JMTCsW:
I do not think that any of the jail breaks over the years has used the same vulnerability.
Well, other than the most general vulnerability: Lab126
<< several of my most favorite rants deleted at this point >>
- You want to have a complete Linux system from one of the more popular distributions.
Anything else will just make your work harder and/or more confusing.
Note: Your complete Linux system can load the Kindle's binary filesystem. It can also run ARM native code on your x86/amd64 development system.
- Additional resources:
- KindleTool
Required. From: NiLuJe's snapshots thread. Also available in source code form in a public repository.
- Kindle resources
Required. Your favorite Kindle firmware version, both binary (update_*.bin) and source code (only the public parts are posted).
- Tools
Your number one tool will probably be just staring off into the distance while the mind works.
- Machine code review
- Java bytecode review
- Scripting review
Required. Get out your most powerful code documenting text processor.
There is still a lot of readable scripting in the Kindle coding.
- Serial port connection
Recommended. You may never need it, but if you need it, it is already too late to install it.
- Local networking
Suggested. It should be possible to "net boot" the Kindle system.
- Lots of free time.
- The Amazon servers keep all prior Update_*.bin and partial source code files.
Use them, do not Google for anything when you can get the originals from Amazon.
- Note: The 'Androidized' device/firmware combinations are still mostly unknown, the previous 'dual system boot' device/firmware combinations are better described.