View Single Post
  #159  
Old 05-08-2013, 02:19 PM
August August is offline
Fire Giant


Join Date: Sep 2010
Posts: 703
Default

And yes what you are doing IS reverse engineering but it is a black-box approach. Something consumes these files and translates it to DirectX (or maybe directx directly consumes them - I don't know?).

If we can find where in the source these files are consumed we should be able to say what each field is and what it does if the code is well documented (hah) or the values do something besides getting directly passed into the graphics engine (directx).

Like I said - I am approaching this from looking at only the the title of this post and a talk with Francesca last night. To me, I would have to imagine that these .edd and .eff files are some kind of serialized datasource that is deserialized by client/server and then acted upon. More than likely there was a tool that serialized the data that verant had and in the end we would still hvae to use the hex editor to get at the values, but at the very least we could get 100% comprehesion of the values.