Reverse Engineering: How do I identify an unknown compression method? -
I am with a group of modules trying to reverse engineer and modify the Blu-ray player. We are stuck because the firmware code seems compressed, and the decompression code is not found anywhere. Probably, Decompression is handled by hardware.
My question is, with the compressed output only, what kind of compression algorithm do we use to determine? We have been able to find repeated strings, which probably encode the repetitive data.
Compressed 0x00 byte starts from 0x00 0x15 and then repeats the sequence (F8 06FC 03 7E01BF00DF 80 6FC 0 37E0 1B F0 0D) and ultimately varies.
Our documentation and efforts are located in the thread above. Firmware binaries are located in the thread given above.
I recommend looking at the hardware, and seeing that any country encryption or compression schemes Support I note encryption because such string is also possible; For example, Nintendo DS uses RSA encryption which I think is handled at some level on the hardware level, although I do not get quotes on it.
In short, the hardware datasheet (if available) will be your best action, I'm assuming that if you can take firmware, you are also able to see the hardware.
Comments
Post a Comment