Post AVGzAXBS7lqIP09pCq by thaytan@aus.social
(DIR) More posts by thaytan@aus.social
(DIR) Post #AVGytcQPNtVZjc5SNc by thaytan@aus.social
2023-05-03T08:50:45Z
0 likes, 0 repeats
I have an Arm Cortex M3 firmware image, that's been converted to raw using objdump and having getting Ghidra to match things up - I think because I don't know the right load address. Anyone got ideas?
(DIR) Post #AVGytdCcUe4a98dxWi by mjg59@nondeterministic.computer
2023-05-03T08:53:38Z
0 likes, 0 repeats
@thaytan Ugh I have used something that looks at the disassembly and makes a good guess about the load address and I can't find it right now
(DIR) Post #AVGz23kLgfDSmuRGZU by mjg59@nondeterministic.computer
2023-05-03T08:54:08Z
0 likes, 0 repeats
@thaytan If you know the specific SoC and if it's just running directly on that you can probably guess the load address from the spec sheet
(DIR) Post #AVGzAXBS7lqIP09pCq by thaytan@aus.social
2023-05-03T08:54:59Z
0 likes, 0 repeats
@mjg59 That sounds exactly like what I had in mind - try and find some instructions with absolute address references and guess from there
(DIR) Post #AVGzKwgGBMjWNKX2H2 by thaytan@aus.social
2023-05-03T08:56:36Z
0 likes, 0 repeats
@mjg59 No, it's an OTA App block that gets loaded by an unknown bootloader