Cyber Necromancy: Reverse Engineering Dead Protocols

Presented at ToorCon San Diego 16 (2014), Oct. 25, 2014, 11 a.m. (50 minutes).

Reverse engineering is not always about understanding the binary; in our case it was about the network protocol used by a now dead online game. Our attempts to resurrect the dead server with only a copy of the client application are what lead us into cyber necromancy. In this talk we will go over the gruesome details of how we dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to piece together the necessary parts to bring our favorite game back to life.


Presenters:

  • Matthew Halchyshak
    Matthew Halchyshak is a Security Technician for Security Innovation with experience performing penetration tests and code reviews on applications ranging from mobile to server-side applications. Though having been interested in computer security from his youth he has moved through a number of career paths before finally getting into the security field including work as a magician and a field artillery soldier with the Canadian Army Reverse. In his off-time he enjoys the challenge of breaking captchas and writing bots for various applications and services.
  • Joseph Tartaro
    Joseph Tartaro is an experienced Senior Security Consultant at IOActive, where he proves his talents working with platinum-level clients on network and application penetration tests. Tartaro is highly experienced with a wide range of security practices, passionate about hardware hacking, programming, fuzzing and all manners of exploitations. As a member of telephreak, he helps manage a VoIP PBX system for free public conferencing and communication. A mad scientist at heart in his off-time, he enjoys working on emulations and ROM hacking of retro-video games.

Links:

Similar Presentations: