Flag: Tornado! Hurricane!

 Forums >>  Target Specific - General  >>  Unpacking Belkin Firmware - A possible Magic Number

Topic created on: November 21, 2013 14:10 CST by andrewborg .

Hello,

I am trying to unpack a Belkin F5D8636-4.

The first Thing I did after downloading the Firmware was letting Binwalk analyze the File. The result was 4 LZMA Partitions.

Then I Analyzed the File Manually and I Figured out that each LZMA binwalk Found is Preceded by 12 Bytes. ( Except the First One, which was fount at Offset 0 of the Firmware)

Although these 12 bytes are not the same for all the 4 LZMA Partitions, they are quite similar.

The 12 Bytes for Three Partitions are in the Image Below.



Now, my first guess was that these numbers represent some kind of a Magic Number, but Google returned nothing of Value.

Do any of you guys know what such Hex Digits may Mean? Also if anyone want to suggest different ways to tackle the Unpacking Process, please do not hesitate to share them with me :).

PS: LZMA is being used, because of the fact that binwalk matched them with such archives. I used the DD Command to cut each partition binwalk found, but I did not manage to find any type of File System. Every Extracted LZMA contained a bunch of "garbage" and strings which some of them relate to low level Router Operation.

Thank you,
Andrew Borg

No posts found under this topic.
Note: Registration is required to post to the forums.

There are 31,320 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
hi!
Jul/01
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit