安网R700W四WAN口编程器固件(疑似维盟FBM260W)
https://cloud.189.cn/t/fUzURrjiIf6b (访问码:g3zf)麻烦老哥帮忙分析一下是我那个环节出错了,为什么没有解压出文件系统
分区表:
Creating 7 MTD partitions on "raspi":
0x000000000000-0x000000800000 : "ALL"
0x000000000000-0x000000030000 : "Bootloader"
0x000000030000-0x000000040000 : "Config"
0x000000040000-0x000000050000 : "Factory"
0x000000050000-0x0000007b0000 : "Kernel"
0x0000007b0000-0x0000007f0000 : "modules"
0x0000007f0000-0x000000800000 : "buginfo"
第一步:自动分析编程器固件
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk r700-3-ok.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
85280 0x14D20 U-Boot version string, "U-Boot 1.1.3 (Jan8 2014 - 23:27:14)"
196620 0x3000C gzip compressed data, maximum compression, from Unix, last modified: 2022-10-27 07:11:24
327680 0x50000 uImage header, header size: 64 bytes, header CRC: 0xE0CCD185, created: 2016-08-30 20:40:46, image size: 7503026 bytes, Data Address: 0x80000000, Entry Point: 0x8000C2F0, data CRC: 0xEF572D3B, OS: Linux, CPU: MIPS, image type: OS Kernel Image, compression type: lzma, image name: "Linux Kernel Image"
327744 0x50040 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
第二步:截取出内核文件
在地址为0x50040位置开始截取7503025(7503026-1得出)个字节,得到lzma格式压缩的内核,保存文件名为kernel.bin
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk kernel.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
第三步:使用binwalk自动解压,没有解压出文件
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk -Me kernel.bin
Scan Time: 2022-11-07 19:32:17
Target File: /mnt/e/ubuntu/wayos/kernel.bin
MD5 Checksum:c51dd6e3805cd54acdef579f38938825
Signatures: 391
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 LZMA compressed data, properties: 0x5D, dictionary size: 33554432 bytes, uncompressed size: 10598816 bytes
Scan Time: 2022-11-07 19:32:19
Target File: /mnt/e/ubuntu/wayos/_kernel.bin.extracted/0
MD5 Checksum:74a6a109ac7e2a1b7e21198bd86ca5a1
Signatures: 391
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
3612744 0x372048 Linux kernel version 2.6.36
3800960 0x39FF80 CRC32 polynomial table, little endian
3823664 0x3A5830 Base64 standard index table
4127268 0x3EFA24 xz compressed data
4151360 0x3F5840 Unix path: /var/run/udhcpc.pid
4202856 0x402168 HTML document header
4203186 0x4022B2 HTML document footer
4203304 0x402328 HTML document header
4203365 0x402365 HTML document footer
4206092 0x402E0C HTML document header
4206284 0x402ECC HTML document footer
4206448 0x402F70 HTML document header
4206817 0x4030E1 HTML document footer
4208424 0x403728 HTML document footer
4231419 0x4090FB Neighborly text, "neighbor %.2x%.2x.%pM lostde"
第四步:尝试使用unlzma解压
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ cp kernel.bin kernel.lzma
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ unlzma kernel.lzma #这一步骤倒是没有报错,执行后新生成一个kernel文件大小10.1M,原来截取的kernel.bin是7.15M
第五步:分析一下unlzma命令执行后新生成的文件kernel,,,后续不知道该怎么进行了。
hudengke@PCOS-2022TQKDLL:/mnt/e/ubuntu/wayos$ binwalk kernel
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
3612744 0x372048 Linux kernel version 2.6.36
3800960 0x39FF80 CRC32 polynomial table, little endian
3823664 0x3A5830 Base64 standard index table
4127268 0x3EFA24 xz compressed data
4151360 0x3F5840 Unix path: /var/run/udhcpc.pid
4202856 0x402168 HTML document header
4203186 0x4022B2 HTML document footer
4203304 0x402328 HTML document header
4203365 0x402365 HTML document footer
4206092 0x402E0C HTML document header
4206284 0x402ECC HTML document footer
4206448 0x402F70 HTML document header
4206817 0x4030E1 HTML document footer
4208424 0x403728 HTML document footer
4231419 0x4090FB Neighborly text, "neighbor %.2x%.2x.%pM lostde"
是可以刷成维盟 用编程器刷,固件去维盟官方下去掉固件头在breed上刷 cwx88cwx 发表于 2022-11-7 21:15 static/image/common/back.gif
是可以刷成维盟 用编程器刷,固件去维盟官方下去掉固件头在breed上刷
好的,老哥。明天试试。能帮忙看看我现在的这个问题是出在那里吗?根据uimag提取出来的内核解压不了文件系统
cwx88cwx 发表于 2022-11-7 21:15 static/image/common/back.gif
是可以刷成维盟 用编程器刷,固件去维盟官方下去掉固件头在breed上刷
老哥今天测试了,我从编程器固件中提取了维盟的内核在breed刷入公版布局的可能启动维盟系统,但是不能软重启。要像重启必须断电重启否则无法启动系统
维盟的固件是有授权文件的,硬路由每台授权独立,即使你写入成功启动,相同的一个固件刷在多台设备一段时间就会被列为黑名单
页:
[1]