Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I've dealt with a few.

One turned out to be LZRW3, kind of like LZSS but with the 12-bit string source being a hash table index. That was totally reverse engineered from staring at hex bytes, and then later we found out the identity of the compression algorithm.

Another was never discovered. It was one of two compression algorithms used by VxWorks, as part of transitioning between boot stages. My solution was to put the entire RAM content into an ELF file (including all of VxWorks) as one big section, then hack it up to run as a Linux binary. I thus made a decompression program.

Writing an emulator is also a great choice. I do that a lot.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: