mat h wrote:
> the only thing that i know is that you can wipe it by shorting pins.(i
> used that to wipe my router)
>  I did a little experimentation with corrupt images, but with no avail
> no buffer overflow.
> Maybe if you corrupt the file system?

More or less this is what we should do, but the corruption should be
intentional and meant to run a piece of code that we would have injected
in the memory.

For now, some of us are learning about the embedded iTunes part of the
iPod to get a clue on how to twist the software in a way that allows us
to get some code executed.

Regards
-- 
Emmanuel Fleury

David:  Is it a game... or is it real ?
Joshua: What's the difference ?
  -- WarGames (L. Lasker and W.F. Parkes)

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to