User Tools

Site Tools


howto:dji_ftpd_aes_unscramble

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
howto:dji_ftpd_aes_unscramble [2017/11/27 17:55]
chearne [3. Now What?]
howto:dji_ftpd_aes_unscramble [2019/01/15 23:00] (current)
czokie
Line 146: Line 146:
  
  
-On OSX you can navigate to: /Applications/Assistant_1_1_0.app/Contents/MacOS/Data/firm_cache +On OSX you can navigate to: /Applications/Assistant_1_1_0.app/Contents/MacOS/Data/firm_cache\\ 
 On Windows to: C:\Program Files (x86)\DJI Product\DJI Assistant 2\ Assistant\Data\firm_cache On Windows to: C:\Program Files (x86)\DJI Product\DJI Assistant 2\ Assistant\Data\firm_cache
  
Line 209: Line 209:
  
 In essence using code in this repo would be the same as running:  In essence using code in this repo would be the same as running: 
-```+<code>
 $ wget -m ftp://GPL:Violation@192.168.42.2/ $ wget -m ftp://GPL:Violation@192.168.42.2/
-```+</code>
  
 Followed by: Followed by:
-```+<code>
 python djicrypt.py -d -i downloadedfile -o outputfile python djicrypt.py -d -i downloadedfile -o outputfile
-```+</code>
  
 Alternately you can just use openssl: Alternately you can just use openssl:
-```+<code>
 openssl enc -d -nosalt -in downloadedfile -aes-128-cbc -K 746869732d6165732d6b657900000000 -iv 00000000000000000000000000000000 openssl enc -d -nosalt -in downloadedfile -aes-128-cbc -K 746869732d6165732d6b657900000000 -iv 00000000000000000000000000000000
-```+</code>
  
 And of course *our* script as detailed above in Usage: And of course *our* script as detailed above in Usage:
Line 229: Line 229:
 $ python dji_ftpd_descrambler.py  /tmp/192.168.42.2_drone/upgrade/dji/log/kernel01.log  | grep daak | head -n 1 $ python dji_ftpd_descrambler.py  /tmp/192.168.42.2_drone/upgrade/dji/log/kernel01.log  | grep daak | head -n 1
  
-```+<code>
 <5>   0.000000] c0 0 (swapper) Kernel command line: watchdog_thresh=3 console=ttyS1,921600 vmalloc=412M android firmware_class.path=/vendor/firmware isolcpus=2,3, <5>   0.000000] c0 0 (swapper) Kernel command line: watchdog_thresh=3 console=ttyS1,921600 vmalloc=412M android firmware_class.path=/vendor/firmware isolcpus=2,3,
 initrd=0x07400000,1M lcpart=mmcblk0=gpt:0:2000:200,ddr:2000:2000:200,env:4000:2000:200,panic:6000:2000:200,amt:8000:20000:200,factory:28000:4000:200,factory_out:2c000:4000:200, initrd=0x07400000,1M lcpart=mmcblk0=gpt:0:2000:200,ddr:2000:2000:200,env:4000:2000:200,panic:6000:2000:200,amt:8000:20000:200,factory:28000:4000:200,factory_out:2c000:4000:200,
Line 235: Line 235:
 chip_sn=31337000 board_sn=01EAT2D111XXXX daak=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA daek=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA drak=6f707f2962351d75bc089ac34da119fa  chip_sn=31337000 board_sn=01EAT2D111XXXX daak=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA daek=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA drak=6f707f2962351d75bc089ac34da119fa 
 saak=6f402fb8625205ce9bdd580217d218d8 waek=WIFIPASS production quiet board_id=0xe2200026 saak=6f402fb8625205ce9bdd580217d218d8 waek=WIFIPASS production quiet board_id=0xe2200026
-```+</code>
  
 ===== Credit ===== ===== Credit =====
Line 241: Line 241:
   * Subsequent bug fixes created by Czokie.   * Subsequent bug fixes created by Czokie.
   * Earlier work was based on https://hackaday.io/project/19995-hacking-dji-naza-m/log/53751-big-dump   * Earlier work was based on https://hackaday.io/project/19995-hacking-dji-naza-m/log/53751-big-dump
- 
-===== Contribute ===== 
-<todo #chearne:2017-11-27>The text from point 3 onwards needs to be converted from markdown to dokuwiki syntax</todo> 
- 
howto/dji_ftpd_aes_unscramble.1511805359.txt.gz ยท Last modified: 2017/11/27 17:55 by chearne