I also unpacked the IFS of jade and the IFS2 filesystem (and ifs of bitmap also): I found some interesting information on them:
- On JADE there are some scripts which configure network and start service. i don't think that IPC can be accesed on network, maybe this is only for development:
Code: Select all
$ cat start_network
io-pkt-v4 -dsmc9118 ioport=0x02000000,irq=10,mac=662200021605,verbose=5 -p tcpip &
waitfor /dev/socket 4
waitfor /dev/io-net 4
waitfor /dev/io-net/en0 4
ifconfig en0 192.168.1.11
inetd &
qconn port=8000 &
Code: Select all
$ cat etc/inetd.conf
telnet stream tcp nowait root /proc/boot/telnetd in.telnetd
- There are also some scripts which mount network shares (from hostname "PC") and flash filesystem from there:
Code: Select all
$ cat reflash_all
if [ ! -e /dev/io-net/en0 ]; then
start_network
fi
fs-nfs2 pc:/make /exec
/exec/flash_all
- And of curse there is password for root (and ftp user) also, here are the password hashes:
Code: Select all
ftp:KQkZ75liLIBxw:1210374309:0:0
root:TT53LygWqk3W.:1210378834:0:0
- I also identifed that HMI contains some uart references, so maybe IPC can be accessed on UART port
Code: Select all
$ strings hmi | grep uart
uart_printf_tx_ctrl
uart_printf_rx_sig_selected
uart_printf_tx_sig_selected
uart_printf_rx_ctrl
uart_printf_signal_table
uart_printf_tx_msg_selected
uart_printf_rx_msg_selected
t=%d : uart_value_printf string too long
t=%d : uart_text_printf string too long
I also protected (and will protect in the future) my files with password and I will send on PM to peoples who really works on some of microhacker's project.
to be continued....