-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reverse engineering for Paperang P2 ? #4
Comments
I break the PS: the code of paperang app is very ugly... |
Check this: https://www.ihcblog.com/miaomiaoji/ |
I think MiaoMiaoji PC Client can do more interesting thing |
I bought a PeriPage printer (http://ileadtek.com/sy) which seems to be very similar to a Paperang one. I've tried to reverse engineer their protocol too, but the "shell" is hard to be broken to me. If I correctly understand, the app is dynamically loading encrypted dex files. Do you have any clues on how should I start, and what tools should I use to get these dex files, to be decompiled? |
Yes, you can try to get the raw dex using android virtual machine. Maybe there's a univeral unpacking VM now. |
I have Paperang P2 and I was able to print self-test page. Unfortunately, when I try to print a .bmp file I get this:
Any update on this? |
Sorry, no further update. You can try to capture the packet since there may be some protocol update. |
Paperang p2 used: There is another package format that starts with 0x07. |
Hello,
Can you explain how you did the reverse engineering for Paperang P1 ?
I bought a Paperang P2 and with your program I can only display one black line (with the 300 black lines example) . I think it's just due to a small difference in the settings.
Thanks.
The text was updated successfully, but these errors were encountered: