Author Topic: Hacking the Rigol DHO800/900 Scope  (Read 1670681 times)

0 Members and 8 Guests are viewing this topic.

Offline Randy222

  • Frequent Contributor
  • **
  • Posts: 710
  • Country: ca
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1025 on: January 26, 2024, 06:59:22 pm »
Here is the GitHub Repo with the "Android-Keys" program I used to discover the keycodes.

https://github.com/stephenhouser/Android-Keys
Just for clarity, keyboard keys, and not "keys" used for lics.
Cool. Thanks.
 

Offline 0xACE

  • Newbie
  • Posts: 7
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1026 on: January 26, 2024, 07:37:52 pm »
Yes! Keyboard keycodes. not license keys
 
The following users thanked this post: AceyTech

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1027 on: January 26, 2024, 08:02:30 pm »
Here is the GitHub Repo with the "Android-Keys" program I used to discover the keycodes.

https://github.com/stephenhouser/Android-Keys
Just for clarity, keyboard keys, and not "keys" used for lics.
Cool. Thanks.
Usually, GitHub projects have a readme when you click the link, that tells what it's for.

Here is the GitHub Repo with the "Android-Keys" program I used to discover the keycodes.
@0xACE Thanks for sharing the link.  Saved me having to ask.  8)
« Last Edit: January 26, 2024, 10:11:33 pm by AceyTech »
 

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1028 on: January 26, 2024, 08:10:50 pm »
With all the hacking stuff, I think I will try to P-V the dho804, then get that to load into vmware workstation.
Or, install the same droid OS in VMware, then copy over all the additional Rigol stuff from the dho into the guest droid OS.
Will make poking around much easier.

Has anyone booted the DHO from a bootable USB stick?

Please keep us apprised of your progress.  I'm really interested in USB booting, especially regarding boot speed, etc. and virtualization might be a nice environment to experiment in.
 

Offline cte

  • Contributor
  • Posts: 16
  • Country: de
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1029 on: January 26, 2024, 08:29:25 pm »
I wonder what URL I have to block to get rid of the red dot.

Request was like this:

Code: [Select]
https://spiderapi.rigol.com/api/Support/ProductUpgradeFile?sn=DHO8AXXXXXXXXX&hardware=1.0&behaviour=soft&software=00.01.01

This is shown in adb logcat

UPDATE: Just noticed this was already answered...  ::)
« Last Edit: January 26, 2024, 08:31:43 pm by cte »
 
The following users thanked this post: AceyTech

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1030 on: January 27, 2024, 12:35:10 am »
If you're going to poke around, add a watch with a date in the lower right corner, like in the 1000 series.... ^-^

Problem: Only DHO8/9 scopes with access to a NTP server could take advantage of the date/clock function, since these don't have a RTC  battery... 

...Yet  ;)
(cough: Pin 9, PMIC. /cough)
« Last Edit: January 27, 2024, 10:04:02 am by AceyTech »
 
The following users thanked this post: cte

Online Fungus

  • Super Contributor
  • ***
  • Posts: 17149
  • Country: 00
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1031 on: January 27, 2024, 03:30:18 am »
I wonder what URL I have to block to get rid of the red dot.

Request was like this:

Code: [Select]
https://spiderapi.rigol.com/api/Support/ProductUpgradeFile?sn=DHO8AXXXXXXXXX&hardware=1.0&behaviour=soft&software=00.01.01

This is shown in adb logcat

UPDATE: Just noticed this was already answered...  ::)

But with a different URL:

Code: [Select]
http://support.rigol.com/api/Support/ProductUpgradeFile?sn=<serialnumber>&hardware=1.0&behaviour=soft&software=00.01.01
 

Offline cte

  • Contributor
  • Posts: 16
  • Country: de
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1032 on: January 27, 2024, 10:16:54 am »
Ok, sorry for the confusion. I just checked with Wireshark:

The initial update check is addressed to support.rigol.com.
The actual firmware image file would apparently be loaded from spiderapi.rigol.com.

NTP is queried from asia.pool.ntp.org

Additionally, I had two connection attempts to 192.168.1.143:2300 which is not a valid destination within my network...
« Last Edit: January 27, 2024, 10:21:21 am by cte »
 
The following users thanked this post: AceyTech

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1033 on: January 27, 2024, 10:31:07 am »

Additionally, I had two connection attempts to 192.168.1.143:2300 which is not a valid destination within my network...

Thanks for doing that. 
So if I'm reading this right; you're on a different private IP space than the "de facto" 192.x, but the scope is trying to reach a "hard coded" private NAT address?
« Last Edit: January 27, 2024, 10:43:39 am by AceyTech »
 

Offline cte

  • Contributor
  • Posts: 16
  • Country: de
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1034 on: January 27, 2024, 10:48:19 am »

Additionally, I had two connection attempts to 192.168.1.143:2300 which is not a valid destination within my network...

Thanks for doing that. 
So if I'm reading this right; you're on a different private IP space than the de facto 192.x, but the scope is trying to reach some "hard coded" private NAT addresses?

Yes, indeed. I just tried to configure a device at this address and look at the communication, but this failed cause the Rigol itself uses my DHCP assigned subnet, and the Mikrotik router doesn't know where to route this request to. I'm reluctant to reconfigure any router settings... It would be better to set up some isolated network with a Raspberry Pi or anything alike. Not sure if I find the time this weekend to do this, but I'm curious now...
 
The following users thanked this post: AceyTech

Offline S2084

  • Regular Contributor
  • *
  • Posts: 80
  • Country: cz
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1035 on: January 27, 2024, 11:03:57 am »
If you're going to poke around, add a watch with a date in the lower right corner, like in the 1000 series.... ^-^

I managed to do this using a third-party program "Status Bar Mini PRO"

Online RAPo

  • Frequent Contributor
  • **
  • Posts: 772
  • Country: nl
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1036 on: January 27, 2024, 11:51:56 am »
Please elaborate a bit more.
How to install Status Bar Mini PRO
Can it be moved to righttop off the screen?

I managed to do this using a third-party program "Status Bar Mini PRO"
 

Offline S2084

  • Regular Contributor
  • *
  • Posts: 80
  • Country: cz
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1037 on: January 27, 2024, 12:02:27 pm »
Please elaborate a bit more.
How to install Status Bar Mini PRO
Can it be moved to righttop off the screen?

I managed to do this using a third-party program "Status Bar Mini PRO"
Just enter a query with the name of the program in a search engine, you will immediately be offered links to download the apk file, install the downloaded apk in your skope.  You can place the date and time display in any area of ​​the screen, you can also choose the color and font size, this program is very flexible in settings.  Go for it!!!
 
The following users thanked this post: thm_w, RAPo, AceyTech

Offline cte

  • Contributor
  • Posts: 16
  • Country: de
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1038 on: January 27, 2024, 01:02:45 pm »
Now this was quite some fun to setup... 8)



Apparently, Rigol is contacting 192.168.1.143 for Android OTA updates...

Code: [Select]
bofh@raspberrypi:~ $ sudo ip addr add 192.168.1.143/22 dev eth0.666
bofh@raspberrypi:~ $ nc -l -s 192.168.1.143 -p 2300
HEAD /OtaUpdater/android?product=rk3399_rigol&version=1.0.0&sn=RW8GIY5R55&country=US&language=en HTTP/1.1
Host: 192.168.1.143:2300
Connection: Keep-Alive
User-Agent: rk29sdk/4.0

bofh@raspberrypi:~ $
 
The following users thanked this post: zrq, eklein, AceyTech

Online Fungus

  • Super Contributor
  • ***
  • Posts: 17149
  • Country: 00
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1039 on: January 27, 2024, 01:18:34 pm »
Apparently, Rigol is contacting 192.168.1.143 for Android OTA updates...

Maybe Rigol's internal server for devs to push out updates...
 

Offline S2084

  • Regular Contributor
  • *
  • Posts: 80
  • Country: cz
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1040 on: January 27, 2024, 05:57:04 pm »
I wish every scope would allow an individual color selection for each channel. Though, very few does unfortunately.

By the way, LeCroy has a paid option... :-DD :-DD :-DD

Online RAPo

  • Frequent Contributor
  • **
  • Posts: 772
  • Country: nl
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1041 on: January 27, 2024, 05:58:31 pm »
Weel shall we mail Rigol with this idea? An option for Eu20,-- is a cashcow.

I wish every scope would allow an individual color selection for each channel. Though, very few does unfortunately.

By the way, LeCroy has a paid option... :-DD :-DD :-DD
 
The following users thanked this post: S2084

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1042 on: January 28, 2024, 06:11:23 am »
Now this was quite some fun to setup... 8)

Apparently, Rigol is contacting 192.168.1.143 for Android OTA updates...

Code: [Select]
bofh@raspberrypi:~ $ sudo ip addr add 192.168.1.143/22 dev eth0.666
bofh@raspberrypi:~ $ nc -l -s 192.168.1.143 -p 2300
HEAD /OtaUpdater/android?product=rk3399_rigol&version=1.0.0&sn=RW8GIY5R55&country=US&language=en HTTP/1.1
Host: 192.168.1.143:2300
Connection: Keep-Alive
User-Agent: rk29sdk/4.0

bofh@raspberrypi:~ $

That's so awesome, thanks for confirming that.  Seems like a silly thing for the devs to overlook.  And, given that they're targeting a specific port#, I agree with @Fungus that it's probably an internal server.
 
