het liefste zou ik beide toestellen verder gebruiken zoals ze bedoeld waren om te gebruiken namelijk cd erin, rippen en klaar maar zoals men zegt "dingen veranderen"

het feit is daar zit al heel wat tijd in , natuurlijk aangename tijd weliswaar en ja ben al op veel natte dromen gestoot hoor en misschien zal ik in de toekomst wel moeten veranderen maar toch zou ik of wil ik liever gezegd het nog niet helemaal opgeven; men weet nooit hoe een haas een koe vangt hé

ja men moet bij de groep een aanvraag doen en probeer daar zoveel mogelijk te begrijpen wat ze daar allemaal broebelen hé zoals hieronder een kopietje van een item hoe ze in het systeem geraken( denk ik)
@BM en ja hoor zoals u eens heeft aangegeven zijn de toestellen wel groot genoeg om iets in te bouwen hoor maar heb op het net ook al van eigenaars gelezen die van een kale reis terug kwamen door dat het moederbord definitief bevestigd is maar dan door andere mensen weer werd weerlegd??? maar plaats is er te over denk ik 440x285x100 en ja het liefst behoud ik de cd lader en ja zou ik gebruik willen maken van de, hoe noemen ze dat, de interface? Het hoeft daarom wel niet met hetzelfde programma als het maar gebruiksvriendelijk is hé; momenteel is het zo dat ik met de afstandsbediening nu alles goed kan volgen om een klein tv scherm doe boven de escient hangt en vanuit mijne luie zetel alles kan kiezen. Eerst zou ik wel alle mogelijkheden benutten die er misschien nog moeten komen hé en daarna zien we wel maar BM alvast merci voor de aanbieding.
Hieronder staat hoe iemand in het systeem geraakt denk ik; zeg BM moest ik u mijn (aangepast) paswoord doormailen kunt u mss wat meer ontdekken bij die groep? Maar da hoeft niet hé
Being an IT guy with some hacking knowledge I started looking at a way to break into the unit to disable the damn "call home" feature, which caused the unit to bring up the "quick start menu" at every boot. Quite annoying, right? So, I had a problem to solve. I like to solve problems, so I started looking at the webserver code and very soon I found out that the php pages are completely insecure. In no time, I was able to read all files on the unit, including some interesting "property" files which contained, amongst other things, some remote codes that turned out to be very useful.
The most useful one is the "5555" code, which disables the call home feature completely.
You have to enter this code at the very first screen upon booting, the one which says "quick menu... press OK to get started" or something like that.
Same goes for other remote codes. The unit is PAL capable and there is a remote code to switch from NTSC to PAL, and back.
I will post the codes later, now I am in the office and I have those at home.
Password protection can be easily bypassed, as the password itself can be obtained by calling a certain PHP page.
Unfortunately, after solving my original problem (calling home), soon a new problem started - the unit is no longer detecting my DVD changer (whereas it was immediately and automatically detected at first boot!!) so what I had discovered so far was not enough to solve my problems.
I kept looking for a way to break into the operating system and "own it", a term that hackers use when they can actually get complete control of a piece of equipment.
I had already found that the unit runs the VxWorks operating system, a real time OS by Wind River still very popular on embedded devices.
There is an open telnet port, which you can reach by using "telnet your-escient-ip", but an user and a password are required.
Same story goes for the FTP server: it is running but asking for username and password.
All the obvious ones ("escient", "support", "fireball", ...) were not working so I really had to find the famed "Golden Disc" to try and inspect the operating system from the outside, on my own computer.
This is where Henry came to the rescue. He was so kind to send me the latest release ISO and after a quick inspection, I found in the "delta.tar" archive an interesting file called "bootrom.bin", this is the image that the unit loads when it starts up. Since it has to load it, is cannot be encrypted, right? So I ran the popular "binwalk" tool over this image, and presto:
$ binwalk bootrom.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
65544 0x10008 Copyright string: " 1984-1996 Wind River Systems, Inc.`Inc.`"
92156 0x167FC gzip compressed data, maximum compression, from Unix, NULL date: Thu Jan 1 00:00:00 1970
Looks promising!!
