/pioneer-x-smc55

Pioneer X-SMC55-S Reverse Engineering

Primary LanguageCMIT LicenseMIT

pioneer-x-smc55-s micro system

Pioneer X-SMC55-S Reverse Engineering

Enable telnet command line interface:
http://<ip>/service_term_sw_nmp.asp
select TELNET, then Apply
now you can power off/on and "telnet <ip> 9000"

Enable tftp bootloader console:
power on device
http://<ip>/1000/firmware_update_start.asp
press Start
telnet <ip> 5001

Memory dump:
sys memdump 0x00400000 0x0000fa00 ; system code, contains code chunk from 0x60000000 and stack
sys memdump 0x00500000 0x0000fa00 ; same as 0x00400000 but non-cached
sys memdump 0x60000000 0x0aa80000 ; code
sys memdump 0x60aa8000 0x01458000 ; heap & stack
sys memdump 0x71f00000 0x00100000 ; heap & stack

Firmware file encryption (BCD or bCoD) looks like Blowfish ECB, but password and initialization vector from dump didn't match maybe non-standard s-boxes