Is Silkscreen Position Number Necessary on PCB? Many Products Actually Do Not Have It!

Is Silkscreen Position Number Necessary on PCB? Many Products Actually Do Not Have It!

Is it possible not to place silkscreen position numbers on a PCB? The silkscreen position number is mainly for convenience during manual soldering or prototype debugging stages, as it visually indicates the component positions, facilitating assembly, maintenance, and testing, primarily used in the prototype phase. It is indeed possible to manage without position numbers when … Read more

In-Depth Analysis of the BattlEye Kernel Driver Detection Module

In-Depth Analysis of the BattlEye Kernel Driver Detection Module

This article is a featured post from the KX Forum, authored by KX Forum ID: Ghost Talent zxy 1 Overview of BattlEye BattlEye is divided into the following four components: BEService – A service that communicates with the BattlEye server. BEDaisy – A kernel driver that performs various kernel-level detections and communicates with BEClient. BEClient … Read more

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit

Reverse Engineering of a Parameterless C Function with Return Value in 32-bit Below is a simple example of a C function that does not take any parameters but returns an integer value. Additionally, I provide step-by-step instructions for writing and viewing its assembly code using Visual Studio 2022. C Function #include <stdio.h> // Definition of … Read more

Twin-engine Mid-thrust + DSI Air Inlet: Is India’s Stealth Fighter Secretly Learning from the J-35?

Twin-engine Mid-thrust + DSI Air Inlet: Is India's Stealth Fighter Secretly Learning from the J-35?

According to a report by Global Network on June 7, 2025, the latest full-size model of India’s AMCA stealth fighter released by the Ministry of Defense shows that its twin-engine mid-thrust + DSI air inlet layout has an 82% similarity to China’s J-35 fighter. This incident, characterized by international military experts as a “systematic technological … Read more

A Simple Note on Python Reverse Engineering

Introduction Over the past decade, a significant amount of malware has been written in interpreted programming languages (such as Python), with increasing numbers and effective evasion techniques. In daily work, there are processes that require analyzing malicious files based on frontline feedback to obtain relevant information. When manually reverse engineering, one inevitably encounters Python malicious … Read more

PCB-Level Reverse Engineering of Embedded Device Hardware

PCB-Level Reverse Engineering of Embedded Device Hardware

This article introduces some practical basic techniques for PCB-level hardware reverse engineering, which can be used by researchers and white hat groups to analyze unknown hardware. The hardware security laboratory operated by SEC Consult is part of the SEC Consult security lab. The research presented below is just the tip of the iceberg among many … Read more

Embedded Development: How to Prevent Device Cloning?

Embedded Development: How to Prevent Device Cloning?

liwen01 2023.06.04 Introduction (1) Conventional Devices (1) Patent Protection (2) Code Encryption (3) Authorization Verification (4) Continuous Updates and Improvements (2) Embedded Devices (1) Polish Key Chip Logos (2) Disable Debug Serial Ports (3) Set Flash Read Protection (4) Encrypt and Obfuscate Key Information (3) Junzheng T-Series Program Cracking (1) Locate the Root File System … Read more

Boeing 747 Digital Fuel Quantity Indicator – Teardown, Reverse Engineering and Testing

Boeing 747 Digital Fuel Quantity Indicator - Teardown, Reverse Engineering and Testing

From: Michelle’s LabLDM #401: Boeing 747 digital fuel quantity indicator – teardown, reverse engineering and testIntroductionInterface DisplayLabel InformationConnectorPinout of the Aviation ConnectorOpening the InstrumentFrom Altera’s CPLD, EPM7160 1MHz Crystal OscillatorPower Board (LT1074)Reverse Engineering: Power SupplyPower SupplyReverse Engineering: Dimmer Circuits0-5V, 400Hz AC Voltage Rectification Comparison 8-bit Sent to CPLDReverse Engineering: ARINC 429 InterfaceOptocoupler (an ARINC 429 … Read more

Embedded Development: How to Prevent Device Cloning?

Embedded Development: How to Prevent Device Cloning?

Table of Contents: Introduction I. Conventional Devices 1. Patent Protection 2. Code Encryption 3. Authorization Verification 4. Continuous Updates and Improvements II. Embedded Devices 1. Polishing Key Chip Logos 2. Disabling Debug Serial Ports 3. Flash Read Protection Settings 4. Encrypting and Obfuscating Key Information III. Cracking the Junzheng T Series Program 1. Locating the … Read more

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Introduction In today’s world, who doesn’t need to guard against theft and intruders? Cloud security cameras have become increasingly popular. However, despite being labeled as “security” cameras, their actual security may not be very robust. The Motorola Focus 73 outdoor security camera is a case in point. The Motorola Focus 73 camera is an outdoor … Read more