Apparently traditional zip encryption can be broken using a known-plaintext attack. (bk)Cracking it ⌗Īt this point I started researching other tools or services I might be able to use. I also attempted to use some of my wordlists, but that also failed. I attempted to brute force the password up to 8 characters since that is what my system could do in a reasonable amount of time, but that didn’t work. I wasn’t totally discouraged though, I already had some tools on my PC like John The Ripper and Hashcat which could be used to brute force zip passwords. The update was looking promising, I attempted to extract the system image and Looking inside the system_package zip, it appears it contained the firmware for the various modules in the IVI like the GPS and HD Radio, as well as the system image itself. The logs are transfered to the USB in one big tar.gz named “daudio2.0v_.zip. The logs turned out to be a treasure trove of information on how the IVI works under the hood. :( I eventually found out this settings doesn’t really do anything. I connected my phone with wireless Android Auto to get on the IVI’s Wi-Fi network and tried to port scan the device, but I was not able to find any open ADB port. Using these settings I gathered a bunch of logs onto my USB drive and attempted to use ADB to connect to the IVI.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |