Quote:
|
Originally Posted by Pat Fairbank
...Not that I wouldn't be extremely curious to know exactly what goes on in the master processor, of course. 
|
Hence why i am reverse engineering it. Partially out of curiousty, partially as a challenge and partially to learn about disassembling and revernse engineering software. After thorough review i have decided that the PIC code protection scheem is pretty solid, so there is no hope of schnarfing the code directly off the pic through any method, So i am left with decrypting the bin files. Now, if the decryption is performed by IFILoader then all i need to do is sniff the serial port while uploading master code and then write a simple program to generate a hex file from the intercepted traffic. Now if the decryption is done by the bootloader on the master proc itself, then things are ALOT more difficult. I am assuming whatever encryption they are using its probably pretty secure.