Questions tagged [binary-analysis]
The process of gathering information about a binary file, either with static or dynamic methods.
558 questions
0
votes
0
answers
56
views
Nvidia DLSS data extraction - IDAPro
I have a display from TurzX where I can display CPU, GPU, etc info. I want to show the DLSS version and preset in the display. The reason for this is I just want to disable the in-game DLSS overlay ...
0
votes
0
answers
68
views
Reverse engineering of firmware update files for Crumar Mojo Classic
Hello all,
The Crumar Mojo Classic is a type of organ (the musical kind, not the body kind) that tries to emulate the old Hammond/B3 organ sounds that are well known from Rock, Jazz et cetera as ...
0
votes
0
answers
42
views
I am looking to decrypt this file type (.hds), and import it into a custom code, but I need help
The vendor is charging thousands for a software that can do much more than I need... I need the following:
Take the .hds file, and import it into a python program in a pandas dataframe or numpy array. ...
0
votes
0
answers
62
views
HASP-HL in old Fun4Four Software
I got this today for ya guys https://mega.nz/file/ydU10BqA#VF87e1GJ0ls0LybkK-piQcvsgu_UrZE_6wJPfmIdQps
^^
To clarify for those panicking about Copyright or anything: This specific system is not being ...
0
votes
0
answers
95
views
Has anyone done a binary analysis on DeepSeek R1 Model on ollama? any obfuscate code or security concerns?
I'd want to be sure that I'm not being compromised when using ollama, does anyone have insights into what goes into approving a model? My main concern is that most devs don't know about reverse ...
0
votes
2
answers
267
views
Find all calls of a given function with Ghidra
I would like to know how to find all the explicit calls to a given function with Ghidra.
For example, I am looking at the assembly of a function and I would like to list all the calls referring to it ...
0
votes
0
answers
64
views
Can one binary use both lazy binding and non-lazy binding?
I inspected /bin/rm binary on macOS with the next command: otool -l /bin/rm | grep symbol_ptr -A5 and I've got the next output:
segname __DATA
addr 0x0000000100004000
size ...
0
votes
1
answer
178
views
Asking for Reverse Engineering Tool Ideas
I'm currently studying cybersecurity and IoT and I'm interested in working on a development project in the realm of reverse engineering. My level is somewhere between beginner and intermediate, and I'...
0
votes
0
answers
125
views
Extracting / converting an unknown 1990s graphics file format (.ATR)
For about a month I've been working towards trying to crack the file structure on the graphical assets from the old JumpStart CD-ROM games. A large percentage of these games do not have their sprites ...
0
votes
1
answer
62
views
RAM and Registers Analysis EMS3150 ECU TriCore TC1767
I extracted the firmware of an EMS3150 ECU, TC1767 chip.
I analysed the binary with the help of a hex editor and the TC1767 manual.
I managed to successfully load the binary in IDA Pro, with correct ...
0
votes
0
answers
55
views
Going from NAND dump to firmware update package
I.... Have no idea what I'm doing.
So, I did a full NAND dump of an Actions ATJ2257 based MP4 player (url: https://archive.org/details/eclipse-t-2810-c.-7z) and I want to recreate the ".fw" ...
1
vote
1
answer
55
views
Looking for a tool for visualising potential can bus data in binary log file
I have some log files that I was able to record from a device that I believe is running a CAN bus (standard frame not extended).
There is no possibility of real time physical access to the bus.
I'm ...
1
vote
1
answer
159
views
extract third party libraries names and versions used in BIN files
i am having an issue trying to extract third party libraries from bin files and lost on how to go on this.
a bit about my background: i am junior software engineer that have no knowledge about reverse ...
1
vote
1
answer
146
views
How to extract 7z archive with LZMA compression
I have firmware file, which contains a raw MIPS32 binary code.
I used binwalk to scan for signatures binwalk -B -t image.out and for executable opcodes binwalk -A -t image.out
Top part of the output:
...
0
votes
0
answers
53
views
I extracted a file from inside the dump that contains the serial number and I need to analyze it
I extracted a file from inside the dump that contains the serial number and I need to analyze it
I want to unpack and compress this encrypted file after modifying it