Skip to content

re-ws.pl

ReverseEngineering WorkStation

  • Home
  • Tutorials
  • Random
  • About

Hello, World!

Posted on September 10, 2017 by Kamil (aka. v3l0c1r4pt0r)

The time has come to start completely new project. I was present on the net since 2009. Till now, I had blog, named after my nickname. It had some troubles, though. Biggest one was problem with indexing the site by Google, which started with fall of co.cc domain from its index.

Because of that, I decided to start something completely new. Now it is time to introduce re-ws.pl – RE WorkStation. This blog will be very similar to the first blog, but I am going to focus on widely understood reverse engineering (and from time to time some hacking, electronics and other random stuff). I already have bunch of projects in status ongoing or planned, so I hope to push lot of interesting stuff in following months.

Two things that should have its continuations very soon are JCOP topic and LKV373A reversing. On the first one, I already published dump of memory during pre-personalization process, together with highlighting of most important fields and in second article, I described process of pre-personalization itself. Next goal is to document whole API, available during the process. Second topic, the LKV373A, is now after describing of general structure of firmware image and creation of Wiki page on github to gather all publicly available knowledge about the device. As mentioned in the article about firmware, goals are to have ability to compute firmware checksum and learn the compression algorithm. I will try to push forward both topics as much as I can. And to prove that I can do something about that I am publishing second part of the story just now.

I hope my work here will be useful to many people, mostly those that does not take technology for granted and willing to know inner workings of their stuff.

Posted in News

Post navigation

[Import]LKV373A HDMI to Ethernet converter: firmware image format
LKV373A: identifying processor architecture

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Tags

Android assembly busybox C CAN can-hacking cc-factory cmake compiler docker Dreamspark electronics English gcc hacking hardware JavaCard JCOP kernel KiCAD library Linux PC PCB pinout PKI polski programming Python radio Raspberry Pi Reverse Engineering RTL-SDR SDC SDM SDR smart card software tor tty UART UEFi Windows X.509 Xperia Pro

Recent Posts

  • PHP build for use bundled in Android applications
  • Running graphical apps inside Docker containers
  • Plugin architecture demo for Python projects
  • Authorizing adb connections from Android command line (and making other service calls from cli)
  • How to recover torrent from rtorrent meta files

Recent Comments

  • pomi on Playing with GF-07 GPS device
  • pomi on Playing with GF-07 GPS device
  • Hamdy Abumgata on Playing with GF-07 GPS device
  • Mousum Gogoi on Playing with GF-07 GPS device
  • Eason on Sniffing USB traffic with DSLogic logic analyzer into pcap file

Categories

  • News
  • Random
  • Reversing LKV373A
  • Setting up new v3 Hidden Service with ultimate security
  • Tutorials
  • Uncategorized
  • Understanding JCOP

Links

  • Me @ github
  • LKV373A Wiki
  • DevTomek

Archives

  • December 2024
  • November 2024
  • May 2024
  • July 2023
  • October 2022
  • August 2022
  • July 2021
  • June 2021
  • May 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • February 2019
  • November 2018
  • October 2018
  • June 2018
  • May 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • September 2017

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Proudly powered by WordPress | Theme: micro, developed by DevriX.