Category Archives: Reverse Engineering

Neuromancer Codewheel – Part 2

Editorial note: This is the second of a two-part tutorial on reverse engineering executables. Today, we’ll walk through the process of analyzing a series of assembly instructions. These instructions implement the codewheel verification check from the 1989 game “Neuromancer”. We … Continue reading

Posted in Reverse Engineering | Comments Off

Neuromancer Codewheel – Part 1

Editorial note: This is the first of a two-part tutorial on reverse engineering executables. Today, we’ll walk through the process of finding the section of an executable responsible for performing a certain task, and next week we’ll analyze the assembly … Continue reading

Posted in Reverse Engineering | Comments Off

Quickie – Neuromancer

I’ve been working on a longer, reverse-engineering piece about Neuromancer, but couldn’t get it finished in time to post this week. In it’s place, a simple javascript implementation of the game’s code wheel.

Posted in Reverse Engineering | Comments Off

Memory Dumps from DOS DEBUG

As I’ve mentioned before, I like to use the DOS DEBUG command to investigate older 16-bit programs. Today, I present a brief guide to using that tool to take snapshots of running programs.

Posted in Reverse Engineering | Comments Off

Isometric Graphics w/JS & HTML

As an experiment, I decided to see if I could approximate a Flash game in JavaScript and HTML (without using the non-standard CANVAS tag). It turns out to be pretty easy to replicate an isometric display using some simple 2D … Continue reading

Posted in Projects, Reverse Engineering | Comments Off

Extracting bitmaps from Flash

Flash content is pretty common on the Web, but it is considerably less transparent than traditional HTML-based content. Whereas HTML-based content is built from human-readable script files and URL resource definitions, Flash content is locked inside a binary file format. … Continue reading

Posted in Reverse Engineering, Web stuff | Comments Off

File and Memory Offsets with DOS DEBUG

I often use the DOS DEBUG command to investigate older 16-bit programs; while there are doubtless better tools, DEBUG is ubiquitous and effective. There are many guides to its operation, but here I focus on a specific and practical question: … Continue reading

Posted in Reverse Engineering | Comments Off

1985 Data Structures (Hacker)

Editorial note: I enjoy poking around the innards of old computer games. I think it’s interesting to learn how the things worked, especially since they often had to cope with formidable resource restrictions. This is one of an occasional series … Continue reading

Posted in Reverse Engineering | Comments Off