Inane Observations $ sudo fix_it
  • Reverse engineering software licensing from early-2000s abandonware – Part 3

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    In part 2, we reverse engineered the decrypted format of the licence file data for this particular software. In this part, we investigate that how exactly that licence file is encrypted.

    Into the fray

    In part 2, we identified that the decrypted licence file… »

  • Reverse engineering software licensing from early-2000s abandonware – Part 2

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    In part 1, we reverse engineered the registration code licensing mechanism of this particular software. However, that mechanism was not the mechanism actually in use in 2004; rather, a different mechanism was used based on licence files named license.bin. In this part, we… »

  • Reverse engineering software licensing from early-2000s abandonware – Part 1

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    Background

    This series concerns a software licensing system used in a proprietary software application from circa 2004. The software was available in an unregistered trial mode with limited functionality. A free licence could be obtained by registering online with the software vendor. The software became… »

  • Investigating and disabling hard-coded certificate pinning in an Android application

    23 December 2020 | programming reverse engineering obfuscation security cryptography encryption | Comment

    mitmproxy is an open source interactive HTTPS proxy, which makes it easy to intercept HTTPS for reverse engineering, including an Android clients. It does this by installing its own CA certificate on the client device.1

    Recently, I was attempting to reverse engineer the HTTPS… »

  • Illegal numbers

    30 December 2019 | copyright drm reverse engineering obfuscation security law | Comment

    Legal counsel for various companies, including AACS LA (Advanced Access Content System Licensing Administrator) LLC, DVD Copy Control Association Incorporated, Intel Corporation, Motion Picture Association of America Incorporated, Sony Computer Entertainment America Incorporated and Texas Instruments Incorporated, have determined that the possession or distribution of… »

  • Investigating Google Cast: Disabling device authentication on Android with Xposed

    20 December 2019 (updated 22 December 2019) | reverse engineering obfuscation security google cast | Comment

    Background

    Google Cast is a proprietary protocol by Google which enables controlling playback of Internet-streamed audiovisual content on the Chromecast, Android TV and other compatible devices.

    From the consumer perspective, Google Cast connects two devices: a sender (such as a smartphone) and a receiver (such… »

  • Investigating a MIDI music DRM system (c. 1998)

    24 August 2019 (updated 28 August 2019) | copyright drm reverse engineering obfuscation security | Comment

    Background

    This post concerns a DRM system used in a proprietary JavaScript-based music player. The music is sequenced locally in the client based on instrument and note data, à la MIDI. The music player does not have any export capabilities, but like the previous instalment… »

  • Investigating a legacy document delivery DRM system – Part 2

    17 August 2019 | copyright drm reverse engineering obfuscation security | Comment

    Last time, we investigated the HTML5 viewer for a document delivery DRM system, rehosting the viewer to give us unlimited access to documents – but only through the standard print procedure, which inserts watermarks and copyright information. This time, we'll investigate how we can… »

  • Investigating a legacy document delivery DRM system – Part 1

    17 August 2019 | copyright drm reverse engineering obfuscation security | Comment

    Background

    This post concerns a DRM system used in an online document delivery platform (think PDFs, but proprietary), established circa 2000 and still in popular operation. Documents purchased through the platform are delivered in a proprietary encrypted file format, which can be opened using a… »

  • Investigating a recent ebook DRM system (c. 2018)

    28 March 2019 (updated 09 April 2019) | copyright drm reverse engineering encryption cryptography security | Comment

    Background

    This post concerns a DRM system used in an online ebook platform, released circa 2018. Users of the platform can purchase ebooks and either view them online, or download them for offline viewing using a proprietary Android/iOS app.

    As usual, the particular DRM system… »

  • Crypto failures in the wild

    28 January 2019 | reverse engineering encryption cryptography security | Comment

    Sony PlayStation 3 ECDSA random number reuse

    The Sony PlayStation 3 (2006) uses Elliptic Curve DSA (ECDSA) to sign executable binaries.

    ECDSA takes a private key \(d_A\) and a random number \(k\) with public parameters \(G\), \(n\) and public key \(Q_A = d_A G\), and… »

  • Investigating an early-2010s gaming DRM system: Part 4

    11 December 2018 | copyright drm reverse engineering encryption cryptography security | Comment

    Last time, we investigated how an early-2010s gaming DRM system approached machine-based licensing. This time, we'll investigate exactly how the DRM system interacts with the game to accomplish its ends.

    Structure of the DRM system

    Looking at the game binary, FooBarBazX.exe, for the… »

  • Investigating an early-2010s gaming DRM system: Part 3

    02 December 2018 | copyright drm reverse engineering encryption cryptography security | Comment

    Last time, we investigated how an early-2010s gaming DRM system stored licences for games. This time, we'll investigate how those licences are tied to particular devices.

    From last time, we know that the licence file contains an encrypted XML payload:

    <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
    … »
  • Investigating an early-2010s gaming DRM system: Part 2

    02 December 2018 (updated 12 December 2018) | copyright drm reverse engineering encryption cryptography security | Comment

    Last time, we investigated part of a gaming DRM system from the early-2010s, looking at some of the configuration files. This time, we'll investigate how the licences for these games are stored.

    Is is known that the licence data for the games is stored… »

  • Investigating an early-2010s gaming DRM system: Part 1

    16 November 2018 (updated 11 December 2018) | copyright drm reverse engineering encryption cryptography security | Comment

    Background

    This post concerns a DRM system used in a PC gaming platform introduced in the early 2010s. The particular DRM system is not relevant and will not be identified, but will be familiar to many.

    One function of the DRM system is to require… »

  • Hacking a cheap fitness tracker – Setting the time

    22 January 2018 | linux hardware hacking reverse engineering bluetooth | Comment

    The cast

    The Mambo HR is a no-name $30 fitness tracker from Chinese manufacturer Lifesense, and I recently acquired one as a gift. Let's look this horse in the mouth, shall we?

    Oof, it's not pretty. The Mambo HR has no buttons or touch functionality,… »

  • Home
  • Git (Archives: GitLab, GitHub)
  • Research
  • Quick Links
  • Posts
    • February 2023 (1)
    • December 2022 (4)
    • October 2022 (4)
    • September 2022 (5)
    • August 2022 (2)
    • More…
  • Tags
    • linux (30)
    • misc (21)
    • opentally (20)
    • copyright (19)
    • medicine (19)
    • single transferable vote (19)
    • drm (18)
    • monash (11)
    • encryption (10)
    • mathematics (9)
    • proportional representation (8)
    • statistics (8)
    • law (7)
    • meeting procedure (7)
    • victoria (7)
    • defective by design (6)
    • digital rights management (6)
    • ptv (6)
    • public transport (6)
    • creative commons (4)
    • ledger (4)
    • plain-text accounting (4)
    • rust (4)
    • webassembly (4)
    • politics (3)
    • python (3)
    • asexuality (2)
    • gsrm (2)
    • tax (2)
    • victorian electoral commission (2)
    • android (2)
    • security (15)
    • cryptography (10)
    • programming (8)
    • bookkeeping (4)
    • television (2)
    • review (8)
    • med in review (11)
    • obfuscation (9)
    • music (9)
    • parliamentary procedure (7)
    • video editing (3)
    • reverse engineering (16)
    • voting systems (8)
    • elections (12)
    • ebook (16)
    • guide (33)
  • Pages
    • Financial statements
    • Musical arrangements
    • Random draws
  • Lee Yingtong Li
  • blog@yingtongli.me
  • My CV · CV of Failures
@RunasSudo

Most material on this website is available under an open licence. See https://yingtongli.me/blog/copyright.html for details.