- 精华
- 0
- 帖子
- 4
- 威望
- 0 点
- 积分
- 4 点
- 种子
- 0 点
- 注册时间
- 2011-1-30
- 最后登录
- 2011-2-24
|
楼主 |
发表于 2011-2-19 08:36 · 马来西亚
|
显示全部楼层
感谢dumb3128,昨天我也在wololo开了同样的帖子和同样的问题。。。
某人建议是。。。
Reversing is the key. You have to know assembly very well. PSARdumper would get you all the prx's from the OFW. Reversing OFW components is no easy task. Mainly because there is quite a bit of code in each file and it would take you forever to reverse an entire prx from the OFW. Hopefully what you need is limited to a small section of code and you won't have to reverse the whole thing.
PSPLink is a powerful tool and a must have. I would go on about how great it is, but it speaks for itself.
My advice would be to start simple. I disassembled Prometheus ISO Loader's EBOOT and figured out how it calls launcher.prx. It wasn't too bad. You might want to start there.
和
Yes, I mean mips. Reversing is reading the assembly code and converting it to a more usable form like C++. It's related to cracking software ...and by cracking I mean for legal purposes, like when you have permission, or its your own software. You usually have to reverse at least part of the code in order to crack something. The idea is to understand how things work when there aren't any documentation available. Once you get how it works, then you can start looking for weaknesses to exploit.
他是建议我学会assembler和reversing(回编),你觉得怎样? |
|