PDA

View Full Version : Researchers Reverse-Engineer Dropbox, Cracking Heavily Obfuscated Python App


sl4shd0t
08-28-2013, 10:36 AM
rjmarvin writes "Two developers were able to successfully reverse-engineer Dropbox to intercept SSL traffic, bypass two-factor authentication and create open-source clients. They presented their paper, 'Looking inside the (Drop) box' (PDF) at USENIX 2013, explaining step-by-step how they were able to succeed where others failed in reverse-engineering a heavily obfuscated application written in Python. They also claimed the generic techniques they used could be applied to reverse-engineer other Frozen python applications: OpenStack, NASA, and a host of Google apps, just to name a few..." http://a.fsdn.com/sd/twitter_icon_large.png (http://twitter.com/home?status=Researchers+Reverse-Engineer+Dropbox%2C+Cracking+Heavily+Obfuscated+Py thon+App%3A+http%3A%2F%2Fbit.ly%2F147nh2R) http://a.fsdn.com/sd/facebook_icon_large.png (http://www.facebook.com/sharer.php?u=http%3A%2F%2Fdevelopers.slashdot.org% 2Fstory%2F13%2F08%2F28%2F0048238%2Fresearchers-reverse-engineer-dropbox-cracking-heavily-obfuscated-python-app%3Futm_source%3Dslashdot%26utm_medium%3Dfaceboo k) http://www.gstatic.com/images/icons/gplus-16.png (http://plus.google.com/share?url=http://developers.slashdot.org/story/13/08/28/0048238/researchers-reverse-engineer-dropbox-cracking-heavily-obfuscated-python-app?utm_source=slashdot&utm_medium=googleplus)

Read more of this story (http://developers.slashdot.org/story/13/08/28/0048238/researchers-reverse-engineer-dropbox-cracking-heavily-obfuscated-python-app?utm_source=rss1.0moreanon&utm_medium=feed) at Slashdot.
http://slashdot.feedsportal.com/c/35028/f/647376/s/307b33db/sc/4/mf.gif


http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/1/rc.img (http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/1/rc.htm)
http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/2/rc.img (http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/2/rc.htm)
http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/3/rc.img (http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/sc/4/rc/3/rc.htm)

http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/a2.img (http://da.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/a2.htm)http://pi.feedsportal.com/r/173608421238/u/49/f/647376/c/35028/s/307b33db/a2t.imghttp://feeds.feedburner.com/~r/Slashdot/slashdotDevelopers/~4/NSgatZRnKsM

More... (http://rss.slashdot.org/~r/Slashdot/slashdotDevelopers/~3/NSgatZRnKsM/story01.htm)