Page 3 of 4

Re: [Tutorial] Reverse Engineering C series

Posted: Fri Apr 24, 2015 9:47 pm
by tempinbox
@sectroyer if you need exeDSP of tvaldeuc 0000 fw i can upload it. But here in forum there are 2 version of 0000 fw.
So there is a version of valdeuc Fw with all symbols? The exeDSP is usually 59-60mb maybe the version with all symbols is more of 60mb. I have all version of valdeuc fw on my pc i will try to compare all exeDSP but how i can understand if all symbols are present? Please post a screenshot of one fw with all symbols.

Re: [Tutorial] Reverse Engineering C series

Posted: Fri Apr 24, 2015 10:11 pm
by sectroyer
You will know when you find it :) Just open in IDA and go to exports :) You should get similar numbers but with "all symbols" you will get much more :) Take a look at this:

Code: Select all

strings ./DANE/C/exeDSP_C | grep -c _Z
2221
 strings ./DANE/C/exeDSP_C_0000.bin | grep -c _Z
102521
The difference is easy to spot :) Anyway I used 0000 version that timoo posted the link to :)

Re: [Tutorial] Reverse Engineering C series

Posted: Thu May 07, 2015 9:29 pm
by sectroyer
I have put all new findings to first post. Once again big thanks to timoo :)

Re: [Tutorial] Reverse Engineering C series

Posted: Mon May 11, 2015 6:04 pm
by timoo
sectroyer:
no problem :)
btw> do you know FW where have authuld some "symbols" ?

Re: [Tutorial] Reverse Engineering C series

Posted: Mon May 11, 2015 9:19 pm
by sectroyer
timoo wrote:sectroyer:
no problem :)
btw> do you know FW where have authuld some "symbols" ?
I wasn't checking authld stuff :) I also was not aware of "autlhd symbols" missing :)

Re: [Tutorial] Reverse Engineering C series

Posted: Fri Sep 18, 2015 4:52 am
by luke1337
Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??

Re: [Tutorial] Reverse Engineering C series

Posted: Fri Sep 18, 2015 10:18 am
by sectroyer
luke1337 wrote:Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??
It's C_exports.txt ;) I attached it all to first post :) Are you finishing some patch ? :)

Re: [Tutorial] Reverse Engineering C series

Posted: Sun Sep 20, 2015 12:29 am
by luke1337
sectroyer wrote:
luke1337 wrote:Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??
It's C_exports.txt ;) I attached it all to first post :) Are you finishing some patch ? :)
Thanks :D
btw is it possible to send commands (like turning on, changing channels) to exeDSP without patching it?

Re: [Tutorial] Reverse Engineering C series

Posted: Sun Sep 20, 2015 6:38 am
by sectroyer
luke1337 wrote: btw is it possible to send commands (like turning on, changing channels) to exeDSP without patching it?
Yeah. It's called samyGOrc :P You can even do it remotely using perl script attached (somewhere on forum/wiki) :)

Re: [Tutorial] Reverse Engineering C series

Posted: Sun Sep 20, 2015 11:34 pm
by luke1337
@sectroyer wow, it works like a charm! Thank you for the samyGOrc, and also the C_find.py IDA script to help me disassemble and write an advanced timer feature patch to exeDSP :P
By the way, are there any special configurations needed for toolchain.conf and install.conf or it is okay to configure it by myself??