Yes that's right, I think pros in here don't have a new unit to dig inside. Maybe I should send mine to
By the way, I'm playing with new 2.3fw E4 and it looks like I can not even understand the encryption in it
, (I'm a vet who likes to open gadgets and trying to be a midnight cave engineer
).
So let me give my primitive observations from my experiences for last 2 weeks:
By the help of Thomas (TurboTom) i could reach file system at least. "1235" Eeprom pasword is not working in my device with web service of device(But Thomas's device was updated old device and he could use that password to reach Eeprom settings). Now I'm trying to make a Brute Force attack to Eeprom Unlock screen with "Burp Suite". My problem is; Burp is sending passwords but reaction from web service is not look like returning with any answer. I'm using number wordlists etc with 4-5-6 character combinations. Is it possible other letter characters to be in EEPROM Unlock password?
If anyone knows the best way to make Brute Force attack to web based EEPROM setting screen I would appreciate the advice.
Maybe you can think "why to unlock Eeprom?". Reason is; I want to try changing E4 name to E8 and make a update if it works.
Tugbay