I'm having an issue where the program exits after Check GPT, see logs below. I'm not sure if its helpful but the Echo dot that I'm using could never get past the second boot LEDs?
I do have another echo dot that does boot properly, should I try the exploit on that one?
Once again thanks!
`[13:02:01] INFO: Please short the device as shown in the image at https://danieldb.uk/posts/alexa-1/mainboard.jpg
[13:02:01] INFO: To open the device, you will need a torx 8 screwdriver.
[13:02:01] Waiting for bootrom
[13:03:11] Found port = COM7
[13:03:11] Handshake
[13:03:11] Disable watchdog
[13:03:11] handshake success!
Remove the short and press Enter *
[13:03:15] Init crypto engine
[13:03:15] Disable caches
[13:03:15] Disable bootrom range checks
[13:03:15] Load payload from brom-payload/build/payload.bin = 0x45C0 bytes
[13:03:15] Send payload
[13:03:16] Let's rock
[13:03:16] Wait for the payload to come online...
[13:03:17] all good
[13:03:17] Check GPT
Traceback (most recent call last):
File "", line 198, in _run_module_as_main
File "", line 88, in _run_code
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet__main.py", line 3, in
amonet.main()
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet__init__.py", line 219, in main
switch_user(dev)
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet\init__.py", line 131, in switch_user
block = dev.emmc_read(0)
^^^^^^^^^^^^^^^^
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet\common.py", line 180, in emmc_read
raise RuntimeError("read fail")
RuntimeError: read fail`
Yeah, swapped over to Linux and it decided to work. Also I think I got this error with an Echo that didn't boot completely - stuck on the second blue ring on startup.
Hi, thanks for the project.
I'm having an issue where the program exits after Check GPT, see logs below. I'm not sure if its helpful but the Echo dot that I'm using could never get past the second boot LEDs? I do have another echo dot that does boot properly, should I try the exploit on that one?
Once again thanks!
`[13:02:01] INFO: Please short the device as shown in the image at https://danieldb.uk/posts/alexa-1/mainboard.jpg [13:02:01] INFO: To open the device, you will need a torx 8 screwdriver. [13:02:01] Waiting for bootrom [13:03:11] Found port = COM7 [13:03:11] Handshake [13:03:11] Disable watchdog [13:03:11] handshake success!
[13:03:15] Init crypto engine [13:03:15] Disable caches [13:03:15] Disable bootrom range checks [13:03:15] Load payload from brom-payload/build/payload.bin = 0x45C0 bytes [13:03:15] Send payload [13:03:16] Let's rock [13:03:16] Wait for the payload to come online... [13:03:17] all good [13:03:17] Check GPT Traceback (most recent call last): File "", line 198, in _run_module_as_main
File "", line 88, in _run_code
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet__main.py", line 3, in
amonet.main()
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet__init__.py", line 219, in main
switch_user(dev)
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet\ init__.py", line 131, in switch_user
block = dev.emmc_read(0)
^^^^^^^^^^^^^^^^
File "C:\Users\ollie\Downloads\EchoCLI-main\EchoCLI-main\internal\amonet\amonet\common.py", line 180, in emmc_read
raise RuntimeError("read fail")
RuntimeError: read fail`