You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi @maxton, I recently started poking around with NI libraries and found your little tool here. My goal is to extend the extraction features and to make it cross-platform. With some minor adjustments, I got it working - but now I want to understand better how it works. While reading through the code, I noticed a few magic numbers, e.g. some offsets and in the crypto algorithm.
How did you get that information? Are there any resources you can share regarding this file format in particular or general file reverse engineering techniques? I'm new to this field, so I'd appreciate any hints or suggestions :). Thank you!
The text was updated successfully, but these errors were encountered:
Hi @maxton, I recently started poking around with NI libraries and found your little tool here. My goal is to extend the extraction features and to make it cross-platform. With some minor adjustments, I got it working - but now I want to understand better how it works. While reading through the code, I noticed a few magic numbers, e.g. some offsets and in the crypto algorithm.
How did you get that information? Are there any resources you can share regarding this file format in particular or general file reverse engineering techniques? I'm new to this field, so I'd appreciate any hints or suggestions :). Thank you!
The text was updated successfully, but these errors were encountered: