Posts Tagged Reverse Engineering

Hacking an Actions MP4 video player to show server statistics

The MP4 player is a small movie player that was used by real estate agents to advertise properties, typically by posting them to potential clients. I saw it on a friend’s desk at his house and asked about it, not being able to pass up an opportunity. Anything with electronics, screens, and batteries will always grab my attention. He had already removed it from its housing / box so I’ve got no idea what it originally looked like. Read the rest of this entry »

, , , , ,

1 Comment

Reverse Engineering the FFS Flash File System Format

As part of de-bricking a Talkswitch TS-450i IP Phone I needed to see and extract the files within the flash image so that I could replace corrupt ones with known good versions. That required reverse engineering the in-flash format of the file system as there was no way to get files off the device, only onto it.
Read the rest of this entry »

, , , , , , , ,


Triton 9610 ATM Teardown

A few years ago I got a Triton 9610 single cassette ATM of craigslist as something to play with. While I did take a look at it and started to reverse engineer it, over time I lost interest and it became a potplant stand. I finally decided to get rid of it and I thought I’d rip it to bits and take a bunch of photos during the process.
A nice potplant standIMG_9643_small
Read the rest of this entry »

, , ,

No Comments

File format reverse engineering – Redux

I was contacted by a visitor of this site asking for the following:

‘I read your nice article on file format reverse engineering and was wondering if you could give me a small tip / hint about compression / encryption. I am trying to understand a constant size file format and need to know if by any chance the file is compressed or encrypted in a simpler way, which leaves hope in cracking it.

In the case you would like to have a look at the files, I generated 2 pairs. The first file pair differs only in that one variable. The second file’s name and caption are set to “;1”;, the file 2b to “;1111111…”; (31 chars)’

As the reader seeked advice on how to proceed further and provided enough information to investigate the problem, I took a look. Read the rest of this entry »

, , ,

No Comments

File format reverse engineering, an introduction.

So you have a file that you know contains something good, if only you could read it. Your searching efforts for documentation¬†proved fruitless, required a significant outlay or to sign a NDA. Looks like you are going to need to reverse engineer the file format so you can use it. Most applications tend to use custom file formats for various reasons. These files are usually containers¬†where other files are kept or application data.¬† A hex editor (xvi32) and C compiler (VS2008) were used to discover the layout of the culprit file. Read the rest of this entry »

, , , , ,