Thread: iLiad I survived 2.7.1
View Single Post
Old 10-25-2006, 11:47 AM   #4
design256
Connoisseur
design256 doesn't litterdesign256 doesn't litter
 
Posts: 78
Karma: 103
Join Date: Aug 2006
Location: Ipswich, UK
Device: Irex Iliad
Quote:
Originally Posted by scotty1024
That will only survive a patch update. On their full updates they dd a new file system into the disk on chip.
Yes, this will be more tricky, but still possible to backdoor. I'll wait until 2.8 is out before posting suggestions.

Quote:
I hope that wasn't the real name you used for your rc script, I'm sure they'll have a patch for that in 2.7.2.
It was a throwaway - but an interesting measure of their paranoia to see whether they do patch it or not.


Quote:
BTW I'm not some cowboy with my start.sh hack for the clock. Once their panel starts you have to kill out and restart the icon container, which is a central nexus in how the iLiad routes things like the keyboard events. I've done it by hand but its cleaner to just mod the actual start.
No indeed, but (as I find daily), you can't underestimate the clumsiness of people entering your scripts into their machine. If a mistake is possible, then somebody will make it. And missing off the last & in startup.sh is very easy and deadly to do.

Perhaps we could post an exploit to update er_registry (harmless), then supply clickable sed or shell scripts to do the rest...


On a related topic, have you any idea where the kernel boot image lives? Its symlink in /boot doesn't exist and it's not on /dev/tffsa1 where I might have expected to find it. I can only assume that there's another paged boot flash that we don't have access to... If we could find that, then we'd be on the first steps to brick-protection..
design256 is offline   Reply With Quote