How do I hack source code? [Archive] Wybiral December 17th, 2006, 11:34 PM Well, you have to specify which language it was written in. If it is open source, you don't have to do anything... objdump py2d.so -s The lowercase s will give you all of the hex bytes in the file. objdump py2d.so -S The capital S is for the assembly dump. Unfortunately, there aren't disassembly programs that can completely recover the source, so you can really only use this to find small routines, and even then they have been optimized by the compiler and wont be much help. But, if you're luck your program will be in python or something, or it will be open source. Oh yeah, if you need a good hex editor, GHex is for gnome and it works great!
Joint Test Action Group Joint Test Action Group (JTAG) is the common name for the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised by electronic engineers for testing printed circuit boards using boundary scan and is still widely used for this application. Overview JTAG was an industry group formed in 1985 to develop a method to test populated circuit boards after manufacture. At the time, multi-layer boards and non-lead-frame ICs were becoming standard and connections were being made between ICs which were not available to probes. The industry standard finally became an IEEE standard in 1990 as IEEE Std. 1149.1-1990 after many years of initial use. Debugging Although JTAG's early applications targeted board level testing, the JTAG standard was designed to assist with device, board, and system testing, diagnosis, and fault isolation. Storing firmware JTAG programmers are also used to write software and data into flash memory. Primitives
JTAG Tutorial Since its introduction as an industry standard in 1990, boundary-scan (also known as JTAG) has enjoyed growing popularity for board level manufacturing test applications. JTAG has rapidly become the technology of choice for building reliable high technology electronic products with a high degree of testability. Due to the low-cost and IC level access capabilities of JTAG, its use has expanded beyond traditional board test applications into product design and service. This article provides a brief overview of the JTAG architecture and the new technology trends that make using JTAG essential for dramatically reducing development and production costs, speeding test development through automation, and improving product quality because of increased fault coverage. The article also describes the various uses of JTAG and the tools available today for supporting JTAG technology. What is JTAG? A Brief History of JTAG Figure 1 - Typical JTAG Device Figure 2 - Interconnect Test Example
Hack Your Gadgets and Void Your Warranties This Weekend Speaking of hacking - why not - let me share my hacking experience today: On multiple levels! - A digital photography tech comment, if you will. I just received my brand new Eye-fi X2 Pro card. Totally forgetting to check how Magic Lantern firmware hack - currently installed on my Canon 550D/T2i - deals with it, anxious as I was to test the thing up, popped it in and turned the camera on. Nothing. Recharged both my batteries and tried again to no avail. At that point, I was having a mini heart attack. Removed the battery, popped my 8Gb Sandisk back and, oh relief of the Gods, everything was back to normal. Google time! Found out after some research that new X2 versions of the Eye-fi cards won't work well with Magic Lantern. Still tried several things... disabled Magic Lantern (or to the more technical ML fan - set bootflag off), low level format the Eye-fi card, tried installing ML back with the Eye-fi card, camera froze while trying to install the firmware. No way. Installed the app, nothing.
Hackers Said to be Planning to Launch Own Satellites to Combat Censorship Hackers reportedly plan to fight back against Internet censorship by putting their own communications satellites into orbit and developing a grid of ground stations to track and communicate with them. The news comes as the tech world is up in arms about proposed legislation that many feel would threaten online freedom. According to BBC News, the satellite plan was recently outlined at the Chaos Communication Congress in Berlin. It's being called the "Hackerspace Global Grid." If you don't like the idea of hackers being able to communicate better, hacker activist Nick Farr said knowledge is the only motive of the project, which also includes the development of new electronics that can survive in space, and launch vehicles that can get them there. Farr and his cohorts are working on the project along with Constellation, a German aerospace research initiative that involves interlinked student projects. The plan isn't without limitations.
Meet Dark Tangent, the hacker behind Black Hat and DEF CON Jeff Moss founded the hacker conferences Black Hat and DEF CON, which take place this week in Las Vegas. Jeff Moss, aka Dark Tangent, founded DEF CON and Black Hat Both conferences are for hackers and computer-security professionals Moss says hackers can help make the Internet and computers safer (CNN) -- The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer for the rest of us. "Hacking is sort of a skill set -- it's neutral. "If those are the people who are most interested, those are probably the people who you want to get involved." Moss stands as an example of this idea. Now he's on the Homeland Security Advisory Council, which gives advice and recommendations to the federal government on matters related to national security. The following is an edited transcript: CNN: How did Black Hat and DEF CON get started? Moss: The two are definitely interconnected. CNN: What happened? (Laughs)
Can't make a workshop? Follow my weekly data-hacking tutorials on the BD blog :) - Hacks/Hackers Toronto (Toronto, ON) - Meetup Hey all! So as part of my own motivation to keep learning and using new data-hacking tools, as well as honing my own data workflow on BuzzData, I've begun posting weekly how-to tutorials for probing/analyzing/visualizing data on the BuzzData blog. Thought I'd share the first with Hacks/Hackers TO — it's a very basic step-by-step guide that goes through best practices for taking an Excel sheet with lots of data, whittling it down to what you need with a Pivot Table and then graphing it in a clear, organized manner: The plus-side to these tutorials is that I'm actually using city open data that hasn't been mined before, so it's kind of neat to find real trends/findings in the data as you go along. In this case I examined Toronto's water consumption data over the last 10 years and was surprised to find that the downtown wards are by far the highest culprits of water use (after correcting for account # per ward), not the suburbs. Cheers!
Hacking tips on how to deal with mobile hackers How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianChinese, Danish, Dutch, Estonian, FrenchGerman, GreekItalianHebrew, Japanese, Lithuanian, Norwegian, PersianPortuguese (Brazilian), RomanianSpanish, Turkish, and Swedish. If you find this document valuable, please leave me a tip on Gittip. 1. 2.
8 Things You Won't Believe Can Be Hacked If movies are to be believed, hackers are mostly kept busy fighting the man with CGI animations of smiley faces, or else dwelling in the darkest corners of their mothers' basements and doing purely nerdy stuff that never affects the real world. But neither assumption is true: Hacking does not look like a rad skateboarder busting a kickflip over an onyx tower, and hackers do gain access to things that can affect your daily life ... and sometimes, even end it. #8. Explode Your Genitals We think we have a pretty good idea of what hackers are capable of: stealing your personal information, crashing your computer, Rollerblading like a sonofabitch and making out with Angelina Jolie (back when she was hot, before her alien DNA kicked in and she started looking like a hawk-monster). But today's hackers have finally crossed a line, and must be terminated with extreme prejudice. Photos.com"The good news is that your leg is going to be fine ..." "Is it enough to Sharpie 'Avira' onto them?" #7. #6.