TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Getting the Firmware of a VTech/LeapFrog LeapStart/Magibook

33 点作者 LelouBil大约 1 个月前

3 条评论

userbinator大约 1 个月前
<i>I assume this is some kind of ARM binary, but without any headers or anything I haven&#x27;t been able to find out exactly what it is.</i><p>Hint: ARM (32-bit) non-Thumb opcodes have a very recognisable appearance, i.e. nearly every 4th byte will have E as its high nybble, because most of the instructions can be executed conditionally, and E is the &quot;always&quot; condition.
LelouBil大约 1 个月前
Hello !<p>This is my first shot at blogging and at a &quot;real&quot; reverse-engineering project of any kind (outside small binary for school classes) so please tell me all your feedback about anything in there, the length, the technical stuff, the style...<p>I know it&#x27;s short but I wanted to publish it right now, as I arrived at a &quot;pausing&quot; point in the process.<p>And thank you for at least clicking on the discussion page !
评论 #43600718 未加载
onre大约 1 个月前
You might consider using this handy thing, also available as a binwalk module, for recognizing the ISA.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;airbus-seclab&#x2F;cpu_rec">https:&#x2F;&#x2F;github.com&#x2F;airbus-seclab&#x2F;cpu_rec</a>
评论 #43603107 未加载