Esato Mobile
Sony Ericsson / Sony : Software, Firmware and Drivers : DB2010 hacking research
> New Topic
> Reply
< Esato Forum Index > Sony Ericsson / Sony > Software, Firmware and Drivers > DB2010 hacking research Bookmark topic
ikee Posts: 1

Hi,

I want to read the raw FLASH of DB2010 phones.
Because of that I am investigating the DB2010 hacking tools like SETOOL, SEFP, JDFlasher, and trying to understand how they works.

I have K500 phone with CID 29. I see that those tools sends 2 bootloaders that signed:
db2010_CID00_R2F_id and db2010_CID00_R2E_cert.
after that they able to send unsigned bootloader of name: hendrixR2Eldr.

What exactly the weakness here? how its possible to send unsigned code that accepted?
I am reverse-engineering the bootloaders and trying to understand the code behind of it.
Somebody know about it that we can share information?

Thanks,
Ikee.
--
Posted: 2009-08-20 12:41:14
Edit : Quote

New Topic   Reply
Forum Index

Esato home