of binaries, then reverse some small samples, reverse a DLL and implement it into our own program, reverse some malware, then look at some realistic situations.
GitHub
#reverse #education
🔥9👍3
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code with Intel x64, Dmitry Vostokov, 2023
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.
This book provides the background knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing.
What You'll Learn:
✅ Review the basics of x64 assembly language
✅ Examine the essential GDB debugger commands for debugging and binary analysis
✅ Study C and C++ compiler code generation with and without compiler optimizations
✅ Look at binary code disassembly and reversing patterns
✅ See how pointers in C and C++ are implemented and used
#book #linux #reverse
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.
This book provides the background knowledge and practical foundations you’ll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You’ll also work with the GDB debugger and use it for disassembly and reversing.
What You'll Learn:
✅ Review the basics of x64 assembly language
✅ Examine the essential GDB debugger commands for debugging and binary analysis
✅ Study C and C++ compiler code generation with and without compiler optimizations
✅ Look at binary code disassembly and reversing patterns
✅ See how pointers in C and C++ are implemented and used
#book #linux #reverse
👍2🔥2❤1
Reverse Engineering For Everyone! by tadwhitaker, 2021
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
GitHub
The tutorial + PDF
#reverse #coding
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
GitHub
The tutorial + PDF
#reverse #coding
🔥6👍4🤝3🤡2
Reverse Engineering For Everyone! by mytechnotalent, 2024
This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right
place.
As a beginner, these tutorials will carry you from nothing up to the mid basics of reverse engineering, a skill that everyone within the realm of cybersecurity should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
❗️ GitHub
⛳️ Mirror
#reverse #education
This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right
place.
As a beginner, these tutorials will carry you from nothing up to the mid basics of reverse engineering, a skill that everyone within the realm of cybersecurity should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
❗️ GitHub
⛳️ Mirror
#reverse #education
🔥5👍2
Top books for Reverse Engineering.zip
50.1 MB
8 Best e-books for Reverse Engineering (ENG)
⛳️ Bypass Antivirus
⛳️ Learn Malware Analysis
⛳️ Learn Ollydbg
⛳️ Practical Reverse Engineering
⛳️ Reverse Eng. For Beginners
⛳️ Reverse Engineering Code IDA
⛳️ Reverse engineering secret
⛳️ The IDA Pro Books
#book #reverse #malware
⛳️ Bypass Antivirus
⛳️ Learn Malware Analysis
⛳️ Learn Ollydbg
⛳️ Practical Reverse Engineering
⛳️ Reverse Eng. For Beginners
⛳️ Reverse Engineering Code IDA
⛳️ Reverse engineering secret
⛳️ The IDA Pro Books
#book #reverse #malware
🔥6👍2❤1
Mastering Cybersecurity: A Practical Guide for Professionals, Volume 1, 2025
Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.
The various attack categories available in Kali Linux along with their descriptions and installed tools to perform different operations are as follows:
⛳️ Information gathering – collect and format the initial target data about systems and networks in a form that could be used in the future. Tools are NMAP, Zenmap, Stealth Scan, Dimitry, and Maltego.
⛳️ Web App analysis – identify weaknesses by accessing websites through browser-based tools to find bugs or loopholes leading to information or data loss. Tools are Skipfish, ZAP, Wpscan, SQLMap, HTTrack, Burpsuite, Vega, and Webscarap.
⛳️ Database assessment – access database to analyze for different attacks and security issues.
Tools are SQLMap, SQLNinja, Bbqsl, Jsql Injection, and Oscanner.
⛳️ Password cracking – handle the worklist or the password list to check against login credentials of different services, protocols, and hashes. Tools include Cewl, Crunch, Hashcat, John, Medusa, and Ncrack.
⛳️ Wireless attacks – assess and exploit wireless networks like Wifi routers and access points. These are useful not only for just SSID cracking but also for gathering information about user browsing behavior. Tools include Aircrack-NG, Kismet, Ghost Phisher, Wifilite, and Fern-Wifi-Cracker.
⛳️ Reverse engineering – helps break down the layers of applications by reaching into the source code to understand its working logic and data flow to manipulate as required. Tools include Nsam Shell, Flasm, Ollydbg, and Apktools.
⛳️ Exploitation tools – are frameworks that generate payloads that exploit known vulnerabilities in systems, apps, and services. Tools include Armitage, Metasploit, SearchSploit, Beef XSS, Termineter, and Social Engineering Toolkit.
⛳️ Sniffing and spoofing – secretly accessing data in an unauthorized manner, using fake profiles, and hiding real identity. Tools include Wireshark, Bettercap, Ettercap, Hamster, Driftnet, MACchanger, and Responder.
#book #pentest #kali #web #linux #reverse
Volume 1: The first volume starts with the fundamentals and hands‑on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn’t just about identifying weaknesses; it’s about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You’ll also learn live hunting for vulnerable devices and systems on the Internet.
The various attack categories available in Kali Linux along with their descriptions and installed tools to perform different operations are as follows:
⛳️ Information gathering – collect and format the initial target data about systems and networks in a form that could be used in the future. Tools are NMAP, Zenmap, Stealth Scan, Dimitry, and Maltego.
⛳️ Web App analysis – identify weaknesses by accessing websites through browser-based tools to find bugs or loopholes leading to information or data loss. Tools are Skipfish, ZAP, Wpscan, SQLMap, HTTrack, Burpsuite, Vega, and Webscarap.
⛳️ Database assessment – access database to analyze for different attacks and security issues.
Tools are SQLMap, SQLNinja, Bbqsl, Jsql Injection, and Oscanner.
⛳️ Password cracking – handle the worklist or the password list to check against login credentials of different services, protocols, and hashes. Tools include Cewl, Crunch, Hashcat, John, Medusa, and Ncrack.
⛳️ Wireless attacks – assess and exploit wireless networks like Wifi routers and access points. These are useful not only for just SSID cracking but also for gathering information about user browsing behavior. Tools include Aircrack-NG, Kismet, Ghost Phisher, Wifilite, and Fern-Wifi-Cracker.
⛳️ Reverse engineering – helps break down the layers of applications by reaching into the source code to understand its working logic and data flow to manipulate as required. Tools include Nsam Shell, Flasm, Ollydbg, and Apktools.
⛳️ Exploitation tools – are frameworks that generate payloads that exploit known vulnerabilities in systems, apps, and services. Tools include Armitage, Metasploit, SearchSploit, Beef XSS, Termineter, and Social Engineering Toolkit.
⛳️ Sniffing and spoofing – secretly accessing data in an unauthorized manner, using fake profiles, and hiding real identity. Tools include Wireshark, Bettercap, Ettercap, Hamster, Driftnet, MACchanger, and Responder.
#book #pentest #kali #web #linux #reverse
👍4👏4❤2🔥1