hex-editors

Can someone explain hex offsets to me?

故事扮演 提交于 2019-12-18 03:54:11
问题 I downloaded Hex Workshop, and I was told to read a .dbc file. It should contain 28,315 if you read offset 0x04 and 0x05 I am unsure how to do this? What does 0x04 mean? 回答1: 0x04 is hex for 4 (the 0x is just a common prefix convention for base 16 representation of numbers - since many people think in decimal), and that would be the fourth byte (since they are saying offset, they probably count the first byte as byte 0, so offset 0x04 would be the 5th byte). I guess they are saying that the

Steganography in image

南笙酒味 提交于 2019-12-13 09:50:07
问题 So far, I have opened the image in a hex editor and looked at the bytes. However, for the life of me I cannot identify the sound. I have spent days over this. I even tried opening the file (as 'Raw Data') in Audacity and playing it. Nothing but 'noise'. Tried to create a histogram/frequency analysis but nothing. Any help would be appreciated. 回答1: Steganography usually works by hiding a second image or some data in the lower bits of another image. These values becomes very insignificant over

what is iteration count and byte count in hexdump?

萝らか妹 提交于 2019-12-12 03:38:22
问题 It was really confusing to deal with hexdump command in linux. Basically I am trying to get the output from the /proc/device-tree. I tried to use the hexdump but ended up with confusion. My dts contains vvn = <0 0 2 2 0 0>; I got a proc node under /proc/device-tree. I tried the following command. hexdump -v -e '4/1 "%x" " "' vvn ; echo 0000 0000 0002 0002 0000 0000 hexdump -v -e '1/4 "%x" " "' vvn ; echo 0 0 2000000 2000000 0 0 hexdump -v -e '4/1 "%x "' vvn ; echo 0 0 0 00 0 0 00 0 0 20 0 0

How to grep for presence of specific hex bytes in files?

杀马特。学长 韩版系。学妹 提交于 2019-12-11 08:09:06
问题 My web app is displaying some bizarro output (unicode characters that shouldn't be there, etc.). The best I can reckon is that somehow I introduced a bad char somewhere in the source, but I can't figure out where. I found this answer that states I can do something like: grep -obUaP "<\x-hex pattern>" . When I copy the unicode char out of the browser and into my Bless hex editor, it tells me that the exact bytes of the char are: 15 03 01 EF BF BD 02 02 How can I format <\xhex pattern> to match

Is it possible to extract constants and other predefined values from binary executables?

╄→尐↘猪︶ㄣ 提交于 2019-12-10 14:36:19
问题 Let's say we have this program here class Message{ public static SUPER_SECRET_STRING = "bar"; public static void Main(){ string SECRET = "foo"; Console.Write(sha(SUPER_SECRET_STRING) + "" + sha(SECRET)); } } Now, after building this program, is there any way using a hex editor or some other utility to extract the values "foo" and "bar" from the compiled binary file? Also let's assume that memory editors are not allowed. Is this applicable to all compiled languages like C++? What about ones

python unhexlify not working as expected

落花浮王杯 提交于 2019-12-08 02:48:21
Whenever a program opens a file it sees the file as binary data. It translates it to a higher interpretive language i.e. octal, hex, ascii , etc. In this case it displays hexadecimal in the LH pane and ansi (windows 7 so it should be CP1252) in the RH pane. The 3 pictures below illustrate the original view, then the desired alteration, and the 3rd is the actual change made by the code: with open(tar,'rb') as f: data = binascii.hexlify(f.read(160)) if old in data: print 'found!' data = data.replace(old, new) else: print 'not found' with open(tar+'new', 'wb') as fo: binascii.unhexlify(data) fo

Hex editor for viewing combined string and float data

99封情书 提交于 2019-12-06 04:38:38
I have a binary file of unknown format that I need to be able to read. I have access to a program which can 'unpack' the file, but the user interface is terrible for exporting data. I've extracted a few points in an attempt to search for them in the file and discover a pattern, but it's not an efficient method. What I'm trying to do is match hex patterns to single floating point values, but copying, pasting, translating, and searching the file is not a quick process. I've looked around quite a bit, and I can't seem to find any hex editors that allow a user to highlight 4 or 8 bytes and display

What's a good hex editor/viewer for the Mac? [closed]

馋奶兔 提交于 2019-12-04 07:22:05
问题 As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. Closed 6 years ago . What's a good hex editor/viewer for the Mac? I've used xxd for viewing hexdumps, and I think it can be used in reverse to make edits.

How to decipher/interpret the contents of a file as shown in a Hex editor?

醉酒当歌 提交于 2019-12-04 07:02:54
问题 In connection with this question, I downloaded a Hex Editor to see just what values my SDF file contained in a certain location, which is supposed to tell me what version of SQL Server CE the SDF file was created with. I got the following info: SQLCE Version 2.0: 0x73616261 3.0: 0x002dd714 3.5: 0x00357b9d 4.0: 0x003d0900 ...from this page. But I don't know what I'm looking at; I don't know if I'm looking in the wrong column or row, and I know that once I do know where I need to be looking,

Tool for 3-Way Binary (Hex) File Comparison?

蹲街弑〆低调 提交于 2019-12-03 08:06:51
I have a set of binary configuration files with three versions each -- an original, and two differently-modified versions of each file. I need to be able to see the differences between the two versions as well as the original, all at the same time. What I need is a three-way diff tool for binary files. Through a rather exhausting Google search, I eventually happened upon a screenshot of an application that does exactly what I need -- unfortunately, the forum post containing the image does not mention what application it is they're using: http://www.xboxhacker.org/index.php?topic=15032.0 Can