Best of Reverse EngineeringJuly 2024

  1. 1
    Article
    Avatar of hnHacker News·2y

    Reverse Engineering TicketMaster's Rotating Barcodes (SafeTix)

    The post explores TicketMaster's SafeTix rotating barcode system. It critiques the system's shortcomings, such as its reliance on internet connectivity and the potential for usability issues. The author reverse engineers the barcode mechanics, revealing how static bearer tokens and TOTP-based six-digit numbers are used to validate tickets. The motivations behind SafeTix's implementation, including reducing ticket fraud and promoting TicketMaster's app, are analyzed. The conclusion stresses the drawbacks of excluding people from events through tech barriers.

  2. 2
    Article
    Avatar of hnHacker News·2y

    Introduction · Reverse Engineering

    Reverse engineering involves deconstructing an artificial object to uncover its design, code, or architecture. This set of tutorials aims to simplify the learning process for beginners and those needing a refresher on x86, x64, 32-bit ARM, and 64-bit architectures. Suitable for cybersecurity enthusiasts, the tutorials are available in PDF and MOBI formats and are updated regularly.

  3. 3
    Article
    Avatar of hnHacker News·2y

    Reverse-Engineering an IP camera - Part 1

    The author discusses their experience with modern IP cameras, highlighting changes in technology and concerns with P2P (Peer-to-Peer) cameras' reliance on external servers for functionality. They explore reverse-engineering a generic camera model, identify that it runs a Linux-based OS, and analyze network traffic to understand its data handling and security implications. Part 1 concludes with a focus on accessing the camera's operating system and understanding its protocols.

  4. 4
    Article
    Avatar of hnHacker News·2y

    Reverse Engineering the Verification QR Code on my Diploma

    On finishing his exams, the author received a PDF containing a QR code for verification via the CycladesVérif app. Intrigued by the potential for reverse engineering, the author disassembled the app to explore how the QR code's data is encrypted and decrypted using RSA. Despite challenges and inherent flaws in the RSA key usage by the app, the author determined that breaking the security is impractical due to computational limitations.