Hi @maxton, I recently started poking around with NI libraries and found your little tool here. My goal is to extend the extraction features and to make it cross-platform. With some minor adjustments, I got it working - but now I want to understand better how it works. While reading through the code, I noticed a few magic numbers, e.g. some offsets and in the crypto algorithm.
How did you get that information? Are there any resources you can share regarding this file format in particular or general file reverse engineering techniques? I'm new to this field, so I'd appreciate any hints or suggestions :). Thank you!
Hi @maxton, I recently started poking around with NI libraries and found your little tool here. My goal is to extend the extraction features and to make it cross-platform. With some minor adjustments, I got it working - but now I want to understand better how it works. While reading through the code, I noticed a few magic numbers, e.g. some offsets and in the crypto algorithm.
How did you get that information? Are there any resources you can share regarding this file format in particular or general file reverse engineering techniques? I'm new to this field, so I'd appreciate any hints or suggestions :). Thank you!