I been waiting for reviews and being really interested to buy one since i saw the hack of ssa3021X from the post: (
https://www.eevblog.com/forum/testgear/siglent-ssa3000x-spectrum-analyzers/100/) .
it seems the SSA3021X (Original 2.1G and options closed) are upgraded to 3.2G, full options opened.
it's impossible for me to judge if the hack really works since i dont have one,,,,anyone who got one at hand can do me a favor to review or to try the hack?
anyway,, 1600 bucks are not a easy budget for me.
Tks in advance
Hi Papousek,
Here is some info you may want to know. In order to investigate whether it is a accident event. I install the old FW again and find out the 'hack' was gone. But when I upgrade to FW07.05 again and do the same thing to it. The 'hack' appeared again! So I think it means people can really hack it with these steps.
Wunderbar
Latest SSA3021X and SSA3032X units are hardware identical and SSA3021X is also calibrated up to 3.2GHz, so yes, SSA3021X is "upgradable" to SSA3032X
Hi Papousek,
Here is some info you may want to know. In order to investigate whether it is a accident event. I install the old FW again and find out the 'hack' was gone. But when I upgrade to FW07.05 again and do the same thing to it. The 'hack' appeared again! So I think it means people can really hack it with these steps. Wunderbar
The biggest question is whether a future firmware upgrade undoes the 'hack'.
Hi Papousek,
Here is some info you may want to know. In order to investigate whether it is a accident event. I install the old FW again and find out the 'hack' was gone. But when I upgrade to FW07.05 again and do the same thing to it. The 'hack' appeared again! So I think it means people can really hack it with these steps. Wunderbar
The biggest question is whether a future firmware upgrade undoes the 'hack'.
With Rigol this afraid and question have been many years, starting from old times DS1052E.
(I remember well these RS232 and terminal things what also I have done... and eevery next FW update we afraid if this all have gone... )
Hi Papousek,
Here is some info you may want to know. In order to investigate whether it is a accident event. I install the old FW again and find out the 'hack' was gone. But when I upgrade to FW07.05 again and do the same thing to it. The 'hack' appeared again! So I think it means people can really hack it with these steps. Wunderbar
The biggest question is whether a future firmware upgrade undoes the 'hack'.
With Rigol this afraid and question have been many years, starting from old times DS1052E.
(I remember well these RS232 and terminal things what also I have done... and eevery next FW update we afraid if this all have gone... )
That may be but if downgrading undoes the 'hack' in the SSA3000 then upgrading is likely to do the same because appearantly the hack doesn't update the memory where the enabled options are stored. If the options where enabled permanently by the hack then they would remain after downgrading.
I don't understand, what exactly is the hack on this one? Just an upgrade with the official firmware or is there something else to do? And will this hack enable the Tracking Gen as well?
I don't understand, what exactly is the hack on this one? Just an upgrade with the official firmware or is there something else to do? And will this hack enable the Tracking Gen as well?
First mentioned here:
https://www.eevblog.com/forum/testgear/siglent-ssa3000x-spectrum-analyzers/msg938261/#msg938261
We still need confirmation the options stay enabled in future firmware updates otherwise it isn't a hack but a bug. It would be sad when people make their purchase based on the availability of the full-featured SA for the base price only to find out they can only use an old firmware version which doesn't have the latest features.
We still need confirmation the options stay enabled in future firmware updates otherwise it isn't a hack but a bug. It would be sad when people make their purchase based on the availability of the full-featured SA for the base price only to find out they can only use an old firmware version which doesn't have the latest features.
I would hardly call it hack since, man - you don't have to do anything, just upgrade FW, wtf
? It's certainly a bug.
To me what is more important is to test it now if it really is capable of 3.2GHz span on 2.1GHz model and do all these enabled options work as well, because once you know the technical capabilities are the same then we can do hacks on software. Also if it works it's great base to start working on real hack - I mean for example you could dump memory from EEPROM when you had old FW and then dump once again when upgraded to new one, and see what's changed (maybe nothing unfortunately if it's related to real software bug like IDK wrong date checking?). By the way if it is possible to get trial versions for 48h, isn't it possible to manually adjust RTC clock and find and replace date in memory, I know it's pain in ass solution, but anyway.
..
To me what is more important is to test it now if it really is capable of 3.2GHz span on 2.1GHz model and do all these enabled options work as well, ..
The answer to both your questions is yes.
It is possible to turn SSA3021X into SSA3032X and enable all the options unofficially in a different (permanent) way as well
Great info, would you mind to share your method?
The answer to both your questions is yes.
Then this is really nice. All Rigol hackers please take a look at this one!
I actually can't because I'm a distributor of Siglent (and Rigol) test gear. Sorry for that.
But don't worry, there are many talented guys who will figure out soon. My guess is, that these units will quickly become very popular due its hackability (like Rigol units).
Small hint: read tinhead's thread;)
I actually can't because I'm a distributor of Siglent (and Rigol) test gear. Sorry for that.
I only can recommend Drieg as a distributor/reseller for Rigol and Siglent devices. I know him for years now. He is always very helpful (even months or years after the purchase!) and can help you whenever EVERY other reseller can't. So if you want to purchase such stuff, ask him for a quote.
Does it have telnet?
You know what I'm thinking here...
Some kind of telnet prompt from LAN port? In shadow may be DES / crypt(3) root password.
Some kind of telnet prompt from LAN port? In shadow may be DES / crypt(3) root password.
Yes, telnet deamon is active - see screenshot.
But I do not know how to proceed from here.
They didn't remove the banner? Maybe they kept the default Arago password as well: root
They didn't remove the banner? Maybe they kept the default Arago password as well: root
I am not a hacker, but of course I already tried this (and some other) most obvious password without success.
You can try crack this from SSA3000X_D07P03.ADS
xE062W/htPFyU
UNIX descrypt