Hades Challenge .pod

Extraction and unpacking of game archives and compression, encryption, obfuscation, decoding of unknown files
Puterboy1
Posts: 382
Joined: Wed Sep 12, 2018 2:22 am

Hades Challenge .pod

Post by Puterboy1 »

I would like to extract these please: https://ia903000.us.archive.org/view_ar ... llenge.iso
rabatini
Posts: 179
Joined: Tue Jan 18, 2022 12:21 am

Re: Hades Challenge .pod

Post by rabatini »

did you at least see the file?
it's all blank.
do you have a sample?
Puterboy1
Posts: 382
Joined: Wed Sep 12, 2018 2:22 am

Re: Hades Challenge .pod

Post by Puterboy1 »

rabatini wrote:did you at least see the file?
it's all blank.
do you have a sample?

Here you go:
rabatini
Posts: 179
Joined: Tue Jan 18, 2022 12:21 am

Re: Hades Challenge .pod

Post by rabatini »

Puterboy1 wrote:
rabatini wrote:did you at least see the file?
it's all blank.
do you have a sample?

Here you go:

a blank file. lol
Puterboy1
Posts: 382
Joined: Wed Sep 12, 2018 2:22 am

Re: Hades Challenge .pod

Post by Puterboy1 »

I don't know what the hell went on.
Puterboy1
Posts: 382
Joined: Wed Sep 12, 2018 2:22 am

Re: Hades Challenge .pod

Post by Puterboy1 »

Here's one with a full interior. Examine it if you can.
Pickle
Posts: 9
Joined: Thu Jul 14, 2022 6:24 pm

Re: Hades Challenge .pod

Post by Pickle »

Puterboy1 wrote:Here's one with a full interior. Examine it if you can.

This looks like an easy one.

Code: Select all

The file header is 16 bytes.
{
   CHAR[4] signature;
   ULONG unknown1;
   ULONG unknown2;
   ULONG fileCount;
}

Followed by the index.

for each file in fileCount
{
   CHAR[12] filename;
   ULONG fileSize;
}

Followed by the file data. It's just the bytes of each file written end to end.

for each file in fileCount
{
   BYTE[fileSize] data;
}

When you extract CR.pod you will get two more pod files, h2030ba0.pod and h2030pa0.pod, which will then have to be extracted the same way.
rabatini
Posts: 179
Joined: Tue Jan 18, 2022 12:21 am

Re: Hades Challenge .pod

Post by rabatini »

something like that

Code: Select all

get id long
if id == 0x00646f50
get unk longlong
get entries long
set offset = 0x30

for rip = 1 to entries

getdstring name 0x0c
get size long
log name offset size
set offset = size + offset

next rip

else
print "Not pod file my little dude"
endif