Hacker News new | past | comments | ask | show | jobs | submit login
Getting the Firmware of a VTech/LeapFrog LeapStart/Magibook (leloubil.prose.sh)
33 points by LelouBil 31 days ago | hide | past | favorite | 6 comments



I assume this is some kind of ARM binary, but without any headers or anything I haven't been able to find out exactly what it is.

Hint: ARM (32-bit) non-Thumb opcodes have a very recognisable appearance, i.e. nearly every 4th byte will have E as its high nybble, because most of the instructions can be executed conditionally, and E is the "always" condition.


Hello !

This is my first shot at blogging and at a "real" reverse-engineering project of any kind (outside small binary for school classes) so please tell me all your feedback about anything in there, the length, the technical stuff, the style...

I know it's short but I wanted to publish it right now, as I arrived at a "pausing" point in the process.

And thank you for at least clicking on the discussion page !


It wouldn't surprise me if the book is printed with Anoto dot pattern - LeapFrog has been an Anoto licensee for quite some time.

https://en.wikipedia.org/wiki/Anoto


Yes that's exactly this, the video I link talks about it (in french).


You might consider using this handy thing, also available as a binwalk module, for recognizing the ISA.

https://github.com/airbus-seclab/cpu_rec


Thanks !




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: