{"id":113,"date":"2005-08-21T20:21:21","date_gmt":"2005-08-22T02:21:21","guid":{"rendered":"http:\/\/multimedia.cx\/eggs\/?p=113"},"modified":"2006-08-12T19:33:29","modified_gmt":"2006-08-13T02:33:29","slug":"reverse-engineering-blackberry-java-native-modules","status":"publish","type":"post","link":"https:\/\/multimedia.cx\/eggs\/reverse-engineering-blackberry-java-native-modules\/","title":{"rendered":"Reverse Engineering Blackberry Java Native Modules (?)"},"content":{"rendered":"<p>Readers of this blog have highly diverse reverse engineering goals. I was contacted by a reader who is interested in reverse engineering a .cod file. This file comes from the Blackberry run time environment and has to do with Java. I suspect that it is a file full of native CPU code for whatever CPU happens to run inside of a Blackberry. Anyway, since I have neither the time nor the inclination to chase after every code format in existence (and I have never even been entirely sure on what a Blackberry even is), I thought I would put it to the readers in case anyone happens to know off the top of their head. Pertinent details, questions, and speculations:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.blackberry.net\/developers\/downloads\/jde\/index.shtml\">Blackberry JDE is available here<\/a><\/li>\n<li><a href=\"http:\/\/www.blackberry.com\/developers\/dev_support\/index.shtml\">Blackberry development documentation<\/a><\/li>\n<li>Is the .cod a native CPU code file?<\/li>\n<li>If it is a native code file, is this a fabled Java Native Interface (JNI) code file?<\/li>\n<li>If yes, is there a standard way to disassemble the files?<\/li>\n<li>If no, and this is some kind of custom file format, what is the format, the section definitions, etc.?<\/li>\n<li>I have examined one sample .cod file. It starts with hex bytes DE C0 FF FF (CODE FFFF in little endian). No other patterns jump out at me except for a few embedded PNG files.<\/li>\n<\/ul>\n<p>If you have any insight into this format, feel free to contact me.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A highly esoteric request&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,4],"tags":[],"class_list":["post-113","post","type-post","status-publish","format-standard","hentry","category-java","category-reverse-engineering"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/comments?post=113"}],"version-history":[{"count":0,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/113\/revisions"}],"wp:attachment":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/media?parent=113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/categories?post=113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/tags?post=113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}