Questions tagged [protocol]
A system of rules designed to allow the communication between two or more participants. The two main types of protocols are either stateless protocols (UDP) or stateful protocols (TCP).
80 questions
0
votes
0
answers
116
views
Reverse engineering communication between an ultrasonic machine and its cartridge?
I'm reverse engineering the communication between an ultrasonic machine and its cartridge.
I've successfully documented the communication of other machines, knowing all the information it exchanged ...
3
votes
0
answers
188
views
Reverse-engineer Bubendorff CLEP21 remote controller
TLDR; I have a Bubendorff shutter system, whereas each shutter has its own remote controller. I am trying to clone the remote controllers, to build a single system for shutter control. There are three ...
2
votes
2
answers
165
views
Reverse Engineer an ultrasonic cartridge communication with the station to bypass remaining uses
I Have an ultrasonic machine that has a cartridge with a set amount of uses. When that value gets to 0, the cartridge has to be disposed, and a new one bought. The thing is that with some maintenance ...
0
votes
0
answers
58
views
Microsoft Teams web client: how does Teams knows if a device is allowed or not
In my company I am able to use Ms Teams only inside windows but when I try from a Virtual machine (Hyper-V) running linux it says that this device is not allowed.
So how can the Teams Server knows ...
0
votes
0
answers
59
views
9 pin serial port as GPIO
So I have a Royal DS 2260. It's an ancient "digital organizer" from the late 90s.
It has a 2.5mm headphone jack that can be used to either send/receive data to and from other digital ...
1
vote
0
answers
214
views
How can I extract the timestamp from this bytestring?
I am missing a piece of the puzzle that is the TCP protocol the Battlefield Bad Company games use to transfer dogtag records to/from the FESL backend. The general packet structure is quite clear and I ...
2
votes
0
answers
124
views
Reverse engineering 18 Bytes protocol
I'm not really used to do algorithm reverse engineering, so I need some help
It's a SPI communication between a STM and a wireless chip, hopefully the data were correctly acquired by the logic ...
0
votes
1
answer
234
views
Identifying the source of encryption used by UDP packets in a PCAP file
I have a PCAP file (mediafire link to the file) which basically represents packet captures between 2 machines running the same game connected to each other via LAN inside RPCS3 using RPCN.
One of ...
0
votes
0
answers
88
views
Password encryption when transferring from master to PLC
So, there is a PLC and a SoftMaster program to work with it. The PLC works according to the XGFenet protocol.
When connecting to the PLC for the first time in SoftMaster, a password must be entered. ...
0
votes
1
answer
1k
views
Reversing DALY BMS BLE protocol
I am trying to communicate with the DALY BMS (Battery management system) via BLE.
I was wondering if anyone has any bit of information regarding their protocol, something to start with?
2
votes
1
answer
159
views
How to determine a type of binary serialization?
I'm trying to analyze the messages that the game sends to the server through WebSockets. I have a simple WebSockets proxy that stands in the middle and prints all messages to the console.
I noticed ...
3
votes
1
answer
903
views
Is it possible to sniff an ATA Drive password?
Context: I have a proprietary Tandberg Data RDX QuickStor Internal USB3 drive bay for PC (item number 8666-RDX) and some storage cartridges for it.
Esentially, these are just regular TOSHIBA MK3276GSX ...
0
votes
2
answers
334
views
What checksum algorithm is this?
I'm trying to control an air conditioning unit. The app and the unit communicate using the Broadlink protocol. I can decode the settings it's sending and replay them.
The payload is 32 bytes but only ...
0
votes
2
answers
311
views
Touch screen driver module - Determine comunication protocol
I have taken apart an old non-functional Lenovo IdeaCentre (B320) computer.
I would like to get the glass touch panel to 'work' (I would consider anything from simply being able to sniff the x,y ...
1
vote
1
answer
136
views
What's wrong with my mitm to support rr commands with gdbserver on IDA?
First of here is the gdb remote protocol doc.
The idea of the below script is the following - you enter an actual command (one that will be send as a direct packet see packets) in the gdb window then ...
1
vote
1
answer
236
views
Checksum field within IR protocol
I am trying to reverse engineer the IR protocol for my air conditioner (GREE - remote control YAP1FF) and with the data I found online and a lot of testing with a IR receiver there is only one field I ...
3
votes
0
answers
169
views
Reverse engineering non-standard LIN protocol
I'm trying to reverse engineer an ECU / GSU protocol from a model airplane jet turbine, in order to make a telemetry adapter.
I have decoded several other protocols in the past with good success but ...
2
votes
1
answer
368
views
UE Megaboom serial protocol
I recently got a UE Megaboom Bluetooth speaker. Apart from various audio profiles, I noticed the speaker also exposes a Serial Port BT profile. I suspect this is the channel the app uses to control ...
2
votes
1
answer
156
views
Can't identify checksum type in unknown RS485 protocol
I need to reverse a RS485 protocol in order to extract some values for further usage. Unfortunately only these few messages are available at the moment. They repeat continuosly. Only in special ...
3
votes
1
answer
416
views
What Checksum/CRC algorithm in RF packet?
I am banging my head to figure out the checksum of a RF device, it seems to be a simple one but no luck so far...
The first 3 bytes is the SyncWord then 9 bytes is the payload and the last byte ...
2
votes
0
answers
162
views
serial protocol patterns
I am reversing a serial 232 protocol and I found these pattern in the data.
E5 A7 CD 01 00
79 .. .. 40
00 23 00 23 00 23 00 23 00 22 00 22 00 22 00 21
follows some recording and expected approx ...
3
votes
1
answer
438
views
NFC Tag reverse engineering failed by a non-responding tag
I was curious about a system using NFC and I tried to find out what was the protocol. But after digging few days around, I have the card detected by my reader (acr122u) but that's all I get. I can't ...
2
votes
1
answer
1k
views
Deducing Protobuf Schema and Datatypes
I have a number of protobuf files but no .proto schema file!
cat myfile.pbuf | protoc --decode_raw > outputfile.txt
Using the above command, I was able to decode the file into a somewhat readable ...
1
vote
0
answers
46
views
FFC on the back of a Chromebook Pixel Display Assembly
Hello!
I want to get the touch overlay of a Chromebook Pixel Display Assembly to work. I attached a picture of the Cable coming out of a mxT1664S touch controller. Can someone tell me what type of ...
2
votes
3
answers
3k
views
How to monitor/reverse engineer RS485-connected display device traffic?
Can anyone point me in the right direction for tutorials etc on reverse engineering RS484 connected battery management system?
I have a large 12V lithium battery module which has an internal BMS and ...