
I have an x86 vxworks binary file that I am staring at to make sense of.
I found this nice paper:
https://www.blackhat.com/presentations/bh-usa-07/Maynor_and_Graham/Whitepaper/bh-usa-07-maynor_and_graham-WP.pdf
It describes the tiniest detail of a vxworks binary, namely that offset 0x14 contains the base address to load the binary. What I don't get is, what is the start address in the actual file that vxWorks loads into that base address?
Like in the paper, my binary file contains 0x0108000 at offset 0x14, but if I load the raw binary file into Ida at that offset, all the data xrefs are messed up. Anyone know of a good 'vxWorks binary file format primer' for reverse engineers?