-
Android Bluetooth Traffic Sniffing: Protocol Analysis Using HCI Snoop Logs
This article provides an in-depth exploration of techniques for capturing and analyzing Bluetooth communication traffic on Android devices. Focusing on Android 4.4 and later versions, it details how to enable Bluetooth HCI Snoop logging through developer options to save Bluetooth Host Controller Interface packets to device storage. The article systematically explains the complete workflow of extracting log files using ADB tools and performing protocol analysis with Wireshark, while offering technical insights and considerations for practical application scenarios. This method requires no additional hardware sniffing devices, providing an effective software solution for Bluetooth protocol reverse engineering and application development.
-
Methods and Practices for Generating Dockerfile from Docker Images
This article comprehensively explores various technical methods for generating Dockerfile from existing Docker images, focusing on the implementation principles of the alpine/dfimage tool and analyzing the application of docker history command in image analysis. Through practical code examples and in-depth technical analysis, it helps developers understand the image building process and achieve reverse engineering and build history analysis of images.
-
C++ Decompilation Technology: Challenges, Tools, and Practical Guide
This article provides an in-depth exploration of the technical challenges and solutions in C++ decompilation. By analyzing the capabilities and limitations of professional tools like IDA Pro, it reveals the complex process of recovering C++ source code from binary files. The paper details the importance of debugging information, the roughness of decompilation output, and the substantial manual reverse engineering effort required, offering practical guidance for developers who have lost their source code.
-
A Comprehensive Guide to Modifying Android APK Version Code Using APKTool on macOS
This article provides a detailed guide on how to use APKTool to extract, modify, and repackage Android APK files on macOS, specifically when source code is lost. It explains the basic structure of APK files and walks through the step-by-step process of installing and using APKTool, including decoding APKs, editing the version code in AndroidManifest.xml, and rebuilding the APK. Additional methods such as using command-line tools for basic operations and Keka for file editing are also covered, offering readers flexible technical solutions based on their needs.
-
Generating ER Diagrams for CakePHP Databases with MySQL Workbench
This article explains how to use MySQL Workbench to generate ER diagrams from existing CakePHP MySQL databases, covering reverse engineering steps and methods to adapt to CakePHP conventions. Ideal for developers optimizing database design and documentation.
-
Complete Guide to Decompiling Android DEX Files into Java Source Code
This article provides a comprehensive guide on decompiling Android DEX files into Java source code, focusing on the dex2jar and JD-GUI toolchain while comparing modern alternatives like jadx. Starting with DEX file structure analysis, it systematically covers decompilation principles, tool configuration, practical procedures, and common issue resolution for Android reverse engineering.
-
Excel Formula Auditing: Efficient Detection of Cell References in Formulas
This paper addresses reverse engineering scenarios in Excel, focusing on how to quickly determine if a cell value is referenced by other formulas. By analyzing Excel's built-in formula auditing tools, particularly the 'Trace Dependents' feature, it provides systematic operational guidelines and theoretical explanations. The article integrates practical applications in VBA environments, detailing how to use these tools to identify unused cells, optimize worksheet structure, and avoid accidental deletion of critical data. Additionally, supplementary methods such as using find tools and conditional formatting are discussed to enhance comprehensiveness and accuracy in detection.
-
Technical Practice of Capturing and Analyzing HTTP GET and POST Request Packets Using Wireshark
This article delves into how to use Wireshark, a network protocol analysis tool, to precisely capture and parse HTTP GET and POST request packets sent by applications. By detailing the configuration of Wireshark's display filters, packet structure analysis, and POST data extraction methods, it provides a systematic technical solution for developers in scenarios such as reverse engineering, API interface analysis, and network debugging. Based on practical cases and enhanced with code examples and step-by-step operations, the article helps readers master the core skills of extracting key request information from complex network traffic.
-
Implementing PHP Image Upload Using Instagram Content Publishing API
This article provides an in-depth exploration of Instagram's official Content Publishing API implementation, tracing the evolution from early unofficial reverse engineering to the official API release in 2021. Through comprehensive PHP code examples, it demonstrates the three core steps of OAuth authentication, media upload, and content configuration for automated image publishing. The analysis compares security and stability differences between implementation approaches while addressing practical development considerations including API permission acquisition and file format requirements.
-
Comprehensive Guide to Binary Executable Disassembly in Linux
This technical paper provides an in-depth exploration of binary executable disassembly techniques in Linux systems, focusing on the objdump tool and its output analysis while comparing GDB's disassembly capabilities. Through detailed code examples and step-by-step explanations, readers will gain practical understanding of disassembly processes and their applications in program analysis and reverse engineering.
