TransWikia.com

XAP2 processor firmware reverse engeneering

Reverse Engineering Asked by nusch on April 3, 2021

I’m looking for way to load to Ghidra,radare or IDA firmware of DFU firmware identified by binwalk as:

0x0 CSR (XAP2) DFU Firmware update header

0x4c8 CSR Bluecore firmware segment

I’ve already extracted second part to seperate file and tried to load it as RISC to Ghidra but during disassembly it only jumped across some references and code is marked as data not code.
I don’t have access to the device to determine exact version of the chip.
Years ago I had some experience with some BlueGiga BT modules and AFAIR there was not a lot field for maneuver for the developer except of multitude of configuration options related to bluetooth stack and role of created device. Wondering if that may mean that some parts of code are hardcoded in ROM and my DFU file is mainly made of configuration bytes not executable. Second alternative may be that I just need to set proper memory layout – not sure how to determine the chip solely basing on the firmware.

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP