如果有哪位大神有更好的方法,也請(qǐng)不吝指教。
國(guó)外xdaforums上信息:
The presence of the "load key from misc" line, and the date of uboot on this device, means that this skyworth bootloader is using v2 of the backdoor system.
check_udisk.cfg is still read on usb, but then it also checks for a key (that is individualized to the SoC chipid) in a file in /skyworth/key.
If you add that /skyworth/key folder on the usb flash drive, it will create an empty file *.bin, where * is your chipid.
Unfortunately the actual key is 16 bytes rsa encrypted.
The key can enable each mode of the backdoor system individually depending on how it is encoded.
Code:
dump key:
- chip id:
- usage:COPY_KEY,FASTBOOT,BURNING,UPDATE,DOWNGRADE,AUTOSCRIPT,RECOVERY,CONSOLE |