| Products > Test Equipment |
| Siglent .ads firmware file format |
| << < (83/85) > >> |
| tv84:
--- Quote from: blurpy on October 09, 2021, 11:01:21 am ---It's interesting to find out the password, but as a start you could possibly just skip it as well. --- Code: ---/usr/sbin/telnetd -l /bin/sh --- End code --- --- End quote --- I'm getting old... :palm: Nonetheless, the shadow file would be interesting. |
| luudee:
Thanks so much, guys, very much appreciated !!! I can now telnet in to my sds5000, with the latest firmware installed. This is the shadow password file: root:$6$qWDH15y1$JmmNaT8CddB4GCKIRtcel4fv5TavNr1CFZcYC2iLD6OaoVsDXIbV76S2JEmSBJ54kYrAreEBjWTJL8XIKUuu70:0:0:99999:7::: Cheers, rudi |
| luudee:
ohh crap, they changed the way licensing works :( Last time I did, I had just modify one file (NSP_system_info.xml) and add the license key to it. Now, they use two files for each option: ---x------ 1 root 0 20 Jun 5 2020 options_pa_cfg.bin ---x------ 1 root 0 20 Jun 5 2020 options_pa_license.txt The text file seems to have a license key, which does not match what I am generating with the python script anymore. And the binary file has 20 bytes, of which the first 16 are identical between all option*.bin file, only the last 6 bytes differ ... Any clues how to generate these ? Many Thanks, luudee |
| tv84:
It's the same scheme. You must be making mistake. Switch to SDS5000X thread. |
| luudee:
Thanks guys, I figured it out ... was using a old python script, after looking thought the changes, I figured it out. Please let me know if I can be of any help to you guy ! Cheers, rudi |
| Navigation |
| Message Index |
| Next page |
| Previous page |