"Sure! The interviewer asked, "During your experience with web reverse engineering how did you prioritize which encrypted parameters to tackle first, and what criteria did you to evaluate their importance
To break this down, I understood that prioritization in reverse engineering involves assessing the most encrypted parameters that affect data extraction. Here’s I approach this:
1. **Identify Critical Data Points**: First, I identify which parameters directly impact the data I need. For instance, if I’m extracting stock prices, encrypted parameters linked to key data points like price, volume, or timestamps are prioritized.
2. **Analyze Encryption Complexity**: Next, I evaluate the complexity of the encryption used. If the encryption method is common, like AES or MD5, I prioritize those parameters as they may have established decryption methods.
3. **Assess Impact on Functionality**: I consider how each parameter affects the overall functionality of the application. If a parameter is essential for the app’s core features, it’s higher on the list.
4. **Test Viability of Decryption**: Finally, I run preliminary see which parameters I can decrypt most quickly. This helps streamline the process and focus on parameters that can deliver results fast.
In summary, my approach involves understanding critical data, analyzing complexity, assessing functional impact, and testing decryption viability, which has proven effective across projects I've worked on."
发表回复