People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
init
script to be set to /bin/bash
did not work. So, instead, they choose to modify the flash memory chip with their own version. They dumped the code, used unsquashfs
to unpack the file system, backdoored it, resquashed it and wrote it back. bootdelay
variable is used to determine how long to wait prior to booting into the OS. If this is set to -1 or -2, this check is skipped entirely. Practically, this means that it's not trivial to get into U-Boot shell. To bypass this, a forced error in the reading of flash will drop you into a U-Boot shell - this is called Pin2Pwn. Can we stop this!? You can't. bootdelaykey
and bootstopkey
are passwords for stopping/delaying autoboot. If you don't know these passwords, then you can't go into the shell (even with a glitch like before). This is simply a plaintext password in an ENV variable. By either reading this from the NVRAM or brute forcing the password, it's still possible to break in. bootstopkeysha256
is similar but a sha256 hash. bootargs
for Linux are not trivial to modify.