Thread: .BIN format
View Single Post
  #4   Spotlight this post!  
Unread 04-11-2005, 23:58
Rickertsen2 Rickertsen2 is offline
Umm Errr...
None #1139 (Chamblee Gear Grinders)
Team Role: Alumni
 
Join Date: Dec 2002
Rookie Year: 2002
Location: ATL
Posts: 1,421
Rickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant futureRickertsen2 has a brilliant future
Send a message via AIM to Rickertsen2 Send a message via Yahoo to Rickertsen2
Re: .BIN format

Quote:
Originally Posted by Pat Fairbank
...Not that I wouldn't be extremely curious to know exactly what goes on in the master processor, of course.
Hence why i am reverse engineering it. Partially out of curiousty, partially as a challenge and partially to learn about disassembling and revernse engineering software. After thorough review i have decided that the PIC code protection scheem is pretty solid, so there is no hope of schnarfing the code directly off the pic through any method, So i am left with decrypting the bin files. Now, if the decryption is performed by IFILoader then all i need to do is sniff the serial port while uploading master code and then write a simple program to generate a hex file from the intercepted traffic. Now if the decryption is done by the bootloader on the master proc itself, then things are ALOT more difficult. I am assuming whatever encryption they are using its probably pretty secure.
__________________
1139 Alumni