Reverse Engineering MacWars

MacWar’s title screen. The icons were actually stored as custom font characters in the system file.

0: movq.b 0, d0 #set register d0 to 0
16: movq.b $20,d1 #set register d1 to 32
32: cmp.b d0,d1 #compare registers d0 and d1
48: bgt pc+$40 #if d0>d1, then skip 64 bytes ahead
64: _sysbeep #call the system trap to make a beep
80: addq.b 1,d0 #add 1 to register d0
96: jmp pc-$40 #jump back 64 bytes

while (i≤32) {
i = i + 1;

Just fly around randomly; eventually one will find the enemy space station… or decrypted code routine, whatever.
Prepare to enter the tunnels…of encryption!
The enemy space station. Maybe the final encryption key is somewhere inside?
The application was decrypted, revealing the ‘core’ of the anti-piracy routines.
Enemy space station go boom. The galaxy is now safe for vintage gamers.




Geek from the Oregon Trail generation

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Understanding Character Encoding in Python

Art of building quality software

TryHackMe Episode: 3

Can I make more than one space on Quora ?

What makes CA Special?

CRODO -Ambassador program

LM35 and Arduino — Temperature displaying on LCD

Xcode 12.5 on macOS Monterey

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Don Barber

Don Barber

Geek from the Oregon Trail generation

More from Medium

Perilous Wilde Post-Mortem

CD Genomics Perspective: Practicing Genetic Marker Identification by Bulk Segregant Analysis

How to solve a stolen cars problem

Are you a Cyborg?🤔

Elon Musk at 2016 Code Conference saying “We are already Cyborgs”