找回密码
 注册

QQ登录

只需一步,快速开始

查看: 3711|回复: 12

F663nv9 TTL找密码

[复制链接]
发表于 2022-2-6 20:11:54 | 显示全部楼层 |阅读模式
到这了:然后呢?晕了
' c/ R! G/ v' F" w( g0 x?       - alias for 'help'
) k! N' @3 I  o) mautorun - start version& ~1 n! t# B6 M( @
base    - print or set address offset; r4 D. l3 \( e6 X0 }$ M
bdinfo  - print Board Info structure
: c6 S5 h7 d& i' E4 }$ C9 E2 }boot    - boot default, i.e., run 'bootcmd'2 I' {! I. x* K+ P  Q' f( K) |% g
bootd   - boot default, i.e., run 'bootcmd'. F& W# c( |3 d) T  c3 A
bootk   - boot kernel0 i5 _8 t+ c$ G$ u  m/ G
bootm   - boot application image from memory
& y7 ~# _8 K6 M3 d( P6 abootz   - boot Linux zImage image from memory  Z/ F- n: E0 X# l2 E0 q8 N
cmp     - memory compare
" O1 w# c+ b1 d9 L8 t6 \coninfo - print console devices and information
; ~( c" ?* `& Lcp      - memory copy8 r2 b) M4 J4 E! `1 }
dhcp    - boot image via network using DHCP/TFTP protocol
% l1 U$ N0 w9 y$ P6 W3 P1 }downver - upgrade software downloaded from TFTP server
3 g& d8 w4 ^% x3 Kecho    - echo args to console7 |$ a' c% r$ ^  A8 q
fdt     - flattened device tree utility commands
; V$ y6 U2 j6 |- ]3 \& ]; N# wfsinfo  - print information about filesystems& _% ?. l, J- q7 o) g
fsload  - load binary file from a filesystem image
  y2 F% |* B& G  dgo      - start application at address 'addr'
: u, R5 k+ g6 @& h( d2 e8 {gpiotest- gpiotest dir [num] [in/out]9 O0 A0 F* z' }2 Z- ?2 X: l2 i
gpiotest value [num] [1/0]
- z! P% L' v8 @2 bgpiotest gvalue [num]! x/ N5 E) V1 F( m- z* k4 w) B
help    - print command description/usage( M. T3 L' q( k9 Q
imxtract- extract a part of a multi-image8 x' [% S+ K* o. S2 ?! K
itest   - return true/false on integer compare
/ s& |* L: i( q& J5 M2 vls      - list files in a directory (default /)
" z  O0 P1 F3 B3 F6 u; a6 X6 omd      - memory display
& z5 `5 f' g4 v: Xmii     - MII utility commands. O. @5 y) B# ~% g  m9 [4 C( a; ], l* |
mt      - memory test9 j1 \- p9 q6 m6 [
mtddebug- mtddebug operate3 p6 a* p. Y' G% l1 X, S
mtest   - simple RAM read/write test* X9 b* [$ e& y  |/ V
mw      - memory write (fill)/ C% Z' c5 y" E1 ?- j8 S4 M1 c
nand    - NAND sub-system1 n  \  ]# X: K# J, Y8 b, N
ping    - send ICMP ECHO_REQUEST to network host# M( @) d- O( o1 m
printenv- print environment variables' e# y  ]% N6 e, L# p8 e; M
reset   - Perform RESET of the CPU  p7 B3 W* @) t2 o
run     - run commands in an environment variable1 ~8 }3 l" Q* B' v, _( z
saveenv - save environment variables to persistent storage
2 B- `3 \! c& {( Y: lsetenv  - set environment variables
9 K/ _3 A& [2 a- P) {4 Msleep   - delay execution for some time7 X1 t# c7 g( z% T6 m
tftp    - boot image via network using TFTP protocol
& M6 k1 o  n7 l3 {1 F" k/ Eversion - print monitor, compiler and linker version
8 ]9 F$ `  s2 ]; \9 h! W" Cwatchdog- watchdog reset && disable
, ], o9 J4 }) {( h) j, Rxmodem  - xmodem
. k( L5 J! N/ U=>
2 T4 a! l$ U& T+ P
. E7 k6 F2 R( u9 i% P3 Q/ A
