readme: Mention the SHA256 hash of the 1.5.0 NSO

This commit is contained in:
Léo Lam 2020-10-19 20:32:24 +02:00
parent 5bc5c7c0b2
commit 35ad671acf
No known key found for this signature in database
GPG Key ID: 0DF30F9081000741
1 changed files with 1 additions and 0 deletions

View File

@ -47,6 +47,7 @@ To contribute to the project, you will also need:
* These Python modules: `capstone colorama cxxfilt pyelftools` (install them with `pip install ...`) * These Python modules: `capstone colorama cxxfilt pyelftools` (install them with `pip install ...`)
* The original 1.5.0 `main` NSO executable, converted to ELF format with [nx2elf](https://github.com/shuffle2/nx2elf). * The original 1.5.0 `main` NSO executable, converted to ELF format with [nx2elf](https://github.com/shuffle2/nx2elf).
* Copy it to data/main.elf -- it is used for the diff script and other tools. * Copy it to data/main.elf -- it is used for the diff script and other tools.
* The uncompressed NSO has the following SHA256 hash: `d9fa308d0ee7c0ab081c66d987523385e1afe06f66731bbfa32628438521c106`
Experience with reverse engineering optimized C++ code is very useful but not necessary if you already know how to decompile C code. Experience with reverse engineering optimized C++ code is very useful but not necessary if you already know how to decompile C code.