Is it possible to reverse engineer this code to generate valid key for the code? [closed]

I want to know how secure the validation code is on a scale of 0-10?
$k = str_replace(‘-‘, ”, $j);
$s = substr($k, 0, 8);
$c = substr($k, 8, 2);
$a = substr($k, 10, 2);
$l = substr($k, 12, 2);
$p = substr($k, 14, 2);
$n = substr($k, 16, 2… Continue reading Is it possible to reverse engineer this code to generate valid key for the code? [closed]

Here’s How to Sniff Out an LCD Protocol, But How Do You Look Up the Controller?

Nothing feels better than getting a salvaged component to do your bidding. But in the land of electronic displays, the process can quickly become a quagmire. For more complex displays, …read more Continue reading Here’s How to Sniff Out an LCD Protocol, But How Do You Look Up the Controller?

Linux X86 Assembly – How To Make Payload Extraction Easier

Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our Hello World payload friendly for use as a payload in exploits.  However, we didn’t cover how to extract the payload itself for use in exploits.  Sure you cou… Continue reading Linux X86 Assembly – How To Make Payload Extraction Easier