LinuxInside
22-12-2004, 10:28
I have looked around a bit at the firmwares for the ovislink router great specs:
ovislink_os_1.01.043 (without wireless support)
ovislink_os_1.01.044w
This is what I have so far:
0x00000000 - Start of the MBR master boot record
MIPS 4km code probably with decompression / (decryption?) part.
0x00003b08 - Start of the compressed kernel image
0x00100000 - Start of some UNKNOWN binary image
compressed / encrypted?? rom?? image
end-40 - Start of a MD5 checksum??
We need a way to work out how get at this UNKNOWN binary image.
I believe this is some sort of compressed filesystem that holds the key to customising the box.
Anyone open for suggestions?
- Could try the mips42emul, which is able to boot a similar linksys and netgear devices...
Heres some code I used to extract the images:
head -c 14552 ovislink_os_1.01.044w > mbr.bin
tail -c 6860632 ovislink_os_1.01.044w | gzip -dc > image.bin
tail -c 5826608 ovislink_os_1.01.044w > unknown.bin
head -c 14552 ovislink_os_1.01.043 > mbr2.bin
tail -c 5776216 ovislink_os_1.01.043 | gzip -dc > image2.bin
tail -c 4742192 ovislink_os_1.01.043 > unknown2.bin
Hopefully we can crack this nut, otherwise I have to wait for the 500gx...
Best regards,
LinuxInside
ovislink_os_1.01.043 (without wireless support)
ovislink_os_1.01.044w
This is what I have so far:
0x00000000 - Start of the MBR master boot record
MIPS 4km code probably with decompression / (decryption?) part.
0x00003b08 - Start of the compressed kernel image
0x00100000 - Start of some UNKNOWN binary image
compressed / encrypted?? rom?? image
end-40 - Start of a MD5 checksum??
We need a way to work out how get at this UNKNOWN binary image.
I believe this is some sort of compressed filesystem that holds the key to customising the box.
Anyone open for suggestions?
- Could try the mips42emul, which is able to boot a similar linksys and netgear devices...
Heres some code I used to extract the images:
head -c 14552 ovislink_os_1.01.044w > mbr.bin
tail -c 6860632 ovislink_os_1.01.044w | gzip -dc > image.bin
tail -c 5826608 ovislink_os_1.01.044w > unknown.bin
head -c 14552 ovislink_os_1.01.043 > mbr2.bin
tail -c 5776216 ovislink_os_1.01.043 | gzip -dc > image2.bin
tail -c 4742192 ovislink_os_1.01.043 > unknown2.bin
Hopefully we can crack this nut, otherwise I have to wait for the 500gx...
Best regards,
LinuxInside