IRC log for #openjtag on 20091230

00:50.59*** join/#openjtag Openfree` (n=Openfree@116.228.88.98)
05:39.24*** join/#openjtag Openfree` (n=Openfree@116.228.88.98)
07:14.27*** join/#openjtag dirk (n=dirk@p5B040052.dip0.t-ipconnect.de)
07:28.20*** join/#openjtag Openfree` (n=Openfree@116.228.88.98)
09:15.53*** join/#openjtag Weaselweb (n=quassel@2001:6f8:9e4:123:21a:92ff:fe5a:1409)
10:48.24*** join/#openjtag toi (n=toi@d54C2A96D.access.telenet.be)
11:35.11*** join/#openjtag pirho (i=pirho@gateway/gpg-tor/key-0x2CEEC9CB)
11:35.29*** part/#openjtag pirho (i=pirho@gateway/gpg-tor/key-0x2CEEC9CB)
11:40.42*** join/#openjtag Weaselweb (n=quassel@77-64-189-43.dynamic.primacom.net)
18:15.09*** join/#openjtag toi (n=toi@d54C2A96D.access.telenet.be)
20:52.52*** join/#openjtag key2 (n=key2@gob75-7-82-247-113-230.fbx.proxad.net)
20:52.58key2hey
20:53.14key2is it possible with openjtag to inject some binary code into a running process ?
20:53.53key2(openocd)
20:57.54key2basically, if I have a running embedded linux that I can just access via jtag, what would be the best way to make it prone a remote shell ? ( i thought about injecting a shellcode to a process and running it, but there might be easyer way of doing it ?)
21:26.50eigmakay2, injecting shellcode into userspace would require you to find a slew of kernel data structures.. not an easy feat
21:28.08eigmakay2, you may want to instead hook an interrupt handler with a little bit of kernel-mode code.. the problem there is you would need to find the syscall table, and you're in interrupt context so you can't call most syscalls
21:28.27eigmakay2, what's the device and what are you trying to achieve, at a high level?
21:43.23key2eigma: it's an arm926ejs
21:43.43key2the console mode of the kernel + uboot has been disabled
21:43.48key2and I'd like to get a shell
21:44.03key2so up to now, I can only use jtag
21:48.10eigmaarm926ejs is only the CPU. what SoC, what board, what device (the whole thing)
21:48.37eigmado you know where the RAM is mapped?
21:48.57eigmaare you familiar with ARM interrupt handling? (I'm a bit rusty myself
21:51.57eigmaand where do you plan on spawning that shell? is there a serial console?
21:53.32key2it's a PC202
21:53.36key2from picochip
21:53.54key2I have the kernel output, so I can see what is mapped where...
21:54.03key2the device is a Femtocell
21:56.27eigmakey2: this guy? http://www.picochip.com/page/66/PC82xx
21:57.19key2something similar
21:57.20key2yeah
22:01.07eigmacan you pastebin the full kernel output?
22:01.21key2can I query u a sec ?
22:01.54eigmasure
22:21.23pyteykey2: u there?
22:22.28key2pytey:yeah
22:22.38pyteywe've rooted that device
22:22.51pytey(a different group)
22:22.54key2pytey: what brand
22:22.55key2?
22:22.59pytey(that I'm involved with)
22:23.00key2the vodafone one ?
22:23.04pyteyyep
22:23.07key2primeuser
22:23.08key2thx
22:23.08pyteythey are all the same
22:23.09key2;)
22:23.11key2we did it first
22:23.11key2hahaha
22:23.27key2no but the ubiquisys one, u can't root it
22:23.34pytey'we did it first'
22:23.34key2no console
22:23.36pyteyeh?
22:23.55key2pytey: with dieter ?
22:23.55pyteywe
22:24.02key2harald
22:24.03key2steve
22:24.03key2...
22:24.11pyteynope
22:24.24key2the vodafone is easy to root
22:24.24pyteywe worked on it independantly
22:24.30key2from uboot, u dump, find passwd
22:24.47key2u're done with john the ripper after few minutes with root: primeuser
22:24.48key2the ubiquisys is really hard to root
22:25.06pyteywell we just used console :)
22:25.17pyteyor ssh
22:25.28key2voda has also a udhcpd buffer overflow
22:25.33key2we could root it also that way
22:25.48key2there was a lot of different ways of doing it
22:25.48key2..
22:26.10pyteythe primeuser passwd isn't the one we are using btw
22:26.39key2there was two user
22:26.41key2if my memory is good
22:26.41key2root
22:26.43key2and primeuser
22:27.01pyteynope, not that
22:27.30pyteyyou can ssh to it anyhow
22:27.48pyteyI'm interested in the DS2460B
22:27.56pyteywhich is probably used for EAP-SIM
22:28.08pyteyfor part of the openswan IPSEC stuff
22:28.22pyteythis is the blob that connects to the sagem GSM module inside
22:28.31key2the password for root was newsys ?
22:28.33key2if my mem is good
22:28.39pyteycorrect
22:29.04pyteydo you have the serial console?
22:29.09key2sure
22:29.21pyteyssh listens on 22 and 222 btw, dunno if you saw this
22:29.25key2sure
22:29.43key2but we did everything we needed to do with the voda one
22:29.51key2could wiretap even people
22:29.54key2add IMSI to the base..
22:29.55key2and so on
22:29.56key2...
22:30.04pyteyyeah, same here
22:30.08key2their security is ridiculious
22:30.18pyteywho are you?
22:30.22pyteydo I know you?
22:30.26key2not sure
22:30.28key2;)
22:30.29pyteylet's pm
23:45.02*** join/#openjtag Radiotubes (n=Radiotub@rrcs-24-172-158-139.central.biz.rr.com)
23:47.13Radiotubesanyone have some experience with MIPS based targets?

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.