I was once given the task of writing a Windows library to connect to a Juniper VPN system. All I was given was just the web interface of the system. A task that cannot be completed without reverse-engineering skills.

Authenticating via the login page programmatically to retrieve the cookie for the session was a trivial task. For downloading and running the Windows VPN application, with my 1337 Java skills, I decided that reverse-engineering the Java applet was the way to go. After decompiling the applet with Jad, all I needed to do was modifying the code to make it run in a "simulated" applet environment, and everything went on smoothly.

No comments:
Post a Comment