Author Topic: Outpost 2 Reverse Engineering  (Read 617 times)

Offline BlackBox

  • Administrator
  • Hero Member
  • *****
  • Posts: 3103
Outpost 2 Reverse Engineering
« on: July 12, 2006, 01:13:07 PM »
Having not much else to do today, I decided to post some pictures to show what it's really like to be reverse engineering Outpost 2.





I use IDA Pro for a disassembler (program that converts the binary instructions and data to assembly mnemonics. It's nothing like C++ or anything, these are the low level instructions that the intel x86 series of processors use).

IDA makes it easier for me since it's able to identify machine code versions of functions like sprintf() for example that you use a lot from C or C++. This makes it a lot easier.
It can also tell me cross references between two pieces of code and allows me to label a lot of things.

Just figured I would give people a peek and see what it's like to be doing this :P

Offline CK9

  • Administrator
  • Hero Member
  • *****
  • Posts: 6257
    • http://www.outpost2.net/~ck9
Outpost 2 Reverse Engineering
« Reply #1 on: July 12, 2006, 01:16:54 PM »
So why does this fit under general instead of coding?
CK9 in outpost
Iamck in runescape (yes, I still play...sometimes...)
srentiln in minecraft (I like legos, and I like computer games...it was only a matter of time...) and youtube...
xdarkinsidex on deviantart

yup, I have too many screen names

Offline BlackBox

  • Administrator
  • Hero Member
  • *****
  • Posts: 3103
Outpost 2 Reverse Engineering
« Reply #2 on: July 12, 2006, 01:58:05 PM »
Well, it really has nothing to do with coding directly, just something I figured people would be interested in (tools used, etc).