【Hacker News搬运】使用Ghidra和Python对海豚Ecco进行逆向工程
-
Title: Using Ghidra and Python to reverse engineer Ecco the Dolphin
使用Ghidra和Python对海豚Ecco进行逆向工程
Text:
Url: https://32bits.substack.com/p/under-the-microscope-ecco-the-dolphin
很抱歉,我无法直接访问或分析外部网站的内容。但是,我可以提供一些关于如何使用JinaReader或类似工具来抓取和分析内容,以及如何处理非中文内容的方法。 ### 使用JinaReader抓取和分析内容 1. **安装JinaReader**: JinaReader可能是一个假设的工具,因为根据您提供的信息,我无法找到具体的工具或库。假设这是一个Python库,您可以使用pip安装它: ```bash pip install jinareader
-
抓取内容:
使用JinaReader的API或函数来抓取网页内容。以下是一个假设的代码示例:from jinareader import JinaReader reader = JinaReader() content = reader.get_content('https://32bits.substack.com/p/under-the-microscope-ecco-the-dolphin') print(content)
-
分析内容:
对抓取到的内容进行文本分析,例如情感分析、关键词提取等。这通常需要使用NLP库,如NLTK或spaCy。
翻译非中文内容
如果内容不是中文,您需要将其翻译成中文。以下是一些常见的方法:
-
使用在线翻译服务:
您可以使用Google Translate或DeepL等在线服务来翻译内容。以下是一个使用Google Translate的Python示例:from googletrans import Translator translator = Translator() text = "Under the microscope: Ecco the dolphin" translated_text = translator.translate(text, src='en', dest='zh-cn').text print(translated_text)
-
集成翻译API:
如果您需要更高级的翻译功能或大量翻译,可以使用如Microsoft Translator Text API或IBM Watson Language Translator。
总结
一旦您抓取了内容并将其翻译成中文,您可以使用NLP工具来分析它。以下是一个简化的总结过程:
from jinareader import JinaReader from googletrans import Translator import spacy # 抓取内容 reader = JinaReader() content = reader.get_content('https://32bits.substack.com/p/under-the-microscope-ecco-the-dolphin') # 翻译内容 translator = Translator() translated_content = translator.translate(content, src='auto', dest='zh-cn').text # 使用NLP分析内容 nlp = spacy.load('zh_core_web_sm') doc = nlp(translated_content) # 提取关键词或进行其他分析 keywords = [token.text for token in doc if token.pos_ in ['NOUN', 'ADJ', 'VERB']] summary = "This is a summary of the content based on the extracted keywords." print(summary)
请注意,上述代码仅为示例,可能需要根据实际情况进行调整。
## Post by: bbayles ### Comments: **SideQuark**: The hash is merely a CRC32; exactly this one (polynomial 0x77073096, code is wrong)<p><a href="https://web.mit.edu/freebsd/head/sys/libkern/crc32.c" rel="nofollow">https://web.mit.edu/freebsd/head/sys/libkern/crc32.c</a><p>(The decoded ints in the post are the constants in this CRC32).<p>Knowing it's a CRC32 and knowing the polynomial allows inverting the answers in log time instead of exponential time by exploiting the modular math of the polynomial rings. > **SideQuark**: 哈希仅仅是CRC32;正是这个(多项式0x77073096,代码错误)<p><a href=“https:”web.mit.edu“freebsd”head“sys”libkern“crc32.c”rel=“nofollow”>https:”/;web.mit.edu;freebsd;头部;sys™;libkern;crc32.c</a><p>(post中的解码整数是这个crc32中的常数)<p> 知道它;这是一个CRC32,知道多项式可以通过利用多项式环的模数学在对数时间而不是指数时间内反转答案。 **qingcharles**: When the original Ecco came out on the Megadrive (Genesis), I spent all my hard-earned money to buy it. That game is obscenely hard. I got frustrated, so I sat down for the afternoon with a pen and paper and somehow managed to decode the password system. I teleported to the final level and completed it the next day.<p>Then I was wracked with guilt about spending all my money on a game I completed in two days. > **qingcharles**: 当最初的Ecco出现在Megadrive(Genesis)上时,我花了所有辛苦赚来的钱来买它。那个游戏太难了。我很沮丧,所以下午我拿着笔和纸坐了下来,设法破译了密码系统。我传送到了最后一级,并在第二天完成了它<p> 然后,我为把所有的钱都花在两天内完成的游戏上而感到内疚。 **praptak**: QQRIQ is a phonetic abbreviation of "kukuriku", which is the sound of the rooster in Hungarian and in several other languages (Polish "kukuryku", Hebrew " קוקוריקו" etc.). Makes wonder what the process for choosing the passwords was. > **praptak**: QQRIQ是“;库库";,这是匈牙利语和其他几种语言(波兰语";kukuryku")中公鸡的叫声。这让人想知道选择密码的过程是什么。 **Liquix**: an interesting aside: when asked about his inspirations Ecco's developer Ed Annunziata said, "No, I never took LSD, but I did read a lot from John C. Lilly". Lilly is known for his pioneering work in the fields of animal intelligence, ketamine psychotherapy, isolation tanks, and consciousness exploration.<p>The name "Ecco" is a reference to Lilly's ECCO (Earth Coincidence Control Office), a supernatural/extraterrestrial base which John posited existed on the other side of the moon to coordinate all earthly "coincidences". He was also one of the first to recognize how intelligent dolphins were and became obsessed with figuring out how to communicate with them, going as far as flooding half of his house in the Carribeans to cohabitate. This is just the tip of the iceberg. I'd highly recommend his autobiography <i>The Center of the Cyclone</i> if any of this is intriguing, he's a fascinating guy > **Liquix**: 有趣的是:当被问及他的灵感时,Ecco;开发者Ed Annunziata表示:“;不,我从未服用过LSD,但我确实读了很多John C.Lilly的书。";。Lilly以其在动物智能、氯胺酮心理治疗、隔离罐和意识探索领域的开创性工作而闻名<p> 名称";Ecco";是指Lilly;s ECCO(地球巧合控制办公室),一个超自然的;约翰设想的外星基地存在于月球的另一边,以协调所有地球上的";巧合";。他也是最早认识到海豚有多聪明的人之一,并痴迷于研究如何与它们交流,甚至淹没了他在加勒比海的一半房子来同居。这只是冰山一角;d强烈推荐他的自传《旋风中心》;他是个迷人的家伙 **heisenburgzero**: I always wondered where to start learning reverse-engineering. Most people will say learn Assembly first. But from there on, there seems to be not much more concrete information online.<p>Do people just figured it out by trial & error like common patterns in x86 / arm / arcade platforms slowly?<p>I can't really find much discussion on details online. > **heisenburgzero**: 我一直想知道从哪里开始学习逆向工程。大多数人会说先学习组装。但从那时起,网上似乎没有更多具体的信息<p> 人们是不是通过试验才弄明白的;x86中常见的错误模式;手臂;街机平台慢<p> 我可以;在网上找不到太多关于细节的讨论。
-