Reverse engineering an obfuscated firmware image E01 – unpacking
When reverse engineering Linux-based firmware images the following methodology usually works pretty well: use Binwalk to identify different parts of a firmware image by their magic signatures use dd to...
View ArticleReverse engineering an obfuscated firmware image E02 – analysis
This part is again specific to firmware for the EasyBox 803 (and similar models by Arcadyan), but the techniques presented can easily applied to other firmware, even on different architectures. Now...
View Article
More Pages to Explore .....