Fix inconsistency
This commit is contained in:
parent
e92d1663aa
commit
0cd8c62c83
|
|
@ -5,7 +5,7 @@
|
|||
|
||||
Reverse engineering can be used for a variety of purposes, such as identifying vulnerabilities in a system, developing compatible products or services, or creating modifications or improvements.
|
||||
|
||||
In the context of ROBLOX, reverse engineering refers to the practice of analyzing the game engine in order to understand how they work which can be used for a multitude of things including the ability to create custom modifications and extensions, discover vulnerabilities, add support for different hardware or Operating Systems, restore or add to it's functionality for older and outdated versions and much more.
|
||||
In the context of Roblox, reverse engineering refers to the practice of analyzing the game engine in order to understand how they work which can be used for a multitude of things including the ability to create custom modifications and extensions, discover vulnerabilities, add support for different hardware or Operating Systems, restore or add to it's functionality for older and outdated versions and much more.
|
||||
|
||||
## How do I get started?
|
||||
|
||||
|
|
@ -13,7 +13,7 @@ Getting started with reverse engineering can be very tedious and time consuming
|
|||
|
||||
However, here are a few steps we've put together which you can follow to get started:
|
||||
|
||||
1. **It's important to first familiarize yourself with the basics:** Start by learning about the fundamental concepts and tools used in reverse engineering. This can include things like disassembling, debugging, performing static and dynamic analysis, and learning how program memory works.
|
||||
1. **Familiarize yourself with the basics:** Start by learning about the fundamental concepts and tools used in reverse engineering. This can include things like disassembling, debugging, performing static and dynamic analysis, and learning how program memory works.
|
||||
|
||||
2. **Get the right tools:** You'll need a range of tools to get started with reverse engineering. Some of the most commonly used tools include disassemblers (like [IDA Pro](https://hex-rays.com/ida-pro/)[^1]), and debuggers (like [x64dbg](https://x64dbg.com/)).
|
||||
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
## Introduction
|
||||
|
||||
Signatures are another means of security ROBLOX uses to prevent any unauthorized tampering with external requests from ROBLOX Servers.
|
||||
Signatures are another means of security Roblox uses to prevent any unauthorized tampering with external requests from Roblox Servers.
|
||||
|
||||
Traditionally, signatures are, as the name suggests, a method to determine the actual author/sender of an article.
|
||||
|
||||
|
|
@ -18,13 +18,14 @@ flowchart LR
|
|||
|
||||
## Client Signatures
|
||||
|
||||
ROBLOX uses (and *used*) signatures for a multitude of things including but not limited to:
|
||||
Roblox uses (and *used*) signatures for a multitude of things including but not limited to:
|
||||
|
||||
- [JoinScripts](/Client Security/JoinScripts)
|
||||
- Online CoreScripts (2010-2014)<sub><sup>[Citation needed]</sup></sub>
|
||||
- BuiltInPlugins[^3]
|
||||
|
||||
### Specification
|
||||
ROBLOX uses the [RSA](https://en.wikipedia.org/wiki/RSA_(cryptosystem)) algorithm (1024-bits) with X509 and PKCS7 encoding.
|
||||
Roblox uses the [RSA](https://en.wikipedia.org/wiki/RSA_(cryptosystem)) algorithm (1024-bits) with X509 and PKCS7 encoding.
|
||||
|
||||
Signature wrappers have differed between the years but here are the primary forms:
|
||||
|
||||
|
|
@ -38,7 +39,8 @@ Signature wrappers have differed between the years but here are the primary form
|
|||
|
||||
<h3 id="see-also">See Also:</h3>
|
||||
- [Generating a public/private key](/Extras/KeyGeneration)
|
||||
- [JoinScripts](/Client Security/JoinScripts)
|
||||
- [JoinScripts](/Client Features/JoinScripts)
|
||||
|
||||
[^1]: More Information: [https://www.cisa.gov/uscert/ncas/tips/ST04-018](https://www.cisa.gov/uscert/ncas/tips/ST04-018)
|
||||
[^2]: Signed data goes from server to client then which the client verifies it.
|
||||
[^3]: Signed BuiltInPlugins were introduced in late 2019 in the form of *.sig files
|
||||
Loading…
Reference in New Issue