OYO Hacking

From Technologia Incognita
Revision as of 22:12, 9 February 2013 by Webmind (talk | contribs) (Hacking)
Jump to: navigation, search
Projects
Oyo-1.jpg
Participants Arda Xi, The JinX
Skills
Status Active
Niche Software
Purpose Fun

All information on modding/hacking the OYO E-reader

Files

Links

Hacking

The Frank's wiki page above is quite useful, but a lot of data is outdated and/or unnecessary. The following is a simple guide to do whatever you like to your OYO.

First, you will want to run the following command to get your kernel to accept the OYO as a serial device.

sudo modprobe usbserial vendor=0x0525 product=0xa4a6 or sudo modprobe usbserial vendor=0x0525 product=0xa4a5 (Check with lsusb)

To get your OYO to behave like a serial device, grab a MicroSD card, create a file called usbdebug on it, put it into your OYO and reboot it while having it attached to your computer.

touch usbdebug

After the OYO has booted, you will want to open a serial connection to it.

sudo picocom --b 115200 --f n --p on --d 8 /dev/ttyUSB0

  • It might throw some garbage at first, just keep pressing enter until you get a prompt like this.
  • If this doesn't help, try rebooting your machine or a different machine, this 'feature' is flaky, it's why you want an sshd.

Samsung login:

You can then login, using the login root and the password SReader.

At this point, I suggest changing the root password.

passwd

Because the device copies the content of /mnt/etc to /etc an extra step is required.

cp /etc/passwd /mnt/etc/passwd