mounting jffs2

 code, embedded, hack, tech  Comments Off on mounting jffs2
Nov 232012
 

After mounting a bunch of filesystems I thought I’d just whip up a little shell script to help me out when working with jffs2 images, mtd, and linux (only tested on centos 6.) I won’t go over how to get kernel support and all that crap – there are many guides, and while many won’t work eventually something will for you too ;( This one is fairly simple to […]

avctpasswd

 code, hack, ipmi, python, security, tech  Comments Off on avctpasswd
Nov 112012
 

Since I didn’t find it anywhere else… Avocent, who makes a heck of a lot of BMCs, and at times (like with Dell’s iDRAC, at least version 6) keeps encrypted passwords in (well, quite possible/probable OEM dependent) “/flash/data0/etc/avctpasswd” (don’t be fooled by the /etc/passwd file) using SHA1 hashed passwords converted into Base64. I surmise this file is used to protect the real passwords that are stored in clear text […]

… passwords in shell scripts….

 code, ipmi, security  Comments Off on … passwords in shell scripts….
Nov 112012
 

Looking at a file (manuf_sign_cert.sh): # This script is run on every iDRAC at manufacturing time. # to create a certificate with a derived CN using the # service tag so it can be authenticated by a provisioning server # for zero touch deployment. # # Files used: # 1) d_h_ssl_manuf.cnf # 2) ROOTCAPK.PEM (loaded by mdiags via dynamic partition) […] ENCRYPTED_CA_PRIV_KEY=”/tmp/MFGDRV/ROOTCAPK.PEM” […] #decrypt the signing key if ! […]

 Posted by at 4:58 pm on November 11, 2012