Page 3 of 4
Re: [Tutorial] Reverse Engineering C series
Posted: Fri Apr 24, 2015 9:47 pm
by tempinbox
@sectroyer if you need exeDSP of tvaldeuc 0000 fw i can upload it. But here in forum there are 2 version of 0000 fw.
So there is a version of valdeuc Fw with all symbols? The exeDSP is usually 59-60mb maybe the version with all symbols is more of 60mb. I have all version of valdeuc fw on my pc i will try to compare all exeDSP but how i can understand if all symbols are present? Please post a screenshot of one fw with all symbols.
Re: [Tutorial] Reverse Engineering C series
Posted: Fri Apr 24, 2015 10:11 pm
by sectroyer
You will know when you find it
Just open in IDA and go to exports
You should get similar numbers but with "all symbols" you will get much more
Take a look at this:
Code: Select all
strings ./DANE/C/exeDSP_C | grep -c _Z
2221
strings ./DANE/C/exeDSP_C_0000.bin | grep -c _Z
102521
The difference is easy to spot
Anyway I used 0000 version that timoo posted the link to
Re: [Tutorial] Reverse Engineering C series
Posted: Thu May 07, 2015 9:29 pm
by sectroyer
I have put all new findings to first post. Once again big thanks to timoo
Re: [Tutorial] Reverse Engineering C series
Posted: Mon May 11, 2015 6:04 pm
by timoo
sectroyer:
no problem
btw> do you know FW where have authuld some "symbols" ?
Re: [Tutorial] Reverse Engineering C series
Posted: Mon May 11, 2015 9:19 pm
by sectroyer
timoo wrote:sectroyer:
no problem
btw> do you know FW where have authuld some "symbols" ?
I wasn't checking authld stuff
I also was not aware of "autlhd symbols" missing
Re: [Tutorial] Reverse Engineering C series
Posted: Fri Sep 18, 2015 4:52 am
by luke1337
Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??
Re: [Tutorial] Reverse Engineering C series
Posted: Fri Sep 18, 2015 10:18 am
by sectroyer
luke1337 wrote:Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??
It's C_exports.txt
I attached it all to first post
Are you finishing some patch ?
Re: [Tutorial] Reverse Engineering C series
Posted: Sun Sep 20, 2015 12:29 am
by luke1337
sectroyer wrote:luke1337 wrote:Could you please re-attach C_find.py and C_exports.sh since I cannot find them anywhere??
It's C_exports.txt
I attached it all to first post
Are you finishing some patch ?
Thanks
btw is it possible to send commands (like turning on, changing channels) to exeDSP without patching it?
Re: [Tutorial] Reverse Engineering C series
Posted: Sun Sep 20, 2015 6:38 am
by sectroyer
luke1337 wrote:
btw is it possible to send commands (like turning on, changing channels) to exeDSP without patching it?
Yeah. It's called samyGOrc
You can even do it remotely using perl script attached (somewhere on forum/wiki)
Re: [Tutorial] Reverse Engineering C series
Posted: Sun Sep 20, 2015 11:34 pm
by luke1337
@sectroyer wow, it works like a charm! Thank you for the samyGOrc, and also the C_find.py IDA script to help me disassemble and write an advanced timer feature patch to exeDSP
By the way, are there any special configurations needed for toolchain.conf and install.conf or it is okay to configure it by myself??