User Controls

If you downloaded Ghidra, AKA the NSA debugger i got bad news for you.

  1. #1
    Sophie Pedophile Tech Support
    In debug mode the JDWP service is exposed to all interfaces because the NSA put in an asterisk instead of 127.0.0.1. This means you're now vulnerable to RCE.

    Pretty sure, it's a feature, not a bug.

    The following users say it would be alright if the author of this post didn't die in a fire!
  2. #2
    Ok, now translate please.
  3. #3
    Sophie Pedophile Tech Support
    Originally posted by Misguided Russian Ok, now translate please.

    Don't trust freebies the NSA gives out. They had this whole big deal about helping the cyber community with their special program built for programmers and security researchers. Turns out it was a trick and they purposefully made it in such a way that your system is at risk if you use their program.
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. #4
    Star Trek VI: The Undiscovered Country Dark Matter [my scoffingly uncritical tinning]
    https://github.com/blacktop/docker-ghidra

    Run it in a container maybe?
  5. #5
    aldra JIDF Controlled Opposition
    lulzar

    Originally posted by Star Trek VI: The Undiscovered Country https://github.com/blacktop/docker-ghidra

    Run it in a container maybe?

    you don't even need to do that, just firewall it, but I'd doubt this is the only 'flaw' that'll come out of it.
  6. #6
    filtration African Astronaut
    This post has been edited by a bot I made to preserve my privacy.
  7. #7
    Sophie Pedophile Tech Support
    Duh, won't matter if you just cut your network cable. Use less hardware nigger. The point is, they did this on purpose.
  8. #8
    filtration African Astronaut
    This post has been edited by a bot I made to preserve my privacy.
  9. #9
    I was gonna use this program to reverse engineer video games like the cool kids did with mario 64. Are you telling me it will give me a virus? But all the cool hacker crackers use it or IDApro
  10. #10
    Sophie Pedophile Tech Support
    Originally posted by the man who put it in my hood I was gonna use this program to reverse engineer video games like the cool kids did with mario 64. Are you telling me it will give me a virus? But all the cool hacker crackers use it or IDApro

    How about you learn how to reverse engineer first. IDA Pro is great, but it's up to you.
  11. #11
    Nil African Astronaut
    Heh "hackerfantastic"
  12. #12
    Originally posted by Sophie How about you learn how to reverse engineer first. IDA Pro is great, but it's up to you.

    I just need to look at the code of game because I want to rom hack it and it seems easier to do that than try to understand what all the hex code means without any existing documentation
  13. #13
    Sophie Pedophile Tech Support
    Originally posted by the man who put it in my hood I just need to look at the code of game because I want to rom hack it and it seems easier to do that than try to understand what all the hex code means without any existing documentation

    There's probably engines written for that sort of thing. Special programs that can recover, read, write particular data you're interested in through a nifty GUI. At least i'd imagine that to be the case. Modders and game hackers often have specific tooling, either written by them or based on official development tools. Not sure how the ROM hacking community does it. But back when i was modding games and running private servers for MMORPGs there were toolkits available for that sort of thing.

    For instance when modding LotR:BFME there was a tool that could unpack certain files, allow you to read them, save them, import and export and allow you to make changes. WoW private servers were just a matter of setting up the base server components and all the game rules were accessible through a MySQL database. Change values in the DB and the server pack would integrate the changes.

    Other than that i do a bit of console hacking on the side, which is a combination of hardware components that can be flashed with a particular tool that allows you to write 'hack' scripts. You compile them, flash to the hardware and boom. Fully automatic sniper rifle with aim assist turned up to one hundo.
  14. #14
    filtration African Astronaut
    All your computers belong to us... NSA/USA are kikes
  15. #15
    Cly African Astronaut [foredate your moneyless friar's-cowl]
    Plot twist: Sophies tech setup is American hand me down tech.
Jump to Top