TransWikia.com

.fpk firmware unpacking

Reverse Engineering Asked by h msvi on January 24, 2021

I am working on firmware update file prod-build-Isat2-V02.00.03-DFU.fp2.
I extracted it and I’ve got some bin files. I analyzed these binary files with binwalk:

binwalk -E RDA-533.bin

The entropy of these bin files didn’t give any information and when I opened these files with IDA, it didn’t give subblocks and functions.
It seems these files are compressed or encrypted.
How can I analyze these bin files as efficiently as possible?

Thanks in advance

One Answer

You can find files File1.bin ... File6.bin in "C:temp" directory after running IsatPhone 2 Firmware Upgrade Tool and selecting firmware. It does not need a connection to physical device, just firmware and tool.Unfortunately you can't decrypt these files in contrast to "IsatPhone Pro" model in which files were not encrypted.

Answered by Igor Matyuh on January 24, 2021

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP