tazBRC
October 14th, 2010, 17:04
Hell Guys, here I come again need some help on embeded systems.
I wanna purchase a USM Go (Ultrasonic Flaw Detector - GE) and I noticed that they have the upgradeable fimware for download on their site (http://www.gesensinginspection.com/en/ultrasound/portable-flaw-detectors/usm-go.html).
This product comes in 4 different versions, from the cheapest to the more expensive, and there is only one firmware for all. Yes, thats right, you can change your version by writing a serial number code and you can make the expensive functions work.
So I want to reverse it.
After download the file you can see a .sdu file that its a S-record Motorola file.
But it seems that there are 2 .s19 files merged into one.
And the header on the file is not a standard .s19.
I also don't know that is the device's processor.
After transforming it to binary code using the srec_cat (googleit), I can find the strings that I'm interested (ex: INVALID CODE - CODE INCORRECT, TRY AGAIN).
What can I do to start reversing it?
I wanna purchase a USM Go (Ultrasonic Flaw Detector - GE) and I noticed that they have the upgradeable fimware for download on their site (http://www.gesensinginspection.com/en/ultrasound/portable-flaw-detectors/usm-go.html).
This product comes in 4 different versions, from the cheapest to the more expensive, and there is only one firmware for all. Yes, thats right, you can change your version by writing a serial number code and you can make the expensive functions work.
So I want to reverse it.
After download the file you can see a .sdu file that its a S-record Motorola file.
But it seems that there are 2 .s19 files merged into one.
And the header on the file is not a standard .s19.
Code:
USP <--- I dont know what is this
158905 <-- I dont know
S0030000FC <-- block start 1
S319FF8400004C00006400000000000000000000000000000000B3
S319FF84001400000000000000000000000000000000000000004F
...
S7050009C3141A <-- block end 1
S307FF998350310854 <-- block data ????
S00E0000696D672F6973652E6D6F74C6 <--block start 2
S315FFC00000FFFFFFFF5599AA660C000180000000E0C4
...
S315FFD595C004000000040000000400000004000000B1
S705FFC000003B <--- Block End 2
I also don't know that is the device's processor.
After transforming it to binary code using the srec_cat (googleit), I can find the strings that I'm interested (ex: INVALID CODE - CODE INCORRECT, TRY AGAIN).
What can I do to start reversing it?