-
Encoding and Handling Line Breaks Within CSV Cell Fields
This technical paper comprehensively examines the implementation of embedding line breaks in CSV files, focusing on the double-quote encapsulation method and its compatibility with Excel. Through detailed code examples and reverse engineering analysis, it explains how to achieve multi-line text display in cells while maintaining CSV format specifications, providing practical advice for cross-platform compatibility.
-
Comprehensive Guide to Examining Data Sections in ELF Files on Linux
This article provides an in-depth exploration of various methods for examining data section contents in ELF files on Linux systems, with detailed analysis of objdump and readelf tool usage. By comparing the strengths and limitations of different tools, it explains how to view read-only data sections like .rodata, including hexadecimal dumps and format control. The article also covers techniques for extracting raw byte data, offering practical guidance for static analysis and reverse engineering.
-
Comprehensive Technical Analysis of Source Code Extraction from Android APK Files
This paper provides a detailed technical examination of extracting source code from Android APK files. Through systematic analysis of APK file structure, DEX bytecode conversion, Java decompilation, and resource file decoding, it presents a comprehensive methodology using tools like dex2jar, JD-GUI, and apktool. The article combines step-by-step technical demonstrations with in-depth principle analysis, offering developers a complete source code recovery solution that covers the entire implementation process from basic file operations to advanced reverse engineering techniques.
-
A Comprehensive Guide to Creating Databases in MySQL Workbench: From Basic Concepts to Practical Operations
This article provides a detailed explanation of various methods for creating databases in MySQL Workbench, including both graphical interface and SQL query approaches. It begins by clarifying the equivalence between databases and schemas in MySQL, then step-by-step demonstrates how to create new databases via the object browser right-click menu and toolbar buttons, with corresponding SQL command examples. Additionally, it integrates data modeling features to show how to synchronize models to a MySQL server through forward engineering, ensuring readers gain a thorough understanding of the complete database creation process.
-
A Universal Method for Downloading CRX Files from Chrome Web Store Using Extension ID
This paper presents a comprehensive technical solution for directly downloading CRX files from the Chrome Web Store using extension IDs. By analyzing Chrome's update mechanism, it reveals the core principles of constructing download URLs with specific parameters (e.g., response=redirect, prod=chrome). The article delves into URL encoding, parameter passing, and redirection mechanisms, providing complete code examples and considerations to help developers implement automated downloads. Additionally, it compares the advantages and disadvantages of different answers, supplementing technical details on CRX format compatibility and MIME type handling, offering comprehensive guidance for related development work.
-
Multiple Methods and Practical Guide for Displaying Current Assembly Instructions in GDB
This article comprehensively explores three main methods for displaying current assembly instructions in the GDB debugger: using the layout asm command to enter assembly layout mode, employing the display/i $pc command for automatic instruction display, and utilizing the x/i $pc command for manual inspection. Through rich code examples and practical debugging scenario analysis, the article provides an in-depth comparison of the advantages and disadvantages of various approaches, along with advanced techniques such as mixed source-assembly display and disassembler option configuration. Drawing from GDB official documentation, it systematically introduces the various parameter usages and display effects of the disassemble command, offering comprehensive technical reference for assembly-level debugging.
-
Complete Guide to Extracting APK Files from Non-Rooted Android Devices
This article provides a detailed guide on extracting APK files from non-rooted Android devices using ADB tools. It covers core steps such as package name identification, APK path retrieval, and file extraction, along with batch processing scripts and solutions for permission issues, suitable for developers and tech enthusiasts for app backup and analysis.
-
Comprehensive Analysis of Windows DLL Export Function Viewers and Parameter Information Parsing
This paper provides an in-depth examination of tools and methods for viewing DLL export functions on the Windows platform, with particular focus on Dependency Walker's capabilities and limitations in parsing function parameter information. The article details how Windows module file formats store function information, explains the mechanisms of function decoration and name mangling that encode parameter type data, and compares functional differences among tools like dumpbin. Through practical examples, it demonstrates how to extract metadata such as parameter count and types from exported function names, offering comprehensive guidance for developers working with DLL interfaces.
-
Methods for Querying All Table Names in SQL Server 2008: A Comprehensive Analysis
This paper provides an in-depth examination of techniques for retrieving all table names in SQL Server 2008 databases, focusing on the utilization of the sys.tables system view, comparing implementation strategies for single-database versus cross-database queries, and illustrating through code examples how to efficiently extract metadata for documentation purposes.
-
Analysis Methods and Technical Implementation for Windows Static Library (.lib) Contents
This paper provides an in-depth exploration of content analysis methods for Windows static library (.lib) files, detailing the usage techniques of the DUMPBIN tool including functional differences between /SYMBOLS and /EXPORTS parameters, analyzing fundamental distinctions in symbol representation between C and C++ binary interfaces, and offering operational guidelines for multiple practical tools to help developers effectively extract function and data object information from library files.