Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the technical journey of reverse engineering Pokémon Go's communication protocols and defeating its anti-cheat mechanisms in this 47-minute DEF CON 33 conference talk. Learn how mobile games implement specialized communication protocols and discover the step-by-step process of building a custom Pokémon scanner by replicating the game's network behavior. Dive deep into a four-day collaborative hacking effort that successfully overcame sophisticated anti-cheating systems deployed by Niantic. Examine the technical challenges involved in breaking through obfuscated cryptographic functions, understanding unexpected smartphone peripheral usage, and deciphering hidden protobuf definitions. Gain insights into mobile game security mechanisms and the methodologies used to analyze and circumvent them. Understand how anti-cheating systems work in online mobile games and the techniques required to develop publicly available APIs for game protocols. Discover the complete technical story behind one of the most significant mobile game reverse engineering efforts, told nearly a decade after the original 2016 Pokémon Go phenomenon.