Reverse Engineering Asked by h msvi on January 24, 2021
I am working on firmware update file prod-build-Isat2-V02.00.03-DFU.fp2
.
I extracted it and I’ve got some bin files. I analyzed these binary files with binwalk:
binwalk -E RDA-533.bin
The entropy of these bin files didn’t give any information and when I opened these files with IDA, it didn’t give subblocks and functions.
It seems these files are compressed or encrypted.
How can I analyze these bin files as efficiently as possible?
Thanks in advance
You can find files File1.bin ... File6.bin in "C:temp" directory after running IsatPhone 2 Firmware Upgrade Tool and selecting firmware. It does not need a connection to physical device, just firmware and tool.Unfortunately you can't decrypt these files in contrast to "IsatPhone Pro" model in which files were not encrypted.
Answered by Igor Matyuh on January 24, 2021
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP