E.solutions Trace Terminal: Difference between revisions
Jump to navigation
Jump to search
Created page with "Another cool find inside the LSD.JXE from Audi MHI2 - embedded Trace Terminal by e.Solutions. Once again - no idea how to enable it, how to connect with it. But this time I can see the <code>help</code> summary, which gives us some idea about the scope of possibilities and example of usage. System.out.println("Welcome to the e.solutions Trace Terminal"); System.out.println("Enter 'q' or 'quit' to quit the application (only if allowed)."); System.out.println("Ente..." |
No edit summary |
||
Line 21: | Line 21: | ||
Interesting thing is the ability to download and upload files. Potentially this allows proper file injection without SWDL binary patching, eMMC soldering... | Interesting thing is the ability to download and upload files. Potentially this allows proper file injection without SWDL binary patching, eMMC soldering... | ||
== TODO == | |||
Check if this is also available in VW/SEAT/Skoda MST2 units. If yes, this would be a much simpler and clean alternative to eMMC soldering, USB OTG, and other dirty exploits. |
Latest revision as of 13:56, 25 March 2025
Another cool find inside the LSD.JXE from Audi MHI2 - embedded Trace Terminal by e.Solutions. Once again - no idea how to enable it, how to connect with it. But this time I can see the help
summary, which gives us some idea about the scope of possibilities and example of usage.
System.out.println("Welcome to the e.solutions Trace Terminal"); System.out.println("Enter 'q' or 'quit' to quit the application (only if allowed)."); System.out.println("Enter 'help' for a short command summary.");
System.out.println("ls show all entities"); System.out.println("channel|ch|c <name|id> [level] query or change a channel filter level"); System.out.println("thread|th|t <name|id> [level] query or change a thread filter level"); System.out.println("wait <type> <name|id> [timeout] wait for an enabled entity (timeout in ms)"); System.out.println("call <name|id> [argument] call a callback method"); System.out.println("start <filename> start logging to file name"); System.out.println("stop [filename] stop logging to file name or stop all logs"); System.out.println("stat start|stop take some tracing statistics"); System.out.println("mute do not display messages"); System.out.println("unmute do display messages"); System.out.println("get <filename> send a file download request "); System.out.println("fstat <filename> send a file status request "); System.out.println("put <filename> upload a file"); System.out.print("levels: ");
Interesting thing is the ability to download and upload files. Potentially this allows proper file injection without SWDL binary patching, eMMC soldering...
TODO
Check if this is also available in VW/SEAT/Skoda MST2 units. If yes, this would be a much simpler and clean alternative to eMMC soldering, USB OTG, and other dirty exploits.