Morning Coffee Post: Reverse Engineering

Couple of quick links this morning. Today's theme is reverse engineering.

First, over on Plasser.net the author has done some cool reverse engineering work on meebo.com. Meebo is a new AJAX-powered instant messaging site. The Plasser.net guy has figured out how they continiously query the server in an efficient way; its a good post, and even includes source code on using the technique yourself.

Next, the blogger over at http://blog.yuan.cc reversed engineering part of Rojo, the company I used to work at, and made it's Mark Read functionality more efficient and usable using Greasemonkey. A screenshot of his Greasemonkey script in action (his addition is the new option 'Mark this feed as read'):


Finally, a group of open source hackers has come together to create Red5, an open source implementation of Macromedia's Flash Communication Server (FCS). FCS is an amazing product, making it possible to collaborate with webcams and audio, and to stream shared video, audio, and objects. Unfortunately, FCS is wickedly expensive and completely closed source. FCS works through a proprietary Macromedia protocol named RTMP (Real-Time Messaging Protocol).

These guys are serious; I've been tracking their progress the last week and a half and its been phenomenal. They've cracked a large amount of the RTMP wire protocol; an outside user contributed a Ruby implementation that they created on their own awhile back; and a Red5 programmer has created the beginning scaffoldings of an RTMP implementation.

Comments

Sara Reid said…
Memoryze is designed to aid in memory analysis in incident response scenarios. However, it has many useful features that can be utilized when doing malware analysis. Memoryze is special in that it does not rely on API calls. Instead Memoryze parses the operating systems' internal structures to determine for itself what the operating system and its running processes and drivers are doing.

protein powder