| Products > Test Equipment |
| Siglent .ads firmware file format |
| << < (28/85) > >> |
| janekivi:
:-// I don't have a clue what you are doing here... but one day I made SDS file viewer and unpacker and app converter and after that you can unpack program part from that app with offzip. Packed region is starting from 0000dbd4 and then you have unpacked BlackFin code with which I don't know what we gonna do... I start looking it here https://www.eevblog.com/forum/testgear/siglent-ads-firmware-file-format/msg1061594/#msg1061594 and latest app is there https://www.eevblog.com/forum/testgear/siglent-ads-firmware-file-format/msg1208443/#msg1208443 |
| markus_jlrb:
@janekivi I try to reproduce your steps in .ads FW reassembling. One of them was to calculate the CRC32 properly. The others to understand the .ads file format. Due to your excellent prework I hope to create me own tools. I was aware of the tools you provided, but I had no luck till now to use them under wine (Linux OS) due to missing Libs. (I'm not sure if your Code could be ported to Mono, the linux Version of Net-Environment) Thanks for your replay. Markus |
| markus_jlrb:
@janekivi @tv84, and all, how to proceed after I had extract the Part1..5+7 from the .ads FW file with the sds_ads.exe tool. How to extract and mod the shadow file to enter his own hash for the root account and how to pack all parts together to get again a .ads FW file? Some helpful hints will be appreciated. Many thanks in advance for this effort. Markus |
| tv84:
--- Quote from: markus_jlrb on June 21, 2018, 04:16:42 pm ---@janekivi @tv84, and all, how to proceed after I had extract the Part1..5+7 from the .ads FW file with the sds_ads.exe tool. How to extract and mod the shadow file to enter his own hash for the root account and how to pack all parts together to get again a .ads FW file? Some helpful hints will be appreciated. Many thanks in advance for this effort. Markus --- End quote --- " Part1..5+7" exist in files where, I think, are not relevant to your "shadow" quest. Usually the shadow file exists inside a ZIP in the ADS. So, you decrypt the ADS, extract the zip and replace shadow. You can generate the shadow file in linux or manually hash the passwords. Then, it's the reverse process all the way: Compress the zip with the new shadow file. Encode the zip in a ADS, placing headers, xoring and encrypting... Maybe janekivi tool does this... Don't remember. I advise you to not flash a "handmade" ADS before me or janekivi do a small validation test. Just to decrease the risk of having any packing error... Look at my parsings list and see where the shadow files exist. |
| markus_jlrb:
@tv84, but where can I find the block with the fw file system. How to read/interpret your listing, see attached file that I cut & paste from your recent fw summary. Markus |
| Navigation |
| Message Index |
| Next page |
| Previous page |