Reverse Engineer Software

How to Reverse Engineer Software

Reverse engineering software

Reverse engineering software involves perceptiveness of the act of functioning the programme from finish to start. For instance, we possess ready-made software that operates and functions, and we want to know exactly in what way it acts. To handle that, we need to govern the way it was created, step by step. And we’ll do that from the end to the onset.

For a better apprehension of this concept, let’s give a simpler sample. Let’s imagine that we have a cell phone that has broken down. In order to fix the puzzle, we need to replace one of the parts within it. But we don’t catch on what exactly. Therefore, we’ll disassemble the phone until we find out what detail is broken. Or just for curiosity, to perceive the way the apparatus works.

Reverse engineering isn’t an easy operation, as it may seem at first glance. It craves a variety of cognition bases. For instance, if we face the assignment of reconstructing network apps, then we need to grasp the formation of network, to know about the interactions between operations and know the formation of network packets that need to be anatomized, not to mention the link and its order. User also has to know methods and ways of arranging the software on shelves. Such assignment is not for everyone. It’s much easier to do it with a person who has experience in software operation, since he knows how the whole system goes, alike every element of this system.

The considerable point is a disassembler. It defines the exploit and schemes for specific software. However, there’s no pattern of parsing and reversing software, so you should focus on diverse approaches to conclude this puzzle. Besides, reversing of the cipher foresees the apprehension of the concept of ​​its functioning, and not guessing the patent cipher.

Reverse engineering software tools

There’re certain tackles:

IDA Pro is famous disassembler. It’s often recommended because of its ordinary interface and because of being user-friendly. IDA Pro anticipates a number of tackles that significantly accelerate back-end engineering, such as displaying a function call tree, parsing and importing the performed file, displaying the required data concerning it.

Sysinternals utils assumes the following tackles:

  1. TCPView – network sniffer and allows users to view data over TCP / UDP packets.
  2. TDIMon is similar to TCPView, but checks actions at the socket level.
  3. PortMon checks serial and collateral ports and all traffic that passes through them.
  4. WinObj – represents all objects in the scheme in a hierarchical formation.
  5. The API Monitor allows you to identify any APIs and their demeanor and has a very potent built-in database.
  6. WireShark’s a vigorous network sniffer.

You determine which one to choose.

Igor Grigorenko

Add comment