Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> They surely read the copyrighted decompiled code

Do they? When it comes to reverse-engineering mobile app APIs, the usual strategy is to observe the network because it's so much easier than making sense of the disassembled binary.

Even if you can decompile, you'd generally use it as an aid to understand the network captures rather than using it as your primary source.



This is what I would usually do as well, self-MiTM and analyze the traffic, reverse engineer from there.


While if possible, it's the best course of action, the truth is these days additions like HSTS make it extremely difficult to MITM.

Additionally, MITM and trying things out on a toaster are one thing, doing the same on a 40k$ machine that can potentially make it impossible to do your commute is another.

This is IMO a prime example where the double team rev eng is key to success: one documents the API, the other uses it without having access to code (whiteroom)


Nitpick: HSTS doesn't interfere with MITM. You're thinking of certificate pinning.


You are right, I was thinking of stapling but wrote HSTS. Thanks


HSTS interferes with MITM when the mobile device in question doesn't allow you to install new certificate authorities (as is slowly becoming the case).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: