Reverse Engineering Asked by Sandeep Singh on September 17, 2020
from past few days i am fiddling with the firmware file of dvb s2 receiver of gx6605s processor.
my preliminary purpose is to read the hidden menu password for given firmware.(password used to hide-unhide menu)
Dump.bin extraction gives 7 other bin files boot.bin,data.bin,info.bin,kernel.bin,logo.bin,root.bin,table.bin..
Kernel.bin is lzma compressed so using a hex editor i removed the lzma header to search the menu password but could’nt find it may be due to a lay man’s approach.I also used binwalk with various commands to further extract the fragments but now clueless what to do next.
I request the group members to help me & guide me in choosing the appropriate approach.
Thank you..
firmware link is shared below
https://drive.google.com/file/d/1c2SyGaHu5I9P1jRCWKQomAYNQBYbgmg4/view?usp=sharing
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP