´Ù¿î±×·¹ÀÌµå ½ÃµµÇÏ´Ù°¡ ½ÇÆÐÇÏ°í ¾Æ¿¹ ÄÑÁöÁö ¾Ê´Â º®µ¹ÀÌ µÇ¹ö·È½À´Ï´Ù
¸î¸î ±ÛÀ» ÀоîºÃ´Âµ¥ ½Ã¸®¾ó°ü·Ã ¹®Á¦¸¸ ÀÖ¾úÁö rpmb°ü·ÃÇÑ ±ÛÀº ¾ø´õ¶ó±¸¿ä ¤Ð¤Ð
¾î¶»°Ô ÇؾßÇÒ±î¿ä?
¹æ±Ý ¹ß°ßÇѰǵ¥ ¼îÆ®°¡ µÇÁö¾Ê¾Æµµ ¿¡·¯¸Þ½ÃÁö°¡ ¶ßÁö ¾Ê°í ÁøÇàÀ̵Ǵøµ¥ ÀÌ°Ô ¹®Á¦Àϱî¿ä?
mint@mint:~/¹®¼/unbrick_suez$ sudo ./bootrom.sh [2020-10-27 22:19:51.673272] Waiting for bootrom [2020-10-27 22:21:16.496912] Found port = /dev/ttyACM0 [2020-10-27 22:21:16.497311] Handshake [2020-10-27 22:21:16.501230] Disable watchdog
* * * Remove the short and press Enter * * *
[2020-10-27 22:21:31.221685] Init crypto engine [2020-10-27 22:21:31.385294] Disable caches [2020-10-27 22:21:31.388279] Disable bootrom range checks [2020-10-27 22:21:31.492287] Load payload from ../brom-payload/build/payload.bin = 0x45D0 bytes [2020-10-27 22:21:31.494705] Send payload [2020-10-27 22:21:35.967260] Let's rock [2020-10-27 22:21:35.972262] Wait for the payload to come online... [2020-10-27 22:21:43.000399] all good [2020-10-27 22:21:43.000602] Check GPT [2020-10-27 22:21:44.311878] gpt_parsed = {'proinfo': (1024, 6144), 'PMT': (7168, 9216), 'kb': (16384, 2048), 'dkb': (18432, 2048), 'lk': (20480, 2048), 'tee1': (22528, 10240), 'tee2': (32768, 10240), 'metadata': (43008, 80896), 'MISC': (123904, 1024), 'reserved': (124928, 16384), 'boot': (141312, 32768), 'recovery': (174080, 34816), 'system': (208896, 3306496), 'cache': (3515392, 868352), 'userdata': (4383744, 56687583), '': (0, 1)} [2020-10-27 22:21:44.311995] Check boot0 [2020-10-27 22:21:45.508417] Check rpmb [2020-10-27 22:21:45.717800] rpmb looks broken; if this is expected (i.e. you're retrying the exploit) press enter, otherwise terminate with Ctrl+C
|
¸®Ä¿¹ö¸®¸ðµå¿¡ ÁøÀÔ¸¸ ÇÏ¸é º¹±¸´Â °¡´ÉÇÒ °Í °°Àºµ¥ ¾ÈµÈ´Ù¸é ¸ð¸£°Ú³×¿ä
¾Æ¿¹ Àü¿øÀÌ ¾Èµé¾î¿À´õ¶ó±¸¿ä