Taking Apart a Boat Lighting Control Panel
Taking Apart a Boat Lighting Control Panel
*sigh* things rarely work out the way they should in my head, couldn't find the bit patterns I worked out that should correspond to the representations of digits on the seven-segment displays. I think I'm going to pivot again to implementing a simulator for time machine in PinMAME so I can shoot shots with the keyboard and see what happens in the debugger
#MAME #Debugger #Pinball #Ghidra #Disassembly #ReverseEngineering
Another detour on the Time Machine #Pinball #disassembly project, I think the processor specification I've been using is incomplete. There are a lot of instances of indexed addressing being interpreted as an offset from the current address. This is making it hard to figure out where in RAM different pieces of data live without manually calculating the address.
Time to learn #Sleigh and patch the processor definition. Maybe the extension author will even accept a pull request.
Moonlight Tower Disassembly • Austin, Texas, USA
Rolleiflex SL66 • Kodak Tri-X 400 • 2025
#FilmPhotography #Kodak #TriX #Camera #Film120 #MediumFormat #Rolleiflex #BWfilm #Monochrome #Photography #ATX #TX #Downtown #Austin #Texas #Outdoors #Moonlight #Tower #Disassembly #Street #April_27_2025
Cool. After my productivity speedbump of last night, my Time Machine #pinball #disassembly project has moved forward. I now have a python script which exports the #ghidra program into an info file which a real 6800 disassembler reads to produce assembly which should actually be able to be reassembled into a final binary.
I'll use ghidra to continue analyzing the code, and when I'm ready to actually start writing my own patches, I'll do that outside of ghidra as though it were a source file.
Perusing the #documentation for JPype as it's the translation layer letting me write my #Ghidra script in #Python, and I'm enjoying the conversational style of the introduction in the user guide
https://jpype.readthedocs.io/en/latest/userguide.html#case-1-access-to-a-java-library
Haven't worked on my #Pinball code #disassembly much directly, but I have been working to get all the tools I need collected. It seems like once I've used #Ghidra to annotate and explore the code I'll want to bring the disassembled "source" into a real editor to actually make my changes.
To ensure the actual disassembly is compatible with assembling back to EPROM images, I plan to write a script to convert ghidra's code representation into a file that will drive a dedicated 68xx disassembler
This week I have mostly been digging into the code for Heavy on the Magick by Gargoyle Games. ( https://spectrumcomputing.co.uk/entry/2274/ZX-Spectrum/Heavy_on_the_Magick ). The graphics are freaky, so far I found the code which blits them onto the menu screen at normal size (The game blits the main play area double the size). Normally on a spectrum a byte, when stored on the screen will display 8 pixels in order from left to right. In HOTM, they shift every odd pixels into the left hand nibble of the byte, then shift the even pixels into the right hand nibble. But thinking about it, if you are doubling the size visually, a byte will only hold 4 pixels, so I reckon they shift each pixel into the two bytes alternatively within the same loop #zxspectrum #retrogaming #z80 #disassembly
Printed myself a 68xx #reference guide and put it in a binder. It'll be nice having a paper reference while I'm working on the Time Machine #Pinball #disassembly effort.
I've really been enjoying having a color #printer of my very own, and I'm especially happy about the fact that I haven't even put a visible dent in the ink tank fill indicators from the first fillup. The #EcoTank was pricey, but not having to be skimpy on ink usage is worth it.
"So awhile ago I had asked federal employees for an interview for a story." : from r/fednews
https://www.reddit.com/r/fednews/comments/1j2ykef/so_awhile_ago_i_had_asked_federal_employees_for/
Party of #LawAndOrder my foot! #GOP is the party of #grift and #corruption and #unscrupulous #felons. They only know how to #defraud the #exchequer and #loot from the #USTreasury and flout the #constitution. What we see here is #planned #disassembly of #government and open #contravention of court orders.
#IllegalAdministration #CorruptAdminstration #felon #impeachment #antiscience #TraitorMAGA #TraitorGOP
https://www.yahoo.com/news/inside-collapse-nih-154334572.html
Added automatic disassembly for bytecode addresses that generated an exception in UltimaVM! Knowns the module, the address and thread/task. Nice touch it also disassemble the relative label is present and adds useful columns description, this below the error message:
#riscos #RISC_OS #vm #bytecode #disassembly #programming #coding
Done. DD'ed the code of the binary to the .text section of another ELF binary with sections and disassembled that with objdump(1). God, modern software sucks.
#ARM, #disassembly, #ELF, #software
Is there a tool that can disassemble ARMv6 machine code in ELF files without any sections? The file has a single program header, and the code immediately follows after the header.
Here is the file: http://t3x.org/files/hello.bin
It is a "hello world" program that is supposed to run stand-alone on a Raspi 1B+, but doesn't. Next step would be to check the instructions in the file.
#ARM #disassembly #ELF
@fasterandworse you forgot the "unloading hammer" (which is used to disassemble small arms ammunition by using kinetic energy)...
#Firearms #Reloading #AmmoProduction #Disassembly #Hammer #UnloadingHammer #Ammunition #Disposal
See Sharem in action, emulating a Windows shellcode: https://www.youtube.com/watch?v=S1PI9O-q6eM
I don't think it supports Linux shellcodes, does it? Also, I wonder what disassembler it uses.
NB. AI for Sharem was presented @VirusBulletin
📝 New Blog Post: "Diving into the Rabbit Hole 🐇🕳️: Object Dumps, Compilation, and Syscalls"
Read it here:
🔗 https://dreaming-of-dragons.blogspot.com/2024/09/wherein-we-create-assembly-program-and.html
🗂️ Object Dumps
🔄 The 4-Part Compilation Process
🔧 Syscalls
#ReverseEngineering #RE #CProgramming #C #Assembly #Disassembly #CyberSecurity
I've written a more detailed blog post, as this is really a major change!
https://cryptax.medium.com/dart-shifts-to-standard-calling-convention-26dc65f8d15a