We used Ghidra before to decompile (reverse engineer code in layman terms) to look through the Star Wars Commander code for any goodies.
It's a small example, but we found out their encryption method and whatnot that way.
We used Ghidra before to decompile (reverse engineer code in layman terms) to look through the Star Wars Commander code for any goodies.
It's a small example, but we found out their encryption method and whatnot that way.
It's like reverse baking.
When you eat a cupcake, you can only guess at the exact recipe used right?
But if you used Ghidra on that cupcake, you would be able to see that it used 2 cups of flour, 1 tbsp of salt and so on because the recipe would appear!
Yaayy!
It wasn't as noteable as you'd think.
(Just for other codefag Anons)
Star Wars Commander was made in the Unity game engine and so none of the main Update() and Start() methods could be found, so any references to any IP addressed used with Photon (the encryption API they were using) are just the class constructor defaults.
Maybe there's something missing that I did, other Anons might want to go look through the Unity code again for it.
Looks like we have a little dig here. Back to Star Wars.
>And can that work on web sites to decompile javascript?
I don't think so. Other Anons might prove me wrong though.
Ghidra's output is code, so you'd need to understand whatever language it spits out. It takes the 1's and 0's and spits back out the text that made those 1's and 0's in a rough sense.