Software engineer, Applications developer and security analyst.

@TheOverwolf

Latest stories

Reverse engineering – Supercell – part 6

Hello there!!!!! long time passed since the part 5.. lot of days.. months… but now, I’m back here writing what, until now, is the best part of all the journey – one of the, probably the most, hardest reverse engineering i did – even more fun then reverse engineering the full Arena Of Valor protocol and encryption. In the past write-ups about the Supercell cat mouse, the...

How i turn frick into a real frida based debugger

I’m finally proud to write this blog post after some weeks of study and test about how i’ve created my first debugger, built on top of Frida. As usual, let’s spend a couple of word to let the folks understand what was the goal. People following me through twitter or github already know that I recently came out with a new tool called frick, which is a Frida cli that sleep the...

Giving yourself a window to debug a shared library before DT_INIT – With Frida, on Android

Hello folks!!! Today I’m gonna share an interesting approach i’ve found to give my self a space to debug before initializations. Let’s spend 2 words about the problem and the goal: Certain compilers and obfuscators take advantages of the init and init_array, which is a pointer and an array of pointers, which point to functions, which are executed at some point during the loading...

Debug on a static context with uDdbg – Unicorn DOPE Debugger

Hello guys!! Today i’m writing down a couple of notes about a project I did started 1 month ago together with @rEDSAMK, Unicorn DOPE Debugger (GitHub). First off, I’m gonna spend a couple of line about the purpose and the goal, mainly, why it has been created. As I said in the last 5 minutes of my keynote at Disobey, with this tool, my goal is to provide a runtime environment for the...

A journey to Finland, Reverse Engineering on Android – Supercell Pt 5

Hello once again everyone and welcome to the 5th chapter of my blog post chain about reverse engineering and Supercell. Lot of news and cool stuffs happened since my last post and… I’m getting excited just by thinking the word to use to write this blog post. During the last week I got invited from Supercell, in Finland, to speak at Disobey¬†about all of the things posted in the blog...

Sensitive data manipulation and tracing on Android – Privacy – SpotifApp

Users’ privacy is a hot topic nowadays, with billions of applications available with an easy tap – The same tap we used to quickly give on those “I agree” checkboxes (which sometimes are totally missing – which is so bad), without actually reading a line of what we are about to “give an ok”, but it’s fine. We all know that almost 99% of the...

Reverse Engineering – Supercell – part 4

Hello everybody and welcome to the part 4 of my blog post chain about Supercell games reverse engineering! (I start thinking that we should find something new for the intro… My vocabulary is a bit limited). Almost 20 days after my last post, I’m coming with some great news, personal ones and of course, about some new found we did. Let me start with a big thanks and welcome to @Fil...

Reverse Engineering – Supercell – October update, part 3

Hello everybody and welcome to the third chapter of my Supercell reverse engineering posts chain. As said in the second post of the chain, everything has been so quite till the beginning of october, where a missive update has hit Clash Royale, Clash of Clans and Boom Beach. New content has been introduced for almost all of the games and also, I’m happy to see some real security actions that...

Reverse Engineering – Supercell – Clash Royale. Part 2

Almost two month later, here we are with the act two of the Supercell reverse engineering post series, if you missed the first one about the new encryption, it can be found here. Nothing special came in terms of updates on any of the Supercell games after holydays, waiting for the scheduled big one that will hit Clash Royale in the upcoming days and that I’m sure will be fullfit of changes...

Clash of Clans – SuperCell new encryption reverse engineering

In this paper I’m going to speak about what I’ve did to reverse engineer the new encryption, using Clash of Clans as base (The logic used to break CoC could be replicated as well on Boom Beach and HayDay that are already shipped with the new encryption). I’ll skip whatever that’s already known (the previous encryption), as it can be read and understood here:¬† (SuperCell...