Author Topic: Siglent SDS5000X Oscilloscope Hack status - Dec 2021  (Read 12748 times)

0 Members and 1 Guest are viewing this topic.

Offline Detlef

  • Newbie
  • Posts: 1
  • Country: de
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #50 on: April 05, 2024, 12:30:29 pm »
Allow me to introduce myself: I’m a retired engineer. My former profession has been software and hardware design, mostly for embedded microcontrollers, which is still my hobby, among general electronic design.

A few month ago, I have bought a Siglent SDS5054X oscilloscope. Although I don’t even need the built-in features, this instrument offers, for academic purposes, I am interested in some “enhancements”.

Well ladies and gentlemen, is there any functioning hack like the old Python script (which doesn’t work anymore) - and if so, how can I get it. And of course, I would keep it secret. My e-mail address is deposited with my account…
 

Offline IM3

  • Contributor
  • Posts: 33
  • Country: nl
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #51 on: July 23, 2024, 02:25:39 pm »
Let's see if the UART on my SDS5034X is accessible.

To do this, I will need to open the device first. I wanted to avoid damaging the 'calibration void' sticker. You can easily remove this sticker by following the instructions in the following thread:

https://www.eevblog.com/forum/blog/eevblog-799-how-to-remove-warranty-void-security-stickers/

First, let me emphasize that opening such devices should always be done in an ESD-safe manner. Be aware that even just lifting yourself off your chair can generate ten's of kilovolts of static charge. A tiny spark of 100 volts can damage your expensive equipment, sometimes not immediately, but maybe after a year due to latent damage. So, be careful!

That's why you need an ESD mat, ideally in a vibrant red color (RGB 255-0-0).

After removing the back cover, the power supply needs to be unscrewed first because of disconnect a few connectors. Only then can you access the main board.

It turns out the UART connector is not populated on the main board. There is no Jedec header present. Wires need to be soldered to the pads for GND, TX, and RX. Do not connect VCC, as this would introduce supply voltage from two sources and that is never a good thing.

So now you can connect a PC to the UART via a USB to Serial converter, and you'll have a connection. (Baudrate 115200, 8N1).

But then comes the real challenge: Username and Password.

There is a lot of old discussion on EEVBlog about this, and some believe there is only one password. That is definitely not the case. Passwords can change per device and even per firmware version.

For a long time, the username was 'root'. The password used to be a combination of the manufacturer's name and the device name, so here it would be 'siglent_sds5000x'.

Unfortunately, this is not the case anymore. I've tried at least 100 different combinations, but the story seems to end here quickly.

Does anyone have any suggestions?    (Except for screwing everything back together.)
 

Offline IM3

  • Contributor
  • Posts: 33
  • Country: nl
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #52 on: August 10, 2024, 07:56:38 pm »
Alright, the experiment with the UART has not been successful so far. Those pesky passwords!

The ultimate goal is still to liberate my SDS5000X.

I’ve tried experimenting with JTAG as well, but that’s not straightforward either. (for me)
A Lattice FPGA is visible in the JTAG communication. Thanks to tv84 for the support with that. This FPGA is located on the main board, right next to the JTAG header (see photos 1 and 2).

The processor on a separate PCB hasn’t been detected yet. (Xilinx XC7Z020) I need a mem-dump on that processor to get any further.

What I find strange on the processor board is the J2 connector. (foto 3 ) It’s labeled as NAND and JTAG. Does anyone have an idea what that might be? I will try to measure activity on those pins.
 

Offline 44kgk1lkf6u

  • Contributor
  • Posts: 37
  • Country: 00
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #53 on: August 12, 2024, 02:11:16 pm »
You can see that the leftmost hole is ground.  I guess that it is intended for a jumper.  Shorting the center to the left makes the chip boot from the NAND flash.  Shorting the center to the right makes the chip boot from JTAG.  The right hole may not be connected at all, that is, it is only there to rest the jumper.  You can see if the hole is connected by measuring the diode drop from ground to it.  In the finished product there may be a resistor to make it always boot from the flash.  Some document for the chip should say how it works.
 
The following users thanked this post: rfindley

Offline IM3

  • Contributor
  • Posts: 33
  • Country: nl
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #54 on: August 15, 2024, 12:45:18 pm »
What I know so far:

Indeed, one of the pins on the 3-pin connector is ground.
The middle pin transmits unknown data during boot and shutdown. The bit time is 200ns, measured with an oscilloscope.
The third pin is always low; it might be an input...?

The CPU board also features two USB3320 Hi-Speed USB Transceivers, and there is also a DS83848 Ethernet Transceiver. They are close to the 3-pin header.

I was hoping to easily memdump the CPU but now I'm not sure if this is the right path that will lead me to liberating the SDS5000X.

I have not enough knowledge of this as well.

Maybe others find this usefull data to get any further.
 

Offline 44kgk1lkf6u

  • Contributor
  • Posts: 37
  • Country: 00
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #55 on: August 18, 2024, 01:15:01 pm »
I was not expecting data to be transmitted on the pin.  I thought the boot select pin was an input.  What kind of chip is the header connected to?  Do you still have the capture of the waveform saved?  Do you know if the third pin is connected to anything?  I am sorry that I can not answer the questions myself.  I don't have the device.
 

Offline IM3

  • Contributor
  • Posts: 33
  • Country: nl
Re: Siglent SDS5000X Oscilloscope Hack status - Dec 2021
« Reply #56 on: August 18, 2024, 04:19:52 pm »
No, this is what I have.

The photos show which chips are on the PCB. The pin that stays low might be an input, but on this multilayer PCB, I can't trace where it leads.

Additionally, I don't want to risk damaging the board by randomly applying voltages to these logic inputs with a multimeter. The potential for damage is not worth the risk to me. I am already far outside my comfort zone with this scope disassembly. It’s brand new, and I still remember what I paid for it.

Initially, I hoped to establish a connection with the CPU via a JTAG interface so that I could create a memory dump. After that, other experts might be able to generate the keys to liberate this scope.

But unfortunately, the CPU doesn’t appear in the JTAG chain.

I think this is where it ends for me, and I’ll just put everything back together neatly.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf