Jarrrkob

Results 12 comments of Jarrrkob

I just encountered this problem. Started the course via `rustlings watch` then had to search for the file I should edit. Luckily the `hint intro1` gave it away. For all...

The most important aspect of Monero is privacy. As far as I can tell this proposal would, in some way or the other, reduce the privacy or even could become...

Got some more informations due to --verbose flag and maybe part-success. `sudo exploit/sboot_exploit.py --verbose --shellcode shellcode/dump_fw_bootrom.bin -o 0xf1.bin` 8x DEBUG:root:Opening session DEBUG:root:Session opened with result 100 then DEBUG:root:Setting isdump=1 DEBUG:root:Reading...

Not booting from microSD sounds like a good explanation and gives me new ideas to poke around. Great, thanks a lot! :) The problem with sboot dumping is that i...

This explains a lot, things start to make sense now :] `strings` did not gave me XXELLA but i found I9300XXUGNH4 (german 4.3 Jelly Bean firmware from 2014-08-18) finally i...

``` sudo exploit/sboot_exploit.py --shellcode shellcode/dump_fw_bootrom.bin -o 0xf1.bin [+] Shellcode started [*] Found MMC device address [*] Rebooted eMMC into bootrom mode [*] Reading eMMC firmware to eMMC RAM [*] Enter...

New roadblock: ``` sudo ./exploit/sboot_exploit.py --shellcode shellcode/change_boot_partition_size.bin [+] Shellcode started [*] Found MMC device address ... DEBUG:root:sleep() found at 0x43e03aa4 DEBUG:root:display() found at 0x43e11bac DEBUG:root:clk1() found at 0x43e13e0c DEBUG:root:clk2() found...

I don't have 0xf7 so i wrote the 0xf1 i got from the device. I know about the EFS problem but since the device is considered 'dead' i appreciate a...

Retried with 0xF7.bin - booted into download mode - run step 3 - device rebooted and was still visible under lsusb - run step 5 and got the same error...

I'm currently stuck on this very issue. I want to use the VSCode devcontainer support to offer developers a comfortable way of setting up the environment., extensions, etc. after they...