This content has been marked as final. Show 2 replies
The simplest reverse-engineering tool is a hex editor. Look at the bytes in the file and figure out what they are for.
Of course figuring out what they are for does require some knowledge of the application which uses them for, so you can't expect to find a tool which does that. It's pretty much up to the person doing the reverse-engineering to do the sort of thing you already did with the TIFF part of the file.
user9941149 wrote:Err...no that isn't going to work.
...could be xml,
I have tried to see if the file was encoding using EBCDIC, but that didn't help.
EBCDIC is a character set which has different encodings.
XML is a structured data format. The data itself could be in different character sets.
The two are not equivalent nor comparable.
In terms of your file...
1. Determine the type of data: binary, text or mixed.
2. If text of any sort determine the character set encoding
3. Determine what the values mean. This is actually tied up with 1 especially in terms of binary data.
As noted from the previous reply.
1. Get a hex editor.
2. Learn all you can about what data might be or should be in the file.
3. Get as many different examples of the file you can.
4. Use 1 to open each file and then using 2 attempt to map to likely values.
Step 4 doesn't provide any shortcuts. Experience is the only way to learn how to do it more effectively.
Note as well that unless the source is IBM equipement it is unlikely to have a EBCDIC character set.
However that doesn't mean that you can ignore the possibility that you need to learn more about character sets and encodings of the same.