Also, pretty cool method for booting the host, I'd been trying to do so by sending the right values to the PMC but hadn't yet got it to work. (I can power up the CPU to the point where it appears on the JTAG scan chain but not actually boot it.)
-
-
-
Ah, that's really interesting for me too, because I was looking into trying to power on things using PMC because I can't access USB while main CPU is off. I gave up quickly on that though. Would be cool if you shared it.
- Još 1 odgovor
Novi razgovor -
-
-
oh man, this was sexy af!
-
haha, thanks! Wait, you're talking about me or the article? :p How have you been Zlatan? :)
- Još 1 odgovor
Novi razgovor -
-
-
Nice, you beat me to it :) I guess I'll dump my code for the exploit as well.
-
Here's what I have been using: https://github.com/peterbjornx/me_sa86_exploit … , will publish my writeup later. Also doubting whether to release my ME hardware docs before or after 36C3
Kraj razgovora
Novi razgovor -
-
-
An excellent explanation. Thank you very much for sharing your achievements. I am anxious to try everything I learned with you.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Tweet je nedostupan.
-
Sure, as long as it credits me and links back to the original english article, no problem. Thank you for asking! :)
- Još 1 odgovor
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.