View Single Post
Old 08-26-2012, 04:04 AM   #26
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by ixtab View Post
Just a note: before making the diff, you want to make sure that both images are from the exact same Firmware version.

And maybe you want to use something like "diff -burN /path/to/img1 /path/to/img 2>/dev/null". That will make the output more readable. Oh, and please enclose the output in a CODE box.
You will note that during this thread, the O.P. never mentioned flashing a kernel.
Not even when asked directly if the kernel and system image was flashed in matched pairs.

Hmm...
The root password is based on the device serial number in the original Amazon images.
I see that the root password was not "corrected" to that of the forensic images.
Must still be "buddy's password", based on the serial number of the "buddy's" Kindle.

Well, on the good side, the root password is not that hard to crack.

Last edited by knc1; 08-26-2012 at 04:26 AM.
knc1 is offline   Reply With Quote