F663nv9 TTL找密码
到这了:然后呢?晕了? - alias for 'help'
autorun - start version
base - print or set address offset
bdinfo- print Board Info structure
boot - boot default, i.e., run 'bootcmd'
bootd - boot default, i.e., run 'bootcmd'
bootk - boot kernel
bootm - boot application image from memory
bootz - boot Linux zImage image from memory
cmp - memory compare
coninfo - print console devices and information
cp - memory copy
dhcp - boot image via network using DHCP/TFTP protocol
downver - upgrade software downloaded from TFTP server
echo - echo args to console
fdt - flattened device tree utility commands
fsinfo- print information about filesystems
fsload- load binary file from a filesystem image
go - start application at address 'addr'
gpiotest- gpiotest dir
gpiotest value
gpiotest gvalue
help - print command description/usage
imxtract- extract a part of a multi-image
itest - return true/false on integer compare
ls - list files in a directory (default /)
md - memory display
mii - MII utility commands
mt - memory test
mtddebug- mtddebug operate
mtest - simple RAM read/write test
mw - memory write (fill)
nand - NAND sub-system
ping - send ICMP ECHO_REQUEST to network host
printenv- print environment variables
reset - Perform RESET of the CPU
run - run commands in an environment variable
saveenv - save environment variables to persistent storage
setenv- set environment variables
sleep - delay execution for some time
tftp - boot image via network using TFTP protocol
version - print monitor, compiler and linker version
watchdog- watchdog reset && disable
xmodem- xmodem
=>
=> ls
addr=1a00000
addr=3a00000
---mtdparts_init--current_mtd_partnum=0-
dev id: type = 2, num = 0, size = 0xffffffff, mtd_id = single part
part: name = rootfs0, size = 0x01b00000, offset = 0x01a20000
part: name = rootfs1, size = 0x01b00000, offset = 0x03a20000
--- jffs2_part_info: partition number 0 for device nand0 (single part)
jffs2_part_info:rootfs0,1a20000
rootfs0,1a20000
Scanning JFFS2 FS: ................. done.
-rw-r--r--4294775 Wed Oct 21 07:12:19 2020 0uImage
drwxr-xr-x 0 Wed Oct 21 07:12:19 2020 bin
drwxr-xr-x 0 Wed Oct 21 06:54:08 2020 dev
drwxr-xr-x 0 Wed Oct 21 07:12:19 2020 etc
drwxr-xr-x 0 Wed Oct 21 07:11:55 2020 home
-rwxr-xr-x 66 Wed Oct 21 06:54:07 2020 init
drwxr-xr-x 0 Wed Oct 21 07:12:19 2020 kmodule
drwxr-xr-x 0 Wed Oct 21 07:12:19 2020 lib
lrwxrwxrwx 12 Wed Oct 21 07:05:28 2020 linuxrc -> /bin/busybox
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 mnt
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 proc
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 root
drwxr-xr-x 0 Wed Oct 21 07:12:19 2020 sbin
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 sys
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 tagparam
lrwxrwxrwx 3 Wed Oct 21 06:54:07 2020 temp -> tmp
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 tmp
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 upgtempfile
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 userconfig
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 usr
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 var
drwxr-xr-x 0 Wed Oct 21 06:54:07 2020 wlan
=>
Hit 1 to upgrade software version
Hit any key to stop autoboot:3
这个Hit 1 没有意义:不论你Hit什么都是到=>
好象ls命令也被阉割了
求助!!!
=>
printenv
baudrate=115200
bootcmd=setenv bootargs console=$(console) root=/dev/mtdblock12 ro rootfstype=jffs2mem=$(memsize);bootm 0x44000000;
bootdelay=1
bootfile=uboot.bin
bootloaderfile=bootloader.bin
configfile=zxic_pubconfig.bcb
console=ttyAMA0,115200n8
ethact=eth0
ethaddr=00:41:71:00:00:50
filesize=418877
fullfile=upgrade.bin
gatewayip=192.168.1.1
hostname=unknown
ipaddr=192.168.1.1
linuzfile=vmlinuz.bin
loadaddr=0x42000000
memsize=256M
netmask=255.255.255.0
netretry=5
serverip=192.168.1.100
stderr=serial
stdin=serial
stdout=serial
versioninfo=U-Boot V1.1.0 20200922031856 0x1a00000 0x0 0x8f 0x82
Environment size: 649/131068 bytes
=>
本帖最后由 zhang260gt 于 2022-2-8 10:08 编辑
直接把密码改回来 709508002 发表于 2022-2-9 12:38
直接把密码改回来
WEB:user没有密码直接登陆
TTL:也没密码直接到uboot 不找密码了,直接开Telnet破解了,写贴中..... 这是新的干货,马克一下,以后遇到可以学习 学习一下
页:
[1]
2