Esato

Forum > Sony Ericsson / Sony > Software, Firmware and Drivers > DB2010 hacking research

Author DB2010 hacking research
ikee
Model not set
Joined: Aug 20, 2009
Posts: 1
PM
Posted: 2009-08-20 12:41
Reply with quoteEdit/Delete This PostPrint this post
Hi,

I want to read the raw FLASH of DB2010 phones.
Because of that I am investigating the DB2010 hacking tools like SETOOL, SEFP, JDFlasher, and trying to understand how they works.

I have K500 phone with CID 29. I see that those tools sends 2 bootloaders that signed:
db2010_CID00_R2F_id and db2010_CID00_R2E_cert.
after that they able to send unsigned bootloader of name: hendrixR2Eldr.

What exactly the weakness here? how its possible to send unsigned code that accepted?
I am reverse-engineering the bootloaders and trying to understand the code behind of it.
Somebody know about it that we can share information?

Thanks,
Ikee.
Access the forum with a mobile phone via esato.mobi