ludwig-v / wireless-carplay-dongle-reverse-engineering

CPlay2Air / Carlinkit Wireless Apple CarPlay Dongle reverse engineering
GNU General Public License v3.0
683 stars 100 forks source link

How to unpack firmware.img #154

Open dmi97 opened 1 year ago

dmi97 commented 1 year ago

Hello, I was wondering how did you manage to unpack the .img firmware file?

I have this firmware image for the Carlinkit A2A Android Auto dongle and I need to unpack it in order to change the default wifi channel on 5Ghz to avoid interferences. But I am unable to mount it or unpack with 7zip/Winrar. The file shows up as corrupted, but it can flash my dongle just fine so it might be encrypted somehow.

O2W_AUTOKIT_Update.zip

Sorry if this is not the right place to post.

ludwig-v commented 1 year ago

Back then you could have used U2W_Decrypt script but they changed the way they pack the firmware (Obfuscated ZIP to AES encrypted ZIP with still unknown key) I worked on it but they also obfuscated the binary doing the decryption so it is hard to find the key (check "Reverse" folder inside the repo)