Seeking Assistance with Reverse Engineering Firmware for ASIC Miner KS-0 Pro from Iceriver
2023-12-24 00:29:54 Author: www.reddit.com(查看原文) 阅读量:28 收藏

Hello everyone,

I am embarking on a project to reverse engineer firmware for an ASIC Miner KS-0 from Iceriver, specifically looking into the “update160.bgz” file. While the firmware is for the KS-0 model, not the KS-0 Pro, I am assuming the approach to modifications would be similar. Here are the areas where I’m seeking insight and guidance:

1.	File Type and Structure: The “update160.bgz” file has proven challenging due to its unusual format. If anyone has experience with this type of file or ASIC firmware in general, your advice would be invaluable.

2.	Reverse Engineering Approach: I’ve noticed custom firmware developments for similar devices and am curious about the methodologies used. My concern is whether I’m on the right track or if there are different, more effective approaches.

3.	Assembly Code vs. High-Level Language: After disassembling the code in Ghidra, I’m left questioning whether typical firmware modifications are done in assembly or through higher-level languages. Understanding the norm here could streamline my efforts.

4.	Tools and Methods: Given the specialized nature of ASIC firmware, are there specific tools or methodologies that might better suit this task?

5.	Accessing the Device: My attempts to connect directly with the device via SSH and FTP have been unsuccessful. Is there another method for interacting with and modifying the firmware I should consider?

6.	Community Experience: I’m reaching out for any experience, insights, or advice you might share. Whether it’s tool recommendations, strategies, or anecdotes about similar endeavors, I would greatly appreciate your input.

Thank you for any help or direction you can offer!


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/18p9a3u/seeking_assistance_with_reverse_engineering/
如有侵权请联系:admin#unsafe.sh