Anonymous ID: 6c5086 May 5, 2020, 11:23 a.m. No.9040744   🗄️.is 🔗kun

>>9040211

Possibly.

Step 1. Notice the enemy's comms in twitter and instagram is making references to a certain online game.

Step 2. Sign up for the game and get the software installed on your PC

Step 3. Begin analyzing the code using Ghidra to see if there are backdoors or secret commands

Step 4. Install Wireshark and monitor the network traffic on your PC while you play the game. Capture the whole stream because you might want to write some code to analyze it.

 

Oh, did I forget Step 0?

Learn how to reverse engineer. In other words, do a LOT of reading.

 

But think critically. If they know that people are watching they are likely to install some code on the game server end, which means that the traces on the game client will be very small and subtle and hard to find.

 

Analyzing the traffic can help identify when encryption was suddenly turned on which might help narrow down your analysis.

Anonymous ID: 6c5086 May 5, 2020, 11:28 a.m. No.9040800   🗄️.is 🔗kun

>>9040243

 

Don't run old Java

11 is the MINIMUM version

Get OpenJDK 14 here

 

https://jdk.java.net/14/

 

You can still use Oracle if you like, but use version 14