TransWikia.com

c-sky family based gx6605 firmware analysis to read data

Reverse Engineering Asked by Sandeep Singh on September 17, 2020

from past few days i am fiddling with the firmware file of dvb s2 receiver of gx6605s processor.
my preliminary purpose is to read the hidden menu password for given firmware.(password used to hide-unhide menu)
Dump.bin extraction gives 7 other bin files boot.bin,data.bin,info.bin,kernel.bin,logo.bin,root.bin,table.bin..

Kernel.bin is lzma compressed so using a hex editor i removed the lzma header to search the menu password but could’nt find it may be due to a lay man’s approach.I also used binwalk with various commands to further extract the fragments but now clueless what to do next.
I request the group members to help me & guide me in choosing the appropriate approach.
Thank you..

firmware link is shared below
https://drive.google.com/file/d/1c2SyGaHu5I9P1jRCWKQomAYNQBYbgmg4/view?usp=sharing

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP