The Following 59 Users Say Thank You to qwerty12 For This Useful Post: | ||
amin007110, arpwatch, atilla, azad1top, bak89, biggzy, chemical1der, ChiefRA, codeMonkey, Corwin, daperl, debernardis, dzano, Estel, F2thaK, fnordianslip, frals, gkhnkrts7, gyu_ma, Helmuth, int_ua, j-meiser, JadeH, jayford, Joe Cool, joerg_rw, Kleretin, kulas, machimshin, manbeast, Marshall Banana, Mentalist Traceur, misterc, mivoligo, MohammadAG, mrsellout, mthmob, noobmonkey, pusak gaoq, pyromaniac, qnn, R-R, ricotomo, rkstarnerd, sEKI, shazosbourne, sifo, Silvarum, smegheadz, Sourav.dubey, stlpaul, theonelaw, tunap, UQs, v2px, vkv.raju, Wikiwide, Zentenario |
|
2009-12-20
, 16:18
|
|
Posts: 4,274 |
Thanked: 5,358 times |
Joined on Sep 2007
@ Looking at y'all and sighing
|
#2
|
The Following 10 Users Say Thank You to qwerty12 For This Useful Post: | ||
|
2009-12-20
, 16:42
|
|
Posts: 3,203 |
Thanked: 1,391 times |
Joined on Nov 2009
@ Worthing, England
|
#3
|
|
2009-12-20
, 16:49
|
|
Posts: 739 |
Thanked: 242 times |
Joined on Sep 2007
@ Montreal
|
#4
|
The Following 2 Users Say Thank You to R-R For This Useful Post: | ||
|
2009-12-20
, 17:03
|
|
Posts: 739 |
Thanked: 242 times |
Joined on Sep 2007
@ Montreal
|
#5
|
echo root:$(grep -A 13 lock_code /dev/mtd1|tail -1):
The Following 37 Users Say Thank You to R-R For This Useful Post: | ||
amin007110, appnss, arpwatch, ChiefRA, codeMonkey, daperl, dzano, geraldnicholls, humble, jayford, jebba, Joe Cool, joerg_rw, jperez2009, lma, Mentalist Traceur, mr_pingu, olf, qwerty12, ricotomo, Russe89, saponga, shallimus, shanttu, shazosbourne, sixwheeledbeast, Sourav.dubey, stlpaul, strange1712, talmage, talou, tgrim, totalentropy, tuminoid, tunap, VLaX, Wikiwide |
|
2009-12-22
, 04:55
|
Posts: 90 |
Thanked: 11 times |
Joined on Oct 2009
|
#6
|
Uhm, never mind, actually running the hash through john the ripper gave me my password after 7 minutes (Single core at 2.4Ghz).
So to get your password back, don't risk editing the mtd1 directly, just do this:
then put this in a file and crack it with any DES cracker... wait and enjoy :-)Code:echo root:$(grep -A 13 lock_code /dev/mtd1|tail -1):
As a side note (reference), this works with 1.2009.42-11.002 ... we'll see how it changes with time.
The Following User Says Thank You to arpwatch For This Useful Post: | ||
|
2009-12-22
, 05:49
|
Posts: 3,428 |
Thanked: 2,856 times |
Joined on Jul 2008
|
#7
|
|
2009-12-22
, 06:00
|
Posts: 90 |
Thanked: 11 times |
Joined on Oct 2009
|
#8
|
The Following User Says Thank You to arpwatch For This Useful Post: | ||
|
2009-12-22
, 06:01
|
Posts: 3,428 |
Thanked: 2,856 times |
Joined on Jul 2008
|
#9
|
The Following User Says Thank You to fatalsaint For This Useful Post: | ||
|
2009-12-22
, 14:50
|
Posts: 90 |
Thanked: 11 times |
Joined on Oct 2009
|
#10
|
The Following User Says Thank You to arpwatch For This Useful Post: | ||
Tags |
devicelock, nokia n900 |
Thread Tools | |
|
But the libraries in charge of device locking have an interesting trait: write **** to the lock code area of where it is stored and it will be reset to 12345.
Attached is a program that will do just that. Warning: It is writing to a very critical part of the N900. I will take no responsibility whatsoever if it messes up your N900. It worked for me (i.e. I was able to reboot fine and change the code fine. Multiple times, actually. I tested quite a few times.) but I cannot ensure it will do the same for you. Use at your own risk.
It disables the autolock upon bootup, writes **** to the lock code area, brings up the control panel applet from which you MUST change it from 12345.
Run as root, prefixing it with run-standalone.sh.
Last edited by qwerty12; 2009-12-20 at 16:18.