From: Larry Jackson (LarryJackson@iName.com)
Date: 05/07/00-04:45:26 PM Z
From: David Lerner <firstname.lastname@example.org>
> On Sun, 7 May 2000, Michael V. Velotta wrote:
> > If
> > someone already has their BIOS re-flashed and has a bootable hard
> > drive running on the V3 I-opener, can they see the SanDisk image?
> > If so, can they post the encrypted password - I'm assuming it's
> > still in /etc/shadow of the SanDisk image - I'd like to get my
> > Linux server farm running "Crack" on it for a while. Maybe we'll
> > get lucky.
> > -Mike
> I have the V3 running and I can see the SanDisk image, but I can not mount
> the partition inder Linux. This won't stop me from looking at the raw
> disk. From what I have been told, the shadow file has been removed, and
> the password with it. There is no encrypted password to crack as a normal
> login is prevented by removing the shadow file. A string search for "root"
> on the raw image suggests that there is a .rootPassword file.
> A breakthrough is probably going to require figuring out how to change
> things through the modem port. Diverting the phone call after it dials out
> is no problem. Duplicating the normal login sequence and finding out what
> commands will allow modification of the sandisk is quite another problem.
> Till then, scraping epoxy is the only known way of hacking the V3.
A number of people are looking for a copy of the V3 SanDisk image
to try to crack the new passwords or find another hack to reflash them.
There is a thread on the I-Appliance BBS called New BIOS Disassembly
Where the serious V3 hackers seem to be working on this problem.
Take a look.
-- To unsubscribe: E-mail email@example.com with the text "unsubscribe ihack". Useful sites: http://iopener.home.fastolfe.net/ihack/ (List Archive) http://fastolfe.net/misc/ihack-resources.html (IHack Resources)