Reverse engineering a user data file

At my place of work, we have an outdated document management system, which for various reasons is no longer supported by developers. I was asked to study the extraction of documents contained in this system in order to eventually be imported into a new third-party system.

From tracking and monitoring processes, I determined that document images (mostly tiff files) are stored in the amount of 1.5 GB of files. These files are apparently read from a specific offset, and then written to the tmp file, which is then transferred through the web application to the client and then deleted.

I suppose I'm looking for suggestions on how I can scan these large files containing TIFF images, and ultimately extract and write them to separate files.

+3
source share
2 answers

Are TIFFs compressed in any way? If not, then your work can be quite simple: stitch TIFF along with 1.5G files.

Can you view the output of a specific 1.5G file (or a series of them)? If so, then you should be able to combine what the bytes for this TIFF should look like if it was uncompressed.

If the bytes do not appear there, try some standard compression (zip, tar, etc.) to see if a match has occurred.

+1
source

, , tiff- ( , ). . , , .

0

Source: https://habr.com/ru/post/1738833/


All Articles