All Questions
Tagged with decryption binary-analysis
13 questions
2
votes
0
answers
41
views
Find out what is this binary database entry and what format it is
the following varbinary "BUFFER" of a database entry is for an article.
FIELD_0 is in plain text and the item name is "1", which I created with the item management software.
[...
1
vote
0
answers
95
views
How exactly Hex editor is used?
I'm new to reverse engineering. So I decided to start with some game files in my computer. The main goal was to understand how hex editor used to identify files and extract needed data.
In my case I ...
2
votes
0
answers
8k
views
Extracting ZTE F670L router's config.bin file
I want to enable telnet in my router (ZTE F670L V9.0.11P1N20D), So, I backup my router and i have a file config.bin, Size 23.5KB. I fired up kali and when i issue this command:
$ file config.bin
...
2
votes
1
answer
606
views
How to extract information from a binary file knowing the target info
I have some measured data comes from a various types of sensors. The sensors are connected to a data-logger in order to store measurement data. After measurement, the data transported and stored in a ...
1
vote
2
answers
164
views
How is the IV generated from a timestamp based on this function?
Background: I am currently looking to make some diagnostic software interoperable with other software, but all communication that occurs in this software is encrypted with AES-128-CBC. A sample ...
4
votes
1
answer
6k
views
How to decrypt the config.bin from ZTE ZXV10 H201L
I have this file from my router its backup of user config,I suppose its compresed with zlib and encrypted with AES. Utility which is resposible to compress it and encrypt it is called cspd. In side ...
2
votes
1
answer
10k
views
Reverse Engineering a Firmware. Someone can help me?
I am currently trying to reverse-engineer a firmware file to learn the topic but I am a little bit stuck.
I tried to use binwalk to get more information about the file but this did not produce ...
4
votes
2
answers
1k
views
Reverse engineer 4-bit checksum (?) in Sanyo air conditioning IR packet
I am reverse engineering IR protocol of Sanyo air conditioner. AC sends the whole current state of remote on each key press. Data sent is 67 bits long, last 4 bits seem to be the some kind of error ...
8
votes
1
answer
1k
views
Reverse engineer TPMS sensor data
I'm trying to reverse engineer data received from TPMS (car tire pressure) sensors. I was able to receive and demodulate the data (433 MHz, FSK, Manchester encoding).
Probable packet fields:
bytes 1-...
2
votes
0
answers
701
views
Reverse engineering TPMS sensor data [closed]
I'm trying to reverse engineer data received from TPMS (car tyre pressure) sensors. I used rtl_433 tool to capture the data from sensor at 433 MHz. Tool was able to detect data is using FSK modulation ...
5
votes
1
answer
1k
views
Reverse engineer 4-bit CRC in LG IR packet
I am reverse engineering IR protocol of LG air conditioner. AC generally send the whole current state of remote on each key press. Data sent is 28 bits long, last 4 bits seem to be the checksum. I ...
5
votes
1
answer
11k
views
Decrypting firmware: Is there a true "format" to it, and how does it differ from decryping other files?
I have firmware for a system and I'm trying to decrypt some of it just for the sake of seeing what it all does; nothing illegal or anything like that, such as reproducing copies of it decrypted and ...
13
votes
3
answers
9k
views
Totally unknown file analysis approaches
I guess this is the worst case. I have a file which was initially base64 encoded. This step was easy. But now all I can see is a bunch of rubbish. No structure, nearlly a maximum of entropy, no ...