"The hack is quite simple. The Linux system running on the scope has a default root password of, you guessed it, “root”."
https://twitter.com/hackaday/status/1075496258159108096 …
-
-
-
Replying to @matthewvenn
That's been my working theory on previous similar security rigol licensing fckups (such as super short EC key length for license keys). I bought my DS2072 in part because I could unlock extra features using the hacks. But root/root!? That's just too stupid to be on purpose imo.
2 replies 1 retweet 3 likes -
Replying to @oe1cxw @matthewvenn
Or maybe they don't really care -- they figure 99% of owners aren't going to try it, so why bother?
1 reply 0 retweets 0 likes
Replying to @babbageboole @matthewvenn
According to some eevblog forum posts it looks like this is simply the default root password from the Xilinx reference linux rootfs for the zynq. (The MD5 password hash is using the same seed value in both cases.)
1:34 PM - 20 Dec 2018
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.