Editing SIG File Format
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 2: | Line 2: | ||
Objects used by the .SIG files. | Objects used by the .SIG files. | ||
* | *TOOLKIT | ||
** | **Unknown | ||
*FILE | *FILE | ||
**A file operation, currently thought to be in the temp directory of the USB | **A file operation, currently thought to be in the temp directory of the USB | ||
* | *PS3PICSY | ||
** | **Unknown, likely WWCS communications to a centralized server used at the factory or repair center. | ||
*PS/2 | *PS/2 | ||
**Likely from a barcode reader on COM1 with '''9600,7,2,0,50,0,0,0,0''' as settings. | **Likely from a barcode reader on COM1 with '''9600,7,2,0,50,0,0,0,0''' as settings. | ||
*PS3LV2DIAG | *PS3LV2DIAG | ||
**Functions in the LV2Diag | **Functions in the LV2Diag | ||
* | *EDIT | ||
**Unknown | **Unknown | ||
* | *PKG CERTIFICATE | ||
=Functions= | =Functions= | ||
Line 45: | Line 24: | ||
*for options, a HEX number | *for options, a HEX number | ||
*for options, two comma delimited values | *for options, two comma delimited values | ||
*for other arguments, ''file://temp:'' for a file located in | *for other arguments, ''file://temp:'' for a file located in teh temp folder of the USB flash drive. | ||
*for other arguments, a string to be displayed | *for other arguments, a string to be displayed | ||
Line 182: | Line 161: | ||
=Files leaked by an0n= | =Files leaked by an0n= | ||
Objective suites creates files in the temp folder inside the Objective Suites folder where the EXE is ran whenever it processes | Objective suites creates files in the temp folder inside the Objective Suites folder where the EXE is ran whenever it processes teh commands in a sig file. This section attempts to unravel what these files are. | ||
==auth_0.txt== | ==auth_0.txt== |