Last Summer i gave my old Macbook Pro 15″, Late 2011 with 8GB and 160GB SSD to one of my team members at Userlike, since i got a Retina upgrade. I think the old one was still decent, since the SSD gave it that boost to make it usable, even if the laptop was 2 years old at that time. Unluckily the old Macbook Pro didn’t last long, it just died after 3 month. Wouldn’t turn on anymore. As i predicted, after bringing it to the Apple Store, they said the logic board was fried, which always means its totaled. We bought a new Macbook and moved on.
Now i got the broken Macbook back to my place and i thought i would at least sell the display, case and reuse the SSD. But i remembered reading all the Macbook baking blog articles. I already disassembled a few Macbooks down to the logic board and also did some reflow stuff for side projects. Also knowing that a friend of mine has good experience with baking old Nokia phones, i though i give it a try.
- Go to ifixt.com and look up the tutorial to change the logic board
- Disassemble the laptop, collect screws and parts in separate containers
- Be becareful with all the ribbon cable connectors, there are a lot and some are tricky
- Get the logic board out, remove heat pipes, ram and speakers
- Preheat oven to 180c
- I cleaned the board with isopropyl alcohol
- Set board on tin foil legs on a baking tray
- Put in the oven for 7 minutes
- Let it cool fast at a open window
- Clean fans and case from the inside
- Assemble, make sure to get all cables connected
- Boot that Book
I hoped that i had a 50/50 chance that it will work. I was confident, that i don’t mess the laptop during disassemble and assemble phase, i wasn’t sure what the result was after baking. I remembered that the laptop got quite hot while working, so there were some odds that this permanent heat would have altered the setup of the parts of the pcb. And it turned out to be worth the work, the Macbook booted up nicely.
2 years ago i started to transfer my old Atari 800 XL software from the 28 years old “5,25 disk to ATR images on my laptop. But i was never happy with the setup using a windows program in a vm to do the transfer. I found AspeQt which is opensource, but it did not support OSX. So i started to add an serial driver with OSX support to it. And then forget about it. Till recently when i got an email from the AspeQt maintainer Ray who asked about the state of my github repo. Since i want OSX support in the mainline, i picked the lastest version of AspeQt to update my repo, which already got a little stale. Then i found out that is a pain in the ass to run QT4.8 on Maverick, there is no offical package and building from source you end up in patch hell.
So i decided to move my branch of AspeQt to QT5.2, which was pretty straight forward.
QtCreator is not a great editor but does the job
AspeQt on OSX
AspeQt on OSX
Found some cool stuff on my disks
Software from the 80ies
After reading the book Racing the beam, i felt like trying out to write my own Atari 2600 kernal. This is what i came up with
after poking around a little. Sure its a Amiga inspired copper demo.
more to come…
Wrote a quick & dirty python wrapper for the bluez-utils bccmd command to set a the btaddr
of an bluetooth hci device. The native bccmd syntax is awkward, so that i found it handy to have a script which accepts normal formated btaddr as an argument and does some error checking and status infomation.
root@linux:~/devel/tech/bluetooth/# ./setbtaddr hci0 01:0E:07:75:B7:12
Exec './bccmd -d hci0 psset -r bdaddr 0x75 0x00 0x12 0xB7 0x07 0x00 0x0E 0x01'
hci0: Type: USB
BD Address: 01:0E:07:75:B7:12 ACL MTU: 192:8 SCO MTU: 64:8
RX bytes:86 acl:0 sco:0 events:9 errors:0
TX bytes:33 acl:0 sco:0 commands:9 errors:0
Since the 23c3 every interested researcher knew that is easy to compromise bluetooth sessions using the BTcrack tool.Thierry Zoller showed how it’s possible to retrieve link keys, The only problem was to get hands on a bluetooth sniffer device to get the raw bluetooth packets. Such devices are not available at consumer prices. But somehow Max Moser found a way to tranform a vanilla usb bt dongle into a bluetooth sniffer device. Don’t believe the hype…Now bluetooth security is dead.
#Backup old firmware
dfutool -d hci0 archiv backup.dfu
# Backup config
bccmd -d hci0 pslist -s 0x000F >> backup_cfg
# Check Vendor ID ( has to be 0x0a12)
bccmd -d hci0 psget -s 0x000f 0x02be
# Write new Product ID
bccmd -d hci0 psset -s 0x0002 0x02bf 0x0002
Wrote a little Bash script using Sleuthkit tools to recover a deleted file from a partion. Tested the script with ext2 and fat32 filesystems.
Setup a test image:
dd if=/dev/zero of=image bs=1k count=8192
mount -o loop image /mnt/image
cp something /mnt/image
Now you can start the script to find a token of the deleted file:
./find.sh image “Test”
The Code for find.sh
if [ $# -ne 2 ]
echo "Usage: $0 image token"
if [ ! -f $IMAGE ]
echo "Cannot find $IMAGE"
if [ -z "$TOKEN" ]
echo "Pleae give search token"
echo "Found deleted"
fls -f $TYPE -rd $IMAGE
dls -f $TYPE $IMAGE > $TMP
strings -t d $TMP > $TMP.str
grep -i "$TOKEN" $TMP.str
echo -en "Select Offset:"
ADDR=$(grep -i "$TOKEN" $TMP.str | grep "$n" | sed 's/^[ \t]*//' | head -n 1 | cut -d " " -f1)
if [ -z "$ADDR" ]
echo "Nothing found for '$TOKEN'"
echo "Found $ADDR"
OFFSET=$(echo "$ADDR / $BSIZE" | bc)
echo "Using Offset $OFFSET"
BLOCK=$(dcalc -f $TYPE -u $OFFSET $IMAGE)
echo "Using Block $BLOCK"
dcat -f $TYPE $IMAGE $BLOCK
INODE=$(ifind -f $TYPE $IMAGE -d $BLOCK)
echo "Found Inode $INODE"
istat -f $TYPE $IMAGE $INODE
BLOCKS=$(istat -f $TYPE $IMAGE $INODE | tail -n 1)
echo "Found Blocks $BLOCKS"
(for BLOCK in $BLOCKS
dcat -f $TYPE $IMAGE $BLOCK
done) | tee $TMP.found
echo "Saved to $TMP.found"
rm -f $TMP $TMP.str
Made a nice shellcode using the python inlineEgg library. The shellcode is designed to smash the stack of a programm which is listen on a socket. The read buffer gets overflowed by the shellcode.
The code was tested an on older SUSE9.0, because current disto use pie and