Skip to main content

Unanswered Questions

84 questions with no upvoted or accepted answers
14 votes
1 answer
4k views

Howto clone Android RSA SecurID Software Token

At the moment I try to figure out how the RSA SecurID Software Token protects itself from getting cloned to another android device. The token I imported has no device binding enabled and I already ...
5 votes
0 answers
673 views

Reverse engineering an hydrometer's Bluetooth communication

This is a very specific question. I'm currently working on a project to create an android application capable of reading the values of an hydrometer via Bluetooth. By reading the datasheet, I suspect ...
5 votes
0 answers
890 views

Reverse Engineering XORed string

I am trying to reverse engineer some data received over serial port. The hardware sending the data consists of a gps, compass and a power monitoring unit (which sends information about the battery). ...
4 votes
0 answers
3k views

Well-known JSON obfuscator that puts the string "Salted12" in front of obfuscated files?

I have an application that pulls some JSON definition files from the internet. In former versions of the application, these files were genuine json files; now, in a later version, they seem to be ...
3 votes
0 answers
95 views

How to read the content of these files?

I am looking for a way to read the content of these two files. If that is possible, please let me know. Google Drive link for the files
3 votes
0 answers
246 views

How to decrypt query string of an url

I need to decrypt the encoded part of query string i.e. Q7eM0euncHNyrhJPjN06lw== and sWmYdMUi01BJplzumEaxTw== from the following urls? https://XXXX/deed-check/view-deed-summary?encApplicationId=...
3 votes
0 answers
200 views

Reverse-engineering 24-bit to make the lock system recognize NFC cards as their own

I own a lock system that uses SRI512 cards. My supplier (manufacturer of the locks) sells the cards at a very expensive price, so I decided to buy them online. Once they arrived, when I tried to write ...
3 votes
0 answers
388 views

Uniden FW Hacking

I recently purchased a Uniden Radio Scanner (BCD325P2). I looked at the Windows FW Update App in dnSpy, then pulled the FW bin directly. FCC Parts List gets me R5F5631BCDFP#V0, which appears to be a ...
3 votes
1 answer
888 views

Reversal of unknown obfuscation or encryption with known plaintext

Introduction For academical reasons I am reversing a firmware for an embedded device. I have already created a perl script which is able to parse the firmware structure and extract files from it (its ...
2 votes
0 answers
90 views

Figuring out the algorithm for an NFC reader, which displays values increased by 1.52 times

I have two NFC readers, reader A reads card ID numbers according to the ISO standard and the algorithm is publicly available. Reader B is from a Canon printer. The card numbers read by reader B are 1....
2 votes
0 answers
66 views

I want to learn how to program by orienting myself to the task of reverse engineering

I have to learn programming from scratch and I want to orient my learning in order to be able to reverse engineer to break obfuscators. It would be helpful if you could recommend me what languages, ...
2 votes
0 answers
53 views

Looking for some help for decoding a signal from IR remote

The following signal has been captured from a remote that I suspect code for at least 3 things: the ID: 107, the item: 1, and the color. I didn't change the ID and item here (although I could do so ...
2 votes
0 answers
201 views

Find out used encryption in an SQLite database

Is it possible to see from a string which encryption an SQLite database uses? Let's say, I can open the database and see this: O45dTrA6NKG6SYeCENMwV7nxp66HR9lbhK12NGHgVnzEhebMjMJUhTmConk= - how do I ...
2 votes
0 answers
166 views

How would I decode this XOR Cipher

I have been given a XOR Cipher which is a bunch of hexidecimal looking charcters. This cipher is: fa ce fd d3 fa df ed d3 fa ce d3 d3 fa de df d3 fa de df d3 fa de f9 d3 fa ce f9 d3 fa de f1 d3 ...
2 votes
0 answers
32 views

Encoding scheme identification of the following communication message

I'm trying to RE an app for educational purposes. So here is the behavior of the app. When the app starts, it communicate with a server in plain tcp and based on those tcp messages, it either work as ...

15 30 50 per page
1
2 3 4 5 6