So I used binwalk to unpack the content of the compressed data:
$ binwalk -Me bootrom.bin
Scan Time: 2015-11-11 16:48:19
Target File: bootrom.bin
MD5 Checksum: a06778077e1fa54416606adcefb4464c
Signatures: 285
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
65544 0x10008 Copyright string: " 1984-1996 Wind River Systems, Inc.`Inc.`"
92156 0x167FC gzip compressed data, maximum compression, from Unix, NULL date: Thu Jan 1 00:00:00 1970
Scan Time: 2015-11-11 16:48:20
Target File: _bootrom.bin-0.extracted/167FC
MD5 Checksum: 43808b71d1b53ca0fabc6d6482ef121d
Signatures: 285
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
1985546 0x1E4C0A Copyright string: " 2003-2007 Escient. All rights reserved. reserved."
1985602 0x1E4C42 Copyright string: " 2003-2007 Escient. Alle Rechte vorbehalten.e vorbehalten."
1985718 0x1E4CB6 Copyright string: " 2003-2007 Escient. Todos los derechos reservados.derechos reservados."
1985782 0x1E4CF6 Copyright string: " 2003-2007 Escient. Tutti i diritti riservati.ritti riservati."
1985866 0x1E4D4A Copyright string: " 2005-2007 McIntosh. reserved."
1985922 0x1E4D82 Copyright string: " 2005-2007 McIntosh.e vorbehalten."
1986038 0x1E4DF6 Copyright string: " 2005-2007 McIntosh.derechos reservados."
1986102 0x1E4E36 Copyright string: " 2005-2007 McIntosh.ritti riservati."
1991464 0x1E6328 gzip compressed data, maximum compression, from Unix, NULL date: Thu Jan 1 00:00:00 1970
2171274 0x21218A Unix home path string: "/home/agraham/windriver/target/src/fs/cbioLib.c, line 2060"
2176492 0x2135EC Unix home path string: "/home/agraham/windriver/target/src/fs/dosDirOldLib.c : VxLong n"
2176564 0x213634 Unix home path string: "/home/agraham/windriver/target/src/fs/dosDirOldLib.c : DOS 8.3 "
2176636 0x21367C Unix home path string: "/home/agraham/windriver/target/src/fs/dosDirOldLib.c : cluster "
2176740 0x2136E4 Unix home path string: "/home/agraham/windriver/target/src/fs/dosDirOldLib.c : Malforme"
2176852 0x213754 Unix home path string: "/home/agraham/windriver/target/src/fs/dosDirOldLib.c : Malforme"
2214932 0x21CC14 Copyright string: " Wind River Systems, Inc., 1984-2002-2002"
2232968 0x221288 Copyright string: " (C) 1995, Thomas G. Lanea1 15-Jul-95"
2341880 0x23BBF8 JPEG image data, JFIF standard 1.01
2341910 0x23BC16 TIFF image data, big-endian
2365156 0x2416E4 JPEG image data, JFIF standard 1.02
2418672 0x24E7F0 PNG image, 182 x 28, 8-bit/color RGBA, non-interlaced
2418766 0x24E84E Zlib compressed data, best compression, uncompressed size >= 20412
2420712 0x24EFE8 PNG image, 182 x 28, 8-bit/color RGBA, non-interlaced
2420806 0x24F046 Zlib compressed data, best compression, uncompressed size >= 20412
2423032 0x24F8F8 PNG image, 182 x 28, 8-bit/color RGBA, non-interlaced
2423073 0x24F921 Zlib compressed data, best compression, uncompressed size >= 20412
2427392 0x250A00 PNG image, 182 x 28, 8-bit/color RGBA, non-interlaced
2427433 0x250A29