I have a binary file for some old music hardware I own that's been out of production for the past 3 years. The company is now bust and no longer exists.
I'm trying to reverse engineer the binary file.
I've tried opening in a hex editor, I can see some ASCII text, but there are lots of symbols and characters in there that make no sense. Does this mean its encrypted?
I've tried to disassemble using gdb but I always get "No symbol table is loaded. Use the "file" command.". If I use the strin开发者_如何学Pythong command at the terminal I can see a lot of strings that are using the software. Again, there is also lots of strings that are not human readable.
Can anyone push me in the right direction so that I can get some workable assembly code for this?
You need some HW knowledge of what CPU/Environment for this binary is used, IDA Pro tool and lots of patience.
精彩评论