Posts

Showing posts from November, 2025

More ActiveGPS inspection with Python/Wireshark/Ghidra

Image
Python, Wireshark, ActiveGPS.exe, Ghidra My ActiveGPS device, purchased maybe 15 years ago (no more produced)  Hardware used: https://techcoderadio.blogspot.com/2025/04/some-activegps-pymocking.html Enhanced version of the PyMock for the ActiveGPS (due to hw setup many retries required when running with sleep or flush .... maybe com0com would work better?). B = b'0303 ... firmware version, 3.6 is the latest version import serial import time A = b'00' B = b'03036F72AD18F8BF4B07DA01120B3215AF00' C = b'00000' D = b'00' E = b'00' J = [      b'18F8BF4B07DA01120B3215AFFFFFFFFF',      b'409CA961000050124EF175426C73AE41',      b'14060D0907DB5B58421D474A4A00FFFF',      b'FFFFFFF133FB33FB33FA33FA33FA33FA',      b'33FA33FA33FA33FA33FA33FA33FA33FA',      b'33FA33FFFFFFFFFFFFFFFFFFFFFFFFFF',      b'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF',      b'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF0000'...

Inspecting Baofeng UV-5R Mini CPS

Image
BF-5RMini_CPS.exe dotPeek Visual Studio Ghidra Innoextract (Linux) DetectItEasy Installer extraction with Innoextract  DetectItEasy shows that CPS software is obfuscated with modified EP + CLR constructor Ghidra dotPeek to VS solution BF-5RMini_CPS.sln - mostly readable code    

BT scan and find 1

Image
Teltonika FMT Teltonika FMBT app def pin !  https://wiki.teltonika-gps.com/view/Teltonika_Configurator https://wiki.teltonika-gps.com/view/FMBT_Mobile_application       Elevators