 楼主| 发表于 2022-2-7 05:28:55 | 显示全部楼层
/ j9 K7 r: e2 g' z- u( l' h0 h
=> ls$ Z8 {, X2 T, r" M+ y2 q5 B
addr=1a00000
) G8 t2 v" f/ O/ B4 {" H  g0 xaddr=3a00000
$ Y5 B8 C" S6 u. k5 d+ o: `- q* c0 w4 C
---mtdparts_init--current_mtd_partnum=0-5 i1 W4 F1 Z/ L8 ^
dev id: type = 2, num = 0, size = 0xffffffff, mtd_id = single part
( \( C- u+ v/ V* e1 `6 E9 opart  : name = rootfs0, size = 0x01b00000, offset = 0x01a20000/ j5 B+ m% q4 Z- |) _4 f# t9 }
part  : name = rootfs1, size = 0x01b00000, offset = 0x03a20000
& ~* K/ J) P& q$ l) v; A& A: h0 J" b5 t+ T( c
--- jffs2_part_info: partition number 0 for device nand0 (single part)
, S) p: }  M# U; v5 P/ B% S+ ajffs2_part_info:rootfs0,1a20000
1 h% y  Z+ j0 R3 B6 l' l# ~rootfs0,1a20000
. S) l; Y7 O7 Q1 iScanning JFFS2 FS: ................. done.
: u7 d9 @* G$ U& k -rw-r--r--  4294775 Wed Oct 21 07:12:19 2020 0uImage
2 X* v, j3 n# v$ B  D3 H- w- ]& J( [ drwxr-xr-x        0 Wed Oct 21 07:12:19 2020 bin
$ {7 _. g$ o/ T& `! w drwxr-xr-x        0 Wed Oct 21 06:54:08 2020 dev
) Y0 Z  W( B' w drwxr-xr-x        0 Wed Oct 21 07:12:19 2020 etc
5 g$ a: j. |' ]% |0 ]  o( K2 M drwxr-xr-x        0 Wed Oct 21 07:11:55 2020 home4 M$ N4 f5 S4 o6 d
-rwxr-xr-x       66 Wed Oct 21 06:54:07 2020 init
2 m3 n0 j8 X+ t% ~+ a% H6 x- O drwxr-xr-x        0 Wed Oct 21 07:12:19 2020 kmodule
6 O0 s9 ?  E! s6 F& z1 P% E$ T drwxr-xr-x        0 Wed Oct 21 07:12:19 2020 lib9 l% b+ S. D8 D  U* P) w- g: C
lrwxrwxrwx       12 Wed Oct 21 07:05:28 2020 linuxrc -> /bin/busybox# d: p5 a& G" I% P  p6 S
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 mnt
  b0 w, A, X4 y6 x- S drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 proc' P) [7 @  M5 u% M- W8 k
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 root3 |7 t+ s, c: O' V2 m( j2 a
drwxr-xr-x        0 Wed Oct 21 07:12:19 2020 sbin
7 u3 f) m" d) ]' B; A2 |& l9 C drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 sys/ Y: _; O- Y2 A5 x3 _# }5 r- @2 d
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 tagparam
+ |7 w! x6 I! A* Q  _+ K/ ^ lrwxrwxrwx        3 Wed Oct 21 06:54:07 2020 temp -> tmp; v$ n2 _$ ~3 c) e8 j+ h
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 tmp$ p) d7 k3 Z! w
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 upgtempfile
  L* O4 o, G* S drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 userconfig" r- j4 k2 c# s3 _
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 usr
4 q; ^% U/ ]! h! l- O  \8 N# G drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 var+ r* f9 c' F! V, h1 u$ u% ~3 }
drwxr-xr-x        0 Wed Oct 21 06:54:07 2020 wlan) ?; P& ]* D: t. D+ g
=>   q; e  Q) |, b' d
 楼主| 发表于 2022-2-7 14:20:33 | 显示全部楼层
Hit 1 to upgrade software version1 D; X" x# k3 x$ M- s8 {
Hit any key to stop autoboot:  3
( p& x' v, F1 M) p6 t, P这个Hit 1 没有意义:不论你Hit什么都是到=>+ v. a' G& R! ]4 d; T- ?
好象ls命令也被阉割了4 Q; V" a, S4 z4 w, q3 F
求助!!!
 楼主| 发表于 2022-2-8 03:25:33 | 显示全部楼层

