Hardware Reverse Engineering
Hardware reverse engineering involves taking apart a device to see how it works. For example, if a processor manufacturer wants to see how a competitor's processor works, they can purchase a competitor's processor, disassemble it, and then make a processor similar to it. However, this process is illegal in many countries. In general, hardware reverse engineering requires a great deal of expertise and is quite expensive.Tools Used In Reverse Engineering
There are lots of tools on the market. Toad from Quest and Quest's new Knowledge Base tools (previously from RevealNet) will reverse engineer the database for you. And there are other tools as well like Oracle Designer, etc. So they are out there, but they will cost money.If you are using Oracle 9i, then you can look at the DBMS_METADATA package. This package will reverse engineer any database object for you.
Another free avenue is the export file of the database. You've already mentioned the INDEXFILE option, but the SHOW option also works. Both are a little "messy" though.
And you can search the WWW for many, many scripts out there to do this as well.
Reverse Engineering For Mobile Apps
Reverse engineering applications help penetration testers understand how the application works and discover weaknesses that can be used by Hackers in a real-world attack. It’s also used to find hidden malware in the underlying code. For example, enterprises that are risk averse may decide to set up their own mobile app store, giving employees approved applications that have been vetted and whitelisted for use on their smartphone or tablet devices.
0 comments:
Post a Comment