**** BEGIN LOGGING AT Wed Dec 30 02:59:57 2009 Dec 30 20:52:58 hey Dec 30 20:53:15 is it possible with openjtag to inject some binary code into a running process ? Dec 30 20:53:53 (openocd) Dec 30 20:57:54 basically, if I have a running embedded linux that I can just access via jtag, what would be the best way to make it prone a remote shell ? ( i thought about injecting a shellcode to a process and running it, but there might be easyer way of doing it ?) Dec 30 21:26:50 kay2, injecting shellcode into userspace would require you to find a slew of kernel data structures.. not an easy feat Dec 30 21:28:07 kay2, you may want to instead hook an interrupt handler with a little bit of kernel-mode code.. the problem there is you would need to find the syscall table, and you're in interrupt context so you can't call most syscalls Dec 30 21:28:27 kay2, what's the device and what are you trying to achieve, at a high level? Dec 30 21:43:24 eigma: it's an arm926ejs Dec 30 21:43:43 the console mode of the kernel + uboot has been disabled Dec 30 21:43:49 and I'd like to get a shell Dec 30 21:44:03 so up to now, I can only use jtag Dec 30 21:48:09 arm926ejs is only the CPU. what SoC, what board, what device (the whole thing) Dec 30 21:48:37 do you know where the RAM is mapped? Dec 30 21:48:57 are you familiar with ARM interrupt handling? (I'm a bit rusty myself Dec 30 21:51:56 and where do you plan on spawning that shell? is there a serial console? Dec 30 21:53:32 it's a PC202 Dec 30 21:53:36 from picochip Dec 30 21:53:54 I have the kernel output, so I can see what is mapped where... Dec 30 21:54:04 the device is a Femtocell Dec 30 21:56:27 key2: this guy? http://www.picochip.com/page/66/PC82xx Dec 30 21:57:19 something similar Dec 30 21:57:20 yeah Dec 30 22:01:07 can you pastebin the full kernel output? Dec 30 22:01:22 can I query u a sec ? Dec 30 22:01:54 sure Dec 30 22:21:23 key2: u there? Dec 30 22:22:28 pytey:yeah Dec 30 22:22:38 we've rooted that device Dec 30 22:22:51 (a different group) Dec 30 22:22:55 pytey: what brand Dec 30 22:22:56 ? Dec 30 22:22:59 (that I'm involved with) Dec 30 22:23:01 the vodafone one ? Dec 30 22:23:04 yep Dec 30 22:23:07 primeuser Dec 30 22:23:08 they are all the same Dec 30 22:23:08 thx Dec 30 22:23:09 ;) Dec 30 22:23:11 we did it first Dec 30 22:23:12 hahaha Dec 30 22:23:28 no but the ubiquisys one, u can't root it Dec 30 22:23:34 'we did it first' Dec 30 22:23:35 no console Dec 30 22:23:36 eh? Dec 30 22:23:55 pytey: with dieter ? Dec 30 22:23:55 we Dec 30 22:24:02 harald Dec 30 22:24:03 steve Dec 30 22:24:04 ... Dec 30 22:24:11 nope Dec 30 22:24:24 we worked on it independantly Dec 30 22:24:24 the vodafone is easy to root Dec 30 22:24:30 from uboot, u dump, find passwd Dec 30 22:24:45 u're done with john the ripper after few minutes with root: primeuser Dec 30 22:24:49 the ubiquisys is really hard to root Dec 30 22:25:06 well we just used console :) Dec 30 22:25:17 or ssh Dec 30 22:25:29 voda has also a udhcpd buffer overflow Dec 30 22:25:33 we could root it also that way Dec 30 22:25:48 there was a lot of different ways of doing it Dec 30 22:25:49 .. Dec 30 22:26:10 the primeuser passwd isn't the one we are using btw Dec 30 22:26:39 there was two user Dec 30 22:26:41 if my memory is good Dec 30 22:26:42 root Dec 30 22:26:43 and primeuser Dec 30 22:27:01 nope, not that Dec 30 22:27:30 you can ssh to it anyhow Dec 30 22:27:48 I'm interested in the DS2460B Dec 30 22:27:56 which is probably used for EAP-SIM Dec 30 22:28:08 for part of the openswan IPSEC stuff Dec 30 22:28:22 this is the blob that connects to the sagem GSM module inside Dec 30 22:28:31 the password for root was newsys ? Dec 30 22:28:34 if my mem is good Dec 30 22:28:39 correct Dec 30 22:29:04 do you have the serial console? Dec 30 22:29:09 sure Dec 30 22:29:21 ssh listens on 22 and 222 btw, dunno if you saw this Dec 30 22:29:26 sure Dec 30 22:29:44 but we did everything we needed to do with the voda one Dec 30 22:29:51 could wiretap even people Dec 30 22:29:54 add IMSI to the base.. Dec 30 22:29:56 and so on Dec 30 22:29:56 ... Dec 30 22:30:04 yeah, same here Dec 30 22:30:09 their security is ridiculious Dec 30 22:30:18 who are you? Dec 30 22:30:22 do I know you? Dec 30 22:30:26 not sure Dec 30 22:30:28 ;) Dec 30 22:30:28 let's pm Dec 30 23:47:13 anyone have some experience with MIPS based targets? Dec 31 00:19:40 yup Dec 31 00:54:40 Radiotubes: some Dec 31 00:54:47 Radiotubes: with ejtag ? Dec 31 01:03:24 oh hello Dec 31 01:03:31 yes using openocd **** ENDING LOGGING AT Thu Dec 31 02:59:57 2009