Hexxx
03-03-2006, 04:20 PM
Has anyone already reversed the firmwares' and loaders' header?
The only thing that i could understand from Dct4Crypter code, that there:
1) a signature 0xA0 (1 Byte)
2) length of the header (4 Bytes) Big Endian.
3) some unknown data (2 Bytes)
4) Loader name length (1 Byte)
5) Loader Name (Length is in 4) )
6) Again unknown data
There must be also a size of the firmware/loader. I'm writing a dumper ram-loader for DCTL models. My loader works, but to test it i have to take the original loader, find the of the header, and then overwrite the original code by my own.
The only thing that i could understand from Dct4Crypter code, that there:
1) a signature 0xA0 (1 Byte)
2) length of the header (4 Bytes) Big Endian.
3) some unknown data (2 Bytes)
4) Loader name length (1 Byte)
5) Loader Name (Length is in 4) )
6) Again unknown data
There must be also a size of the firmware/loader. I'm writing a dumper ram-loader for DCTL models. My loader works, but to test it i have to take the original loader, find the of the header, and then overwrite the original code by my own.