mat h wrote: > the only thing that i know is that you can wipe it by shorting pins.(i > used that to wipe my router) > I did a little experimentation with corrupt images, but with no avail > no buffer overflow. > Maybe if you corrupt the file system?
More or less this is what we should do, but the corruption should be intentional and meant to run a piece of code that we would have injected in the memory. For now, some of us are learning about the embedded iTunes part of the iPod to get a clue on how to twist the software in a way that allows us to get some code executed. Regards -- Emmanuel Fleury David: Is it a game... or is it real ? Joshua: What's the difference ? -- WarGames (L. Lasker and W.F. Parkes) _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
