Comments (10)
No success yet...
BTW, have you seen this line?
# VMOPTIONS="$VMOPTIONS -Dde.vw.mib.asl.internal.exlap.overrideSWaP"
Not sure if it's interesting at all but the overrideSWaP
got me excited 😃
from mib2std-toolbox.
Hi,
Sure! Seams like a great idea!
I'm just starting to figure out how to safely access filesystem of my MIB2Std. And since I don't have recovery tools for it yet - it's baby steps really.
You are far more experienced coder/hacker than I am. I'm not even sure which Variant
number relates to 5F unit in my car. I believe that you also have better access to test devices (though MQB-C&R) and testers (though community around your toolbox).
By all means - if you see any value in what I have created, please use it as if it was your own. I'll be more than happy to see mib2-toolbox
to be merged with mib2std-toolbox
.
from mib2std-toolbox.
❤️
Did you find a succesful way to install the custom .esd on the unit through the POI update?
On MIB2-high there are a few vulnerabilities that make it possible:
- POI update allows writing of ANY file onto the unit, by using the payload feature. However, they cannot be a script, because the copied file will not be executable (and there's no way to do chmod 777 during SWDL)
- leftovers from the development team: there's a script that imports files from a folder on SD, and does CHMOD 777 to each of the copied files.
- Green Engineering Menu can point to scripts in older folders than just the engdefs/scripts folder, which allows us to run anything that has been copied by the leftover script :-)
And then, on MIB1 High there was a vulnerability that allowed us to escape the POI folders by path traversal, with ../../ as path names for files. 😆 That was fixed on MIB2High, but not sure if it's still there on the STD ones.
from mib2std-toolbox.
hmm that is looking interesting!! :-)
from mib2std-toolbox.
For Technisat StdNav units there's a backdoor through onlineservices update. Works the same way as Jille's payload in MHI2 Toolbox. With some tweaking this could be a solution to enter these units. Unfortunately works only on nav units, doesn't work on StdPlus units.
from mib2std-toolbox.
Any new news on this
from mib2std-toolbox.
I offer myself to test on a MIB STD2 5QA 035 846 A if there's a chance
from mib2std-toolbox.
No success yet...
BTW, have you seen this line?
# VMOPTIONS="$VMOPTIONS -Dde.vw.mib.asl.internal.exlap.overrideSWaP"
Not sure if it's interesting at all but theoverrideSWaP
got me excited
Any luck with this
from mib2std-toolbox.
No success yet...
BTW, have you seen this line?
# VMOPTIONS="$VMOPTIONS -Dde.vw.mib.asl.internal.exlap.overrideSWaP"
Not sure if it's interesting at all but theoverrideSWaP
got me excitedAny luck with this
Not exactly. I believe that there are two ways of forcing MIB to accept FECs.
- Replace FecContainer.fec with custom one and patch MIBRoot to skip signature validation of the file.
- Insert /tsd/etc/slist/signed_exception_list.txt and patch tsd.mibstd2.system.swap to skip signature validation of the file.
For MIB2HIGH the file is /HBpersistence/FEC/Exceptionlist.txt
AFAIK the second method is using a mechanism developed to test SWaP features without valid FECs. Features will work but in hidden menu SWaP codes will remain not present at all.
from mib2std-toolbox.
No success yet...
BTW, have you seen this line?
# VMOPTIONS="$VMOPTIONS -Dde.vw.mib.asl.internal.exlap.overrideSWaP"
Not sure if it's interesting at all but theoverrideSWaP
got me excitedAny luck with this
Not exactly. I believe that there are two ways of forcing MIB to accept FECs.
- Replace FecContainer.fec with custom one and patch MIBRoot to skip signature validation of the file.
- Insert /tsd/etc/slist/signed_exception_list.txt and patch tsd.mibstd2.system.swap to skip signature validation of the file.
For MIB2HIGH the file is /HBpersistence/FEC/Exceptionlist.txtAFAIK the second method is using a mechanism developed to test SWaP features without valid FECs. Features will work but in hidden menu SWaP codes will remain not present at all.
What's file contents of signed_exception_list.txt
?
from mib2std-toolbox.
Related Issues (8)
- Add support to dump the shadow file HOT 124
- Replace images/ressources? HOT 13
- Is this a tool for the pq platform? HOT 5
- Progress HOT 20
- New mib2-toolbox install method will also work on mib2std! HOT 6
- Is this project not going on? What a pity HOT 1
- MIB2STD Toolbox for Technisat Nav units now available! HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from mib2std-toolbox.