20-10-2012, 11:43 PM
(26-11-2011, 11:37 PM)Radiotubes Wrote: I recently flashed a DCM425C with Haxorware. It was rather easy. I'm certain most of us can find the basic steps for doing this in windows, however, I use a a real operating system called Linux .
Basically you get the modem into "emergency state" with all lights flashing. I did this with a little push button (momentary on) switch connected between pins one and two of the flash memory chip. I connected up my serial adapter to the modem header pins and monitored the console output in minicom. I pressed my little shorting button as the "dots" got to the last "s" in address.
address
..........
If you do it right and at the correct time, all the lights on the modem will be flashing.
I connected the modems ethernet to a NIC on my computer and configured the NIC to an IP of:
192.168.100.10 netmask 255.255.255.0 via ifconfig. I pinged the modem on 192.168.100.1 to be certain it answered.
Most Linux distro's have a tftp server. Read the man pages if you don't know how to use it! I put the firmware "haxorware.bin" in my tftpboot folder along with the bash script posted below. I started up the tftp server and ran the bash script. Once the script was complete, I rebooted the modem et voila! Haxorware!
Code:# !/bin/bash
# This is the Linux bash script for putting a DCM425C modem into factory mode then configuring
# it for a firmware upload "haxorware.bin" via tftp. It is based on a bat script written for
# winblows that can be found around the net.
# Search for "How to Flash DCM425 any version !!With one Click!!"
list=(
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.1.2.1.2.1 s password"
"snmpget -v2c -c public 192.168.100.1 1.3.6.1.2.1.1.1.0"
"snmpwalk -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.1.0 i 1"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.2.0 a 192.168.100.10"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.3.0 s haxorware.bin"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.4.0 i 1"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.5.0 i 1"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.6.0 i 2"
"snmpwalk -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2"
"snmpset -v2c -c public 192.168.100.1 1.3.6.1.4.1.4413.2.99.1.1.2.4.2.2.2.6.0 i 1"
)
for i in "${list[@]}"
do
#echo "$i"
read -sp "Press ENTER to continue..."
$i
done
can u show me the pins you hook ur button 2