The following users thanked this post: cte

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1043 on: January 28, 2024, 08:24:40 pm »
I managed to do this using a third-party program "Status Bar Mini PRO"

Looks like you also modified the fonts as well.  Did you do that with Status Bar Mini Pro as well?  If so, It's worth the $3us to me.
  Edit: Looks like the font modifying program was mentioned in the "Unbox" thread, sorry.

It's probably a bit peevish of me, but I would love to change the font on the "Auto" in the upper left corner so the "O" isn't wrapped around to the second line in the box.  I know it's a bargain scope, and maybe users have filed a bug report, but it just looks silly and unprofessional.
« Last Edit: January 28, 2024, 10:44:26 pm by AceyTech »
 

Offline ebastler

  • Super Contributor
  • ***
  • Posts: 6923
  • Country: de
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1044 on: January 28, 2024, 08:44:15 pm »
I would love to change the font on the "Auto" in the upper left corner so the "O" isn't wrapped around to the second line in the box.  I know it's a bargain scope, and maybe users have filed a bug report, but it just looks silly and unprofessional.

Filing a bug report (with Rigol) on a hack is probably not going to be effective.  :)
The original font fits into its allotted space without a line break, I believe.
 

Offline S2084

  • Regular Contributor
  • *
  • Posts: 80
  • Country: cz
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1045 on: January 28, 2024, 08:52:12 pm »
I managed to do this using a third-party program "Status Bar Mini PRO"

Looks like you also modified the fonts as well.  Did you do that with Status Bar Mini Pro as well?  If so, It's worth the $3us to me.

It's probably a bit peevish of me, but I would love to change the font on the "Auto" in the upper left corner so the "O" isn't wrapped around to the second line in the box.  I know it's a bargain scope, and maybe users have filed a bug report, but it just looks silly and unprofessional.

I changed the font with the program "FontFix 4.9.0", the font name is "comfortaa", in some places the text does not fit on one line because I increased the font scale in the android system settings... It’s more convenient for me.If you don’t change the font scale in the system, everything will fit....
 
The following users thanked this post: AceyTech

Offline AceyTech

  • Regular Contributor
  • *
  • Posts: 194
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1046 on: January 28, 2024, 11:02:19 pm »
I would love to change the font on the "Auto" in the upper left corner so the "O" isn't wrapped around to the second line in the box.  I know it's a bargain scope, and maybe users have filed a bug report, but it just looks silly and unprofessional.

Filing a bug report (with Rigol) on a hack is probably not going to be effective.  :)
The original font fits into its allotted space without a line break, I believe.
Confirmed.  I guess I saw so many screenshots recently with the wrap around, and mine was back in the box, I thought it was systemic.
And yeah, that wouldn't be prudent to file with Rigol. ;)
 

Offline Randy222

  • Frequent Contributor
  • **
  • Posts: 710
  • Country: ca
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1047 on: January 29, 2024, 02:59:18 pm »
Now this was quite some fun to setup... 8)

(Attachment Link)

Apparently, Rigol is contacting 192.168.1.143 for Android OTA updates...

Code: [Select]
bofh[member=125346]raspberrypi[/member]:~ $ sudo ip addr add 192.168.1.143/22 dev eth0.666
bofh[member=125346]raspberrypi[/member]:~ $ nc -l -s 192.168.1.143 -p 2300
HEAD /OtaUpdater/android?product=rk3399_rigol&version=1.0.0&sn=RW8GIY5R55&country=US&language=en HTTP/1.1
Host: 192.168.1.143:2300
Connection: Keep-Alive
User-Agent: rk29sdk/4.0

bofh[member=125346]raspberrypi[/member]:~ $
These commands are seen on the DHO ?
Not making sense to me.
sudo ip addr add 192.168.1.143/22 dev eth0.666 binds ipv4 address with /22 mask to sub iface 666 on eth0

nc -l -s 192.168.1.143 -p 2300 , at least in combo with ip add, this nc seems to be setting up a local tcp socket listener on port 2300

So how does this facilitate an OTA update?

 

Offline mwb1100

  • Frequent Contributor
  • **
  • Posts: 530
  • Country: us
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1048 on: January 29, 2024, 04:27:21 pm »
These commands are seen on the DHO ?

No. These commands are being run on a raspberry pi.  They set up a listener on that IP address so that when the DHO tries to connect to it, the raspberry will display the request that the DHO makes.
 
The following users thanked this post: AceyTech

Offline Randy222

  • Frequent Contributor
  • **
  • Posts: 710
  • Country: ca
Re: Hacking the Rigol DHO800/900 Scope
« Reply #1049 on: January 29, 2024, 04:43:34 pm »
These commands are seen on the DHO ?

No. These commands are being run on a raspberry pi.  They set up a listener on that IP address so that when the DHO tries to connect to it, the raspberry will display the request that the DHO makes.
Ahhh. Makes sense now.

Just run filter on wireshark looking for the ARP who-has and DNS requests. Maybe see even more odd attempts from the DHO to reach out.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf