Closed saqie1393 closed 3 years ago
Vxwork just extract with 7zip and open in ida dissambler ? some little instruction about open and cpu start adresss
Disassembly with IDA fails, as I do not know the loader address.
_Originally posted by @saqie1393 in #1 (comment)_
Should work. Try running 'auto analysis' or anything like that in ida. And make sure to choose "armv7 little endian" as an architecture.
which dissambler you use for analyze...vxwork extract with 7zip....?
i use IDA 32BiT
this is my ida setting where are serach sting value?
correct. as for the loading address, it should be located at offset 0x38 from the vxworks partition. it should be 0x50d10000
look like this setting ?
same frimware 21.333.64.00.1456 analyze but not find....this type of window
same frimware 21.333.64.00.1456 analyze but not find....this type of window
Are you sure that you have done the auto-analysis????? try going to address 0x512E7174 (loading address + function address). Do you see any code that has been disassembled?
same frimware 21.333.64.00.1456 analyze but not find....this type of window
Are you sure that you have done the auto-analysis????? try going to address 0x512E7174 (loading address + function address). Do you see any code that has been disassembled?
auto analyzed is on....loading address and rom address change.....with 0x512E7174...
show this type of window
Are you sure that you are using the same firmware (E5573cs-322 21.333.64.00.1456)? can you send me the vxworks file?
same frimware 21.333.64.00.1456 analyze but not find....this type of window
Are you sure that you have done the auto-analysis????? try going to address 0x512E7174 (loading address + function address). Do you see any code that has been disassembled?
auto analyzed is on....loading address and rom address change.....with 0x512E7174... show this type of window
Are you sure that you are using the same firmware (E5573cs-322 21.333.64.00.1456)? can you send me the vxworks file?
https://www.mediafire.com/file/t49navi0wypbte3/balong_modem.7z/file
Just noticed the picture. Go to sub_512E7174 (press g and type 0x512e7174). Does ida recognized that as a function? if so, decompile that function (f5), and you should find the script offset there.
can you share screenshot?
of the disassembled function? it will look slightly different, as im using ghidra rather than ida
show start up this one?
no. keep the loading address to 0x50d10000.
you can find in this vxwork Offset value 52612?
Yes you can.
this process will be different for each firmware/device. searching for "WAS_CSEL_MNTN_TreselectionTimerStopEventRpt" or "WAS_CSEL_PhyLrrcEutraMeasStopInIdleCnf" xrefs will lead to this offset (The xrefs are shown on the right, the function we are interested in is FUN_512e7174)
i would recommend you to use the offsets that are already found, so that you dont have to do this reverse engineer process if you dont have any prior knowledge about
you can find in this vxwork Offset value 52612?
Yes you can. this process will be different for each firmware/device. searching for "WAS_CSEL_MNTN_TreselectionTimerStopEventRpt" or "WAS_CSEL_PhyLrrcEutraMeasStopInIdleCnf" xrefs will lead to this offset (The xrefs are shown on the right, the function we are interested in is FUN_512e7174) i would recommend you to use the offsets that are already found, so that you dont have to do this reverse engineer process if you dont have any prior knowledge about
IDA pro not find this ...can this software work in window pc?
yes it can, but it will also work on ida using auto analysis.
the offset is 0x5261B268, found at function 0x005dc9fc
From: saqie1393 @.> Sent: Sunday, May 16, 2021 5:06 PM To: baselsayeh/e5577s_321_kernel @.> Cc: Basel Sayeh @.>; Comment @.> Subject: Re: [baselsayeh/e5577s_321_kernel] Vxwork just extract with 7zip and open in ida dissambler ? (#2)
you find on ida i am different installation of ida pro but not find that......?
you can find this firmware code
https://www.mediafire.com/file/de32wvcb2vhmowa/balong_modemE5577.7z/file
— You are receiving this because you commented. Reply to this email directly, view it on GitHubhttps://github.com/baselsayeh/e5577s_321_kernel/issues/2#issuecomment-841822563, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AA2HTCJ5T4Z22I42FNHC7ODTN7GQDANCNFSM446WJSYQ.
Search -> for strings -> search after the search is complete, copy and paste the string to the filter box, and you should find it in the results
From: saqie1393 @.> Sent: Sunday, May 16, 2021 5:29 PM To: baselsayeh/e5577s_321_kernel @.> Cc: Basel Sayeh @.>; Comment @.> Subject: Re: [baselsayeh/e5577s_321_kernel] Vxwork just extract with 7zip and open in ida dissambler ? (#2)
i am install ghidra how to search WAS_CSEL_MNTN_TreselectionTimerStopEventRpt ?
— You are receiving this because you commented. Reply to this email directly, view it on GitHubhttps://github.com/baselsayeh/e5577s_321_kernel/issues/2#issuecomment-841825163, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AA2HTCMDAXP24F6AMKXIPQDTN7JGJANCNFSM446WJSYQ.
https://www.mediafire.com/file/t49navi0wypbte3/balong_modem.7z/file
ecall __arm_ioremap 0x52612EA0 1 1
In this binary, the function is in FUN_005d74f4, and the offset is 0x52612ea0
If you cant find it by string search, use bindiff and compare between the (E5573cs-322 21.333.64.00.1456 vxworks) and the target vxworks image. The program will compare the binaries and find similar functions. after using it on this firmware, FUN_005d7174 (from 21.333.64.00.1456) should be identical to (FUN_005d74f4) read the bindiff manual here
loading address set 0x51d0000 in ghidra software ...when analyze ...this binary ..
For now, you dont need to set the loading address.
https://www.mediafire.com/file/jmauk4ozxq0fkpb/modem.zip/file
i have this modem i understand other firmware little bit analyse you can find that my modem offset ?
the value is 0x52aeb9f0, located in FUN_005de258
any simple way to find offset any new firmware load search value ? in ghidra extension ?
I'm afraid not. You need to have reverse engineering experience
solve