View Single Post
Old 09-04-2010, 06:09 PM   #39
pbarrette
Member
pbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with otherspbarrette plays well with others
 
Posts: 20
Karma: 2678
Join Date: May 2010
Location: Alabama
Device: ASUS EeeNote
Hm...

I have deciphered the Samsung SNE-60/60K firmware format.

It consists of a header, followed by an XOR encrypted U-Boot uImage, followed by an XOR encrypted squashfs file system.

There are two XOR keys in the header. One is used for the uImage and the other is used to decrypt the filesystem.

I have also written a program for Windows .NET which will extract the two sections and decrypt them. It will also compute the firmware file's CRC and validate it against the CRC stored in the firmware header.

The program can be downloaded here.

To use it, just run the program then drag and drop a firmware update .bin file onto the window.

A screenshot of operation:


I hope this will allow people to start hacking away at the linux base OS and software that this thing runs.

I can provide source code as well, but need a little bit of time for some clean up and basic code commenting.

pb
pbarrette is offline   Reply With Quote