View Single Post
Old 06-23-2012, 02:58 PM   #64
wlaf
Enthusiast
wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.wlaf writes the songs that make the whole world sing.
 
wlaf's Avatar
 
Posts: 44
Karma: 40820
Join Date: Jun 2012
Device: Kindle 3 WIFI
Quote:
Originally Posted by knc1 View Post
Quote:
Originally Posted by wlaf View Post
Using "setenv rdinit /bin/sh" I got:

Code:
uboot> setenv rdinit /bin/sh
uboot> boot
You need to add that to the existing command line argument strings.
You __must__ use the equals sign.

U-boot contains a small shell, when you print all of the environment variables, you are reading shell scripting.
I think my command was in right format. U-Boot has a different syntax compared to bash, grub, etc. The output shows that the command actually worked. I can provide the output of the "printenv" command.

Right now, I'm using these two documents for U-Boot:

Freescale Semiconductor
U-Boot Quick Reference
http://www.lysator.liu.se/~kjell-e/e...E5200BUBPG.pdf

and this nice presentation:

Free Electrons, E,bedded Linux Developers
The Uboot bootloader
http://free-electrons.com/doc/u-boot.pdf

I also found this document, and for the first time I learned that Kindle 3 has a builtin microphone!

Kindle3 hacking
https://brmlab.cz/_media/event/lt-kindlehacking.pdf

After all, It seems brute forcing the password is the easiest remaining option. For doing this, I should know what exactly happens after you enter a correct password in recovery menu. The last document above provides a simple script for serial brture forcing, but it's useless for my situation and need to be changed completely.

Quote:
Originally Posted by hawhill View Post
I'm currently playing with it and did not really get it to do something useful. I think the provided bootstrap files ("image/" subfolder of ATK) don't fit the Kindle 3 platform, they are rather tailored towards Freescale evaluation boards. Looking at the uboot sources, there's quite a bit of setup needed... So I'm not sure if using ATK leads anywhere useful. There's work involved, and work that typically needs a tough experienced hacker... plus lots of the hacker's time.
I think it will be useful anyway. For example, "Download" and "Dump" features of the Flash tool seems to be promising. Dump the MMC, etc of a working Kindle and then reprogram another Kindle. In theory, it should provide a fast and painless recovery.

Last edited by wlaf; 06-23-2012 at 04:10 PM.
wlaf is offline   Reply With Quote