& \" S! }* Z/ r- a=>
: ^& P& {7 W# o$ i
: d7 t0 N1 n) m" H3 W: z: e! Fprintenv
3 V; n3 Y, b* R6 \! u/ L' ^baudrate=115200
; B' ?7 A% }( f7 }& O! ~bootcmd=setenv bootargs console=$(console) root=/dev/mtdblock12 ro rootfstype=jffs2  mem=$(memsize);bootm 0x44000000;3 J% S! Q( p8 S! h6 U0 U
bootdelay=1
) d5 }. w& r2 W7 P% }bootfile=uboot.bin
1 I! l$ E' |3 {8 ?) a& m8 obootloaderfile=bootloader.bin
# O2 X0 w" P8 L# s2 ]4 vconfigfile=zxic_pubconfig.bcb4 ?2 C' P0 f- z
console=ttyAMA0,115200n8
3 b3 U8 s! I7 l# ?; Q% m+ qethact=eth0
2 y9 i7 g( m% N4 t: W2 w$ d( nethaddr=00:41:71:00:00:50
; X( g# e0 z2 S" d# U$ o! ^: \8 vfilesize=418877
( W% H: t, H& I9 _% p! }fullfile=upgrade.bin
! t' h7 i! j  H# S. Q. Vgatewayip=192.168.1.1+ c* y+ \% M7 D' \& i. M- g
hostname=unknown1 F4 v6 c- }  n& e* r
ipaddr=192.168.1.15 a- C/ s$ S4 Z' ?4 i6 j! r
linuzfile=vmlinuz.bin9 a0 h3 f  Q$ Z  A
loadaddr=0x42000000
& F3 ~* ?% O  V7 e  o" I/ |, ?1 gmemsize=256M
* [4 R# T, W% L# J' c+ u  v1 r0 pnetmask=255.255.255.08 V: Y/ K- s9 [1 b
netretry=5
4 c* k( k. X. O' a* l( Lserverip=192.168.1.100& O. ]6 |- `+ x" A% P/ b( N
stderr=serial! d0 i' Z7 y# P4 N
stdin=serial
- ]! F7 k  v7 J$ F6 {stdout=serial. F6 l% X& u- {
versioninfo=U-Boot V1.1.0 20200922031856 0x1a00000 0x0 0x8f 0x82
" B& B5 T% d1 w+ L& t' P$ C) S2 o; A1 ?
Environment size: 649/131068 bytes& p  v' d: \9 s' |) u7 \
=> $ v5 h% M/ M0 [6 Y; G
 楼主| 发表于 2022-2-8 10:06:56 | 显示全部楼层
本帖最后由 zhang260gt 于 2022-2-8 10:08 编辑 8 g8 \1 b" T: L' q
: E( M/ c0 i% P; n: |

7 Y3 V1 s: N( G. z
' R; p& v3 ?) t4 t

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2022-2-9 12:38:21 | 显示全部楼层
直接把密码改回来

点评

WEB:user没有密码直接登陆 TTL:也没密码直接到uboot  详情 回复 发表于 2022-2-11 05:15
 楼主| 发表于 2022-2-11 05:15:44 | 显示全部楼层
709508002 发表于 2022-2-9 12:38  N: q2 ]- l8 [$ @. E9 ]
直接把密码改回来
/ @8 L  g- W3 d  h! S) _% i
WEB:user没有密码直接登陆, b. {- `' }! _/ U, D
TTL:也没密码直接到uboot
 楼主| 发表于 2022-2-14 02:58:45 | 显示全部楼层
不找密码了,直接开Telnet破解了,写贴中.....
发表于 2022-3-2 08:54:37 | 显示全部楼层
这是新的干货,马克一下,以后遇到可以学习
*滑块验证:
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|Archiver|小黑屋|宽带技术网 |网站地图

粤公网安备 44152102000001号

GMT+8, 2024-4-28 07:56 , Processed in 0.025893 second(s), 5 queries , Redis On.

Powered by Discuz! X3.5 Licensed

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表