Skip to content

Commit

Permalink
Sannce
Browse files Browse the repository at this point in the history
  • Loading branch information
EliasKotlyar committed Aug 6, 2018
1 parent 98d46d5 commit 5ea8eb9
Show file tree
Hide file tree
Showing 3 changed files with 37 additions and 32 deletions.
1 change: 1 addition & 0 deletions hacks/install_cfw.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
[Xiaomi XiaoFang T20](https://github.com/EliasKotlyar/Xiaomi-Dafang-Hacks/raw/master/hacks/cfw/xiaofang/cfw-1.0.bin) | 333053c3e98af24e0e90746d95e310a3c65b61f697288f974b702a5bcbba48a9
[Wyzecam V2](https://github.com/EliasKotlyar/Xiaomi-Dafang-Hacks/raw/master/hacks/cfw/wyzecam_v2/cfw-1.1.bin) | ca8fd695fe1903bd12aca2752c86b62c9694430c9c41b2804b006c22e84f409d
[Wyzecam Pan](https://github.com/EliasKotlyar/Xiaomi-Dafang-Hacks/raw/master/hacks/cfw/wyzecam_pan/cfw-1.0.bin) | f76990d187e763f160f5ad39331d6a3209d3025fe3719cb43c92dbad92cebba2
Sannce & clones | [Start here](/hacks/install_sannce.md)
Other Ingenic T10/T20 Device | [Start here](/hacks/newdevices.md)

2. Format your microSD to FAT32. NTFS, EXFAT etc. won't work.
Expand Down
34 changes: 2 additions & 32 deletions hacks/install_sannce.md
Original file line number Diff line number Diff line change
@@ -1,35 +1,5 @@
1. Get Digma App from Play Store
2. Connect to Camera using Digma. Go to Settings -> Advanced Settings -> Telnet-Access
3. Connect via Telnet to Camera using following credentials:
root:hslwificam
4.


### Technical Information:
dev: size erasesize name
mtd0: 00040000 00010000 "boot"
mtd1: 00220000 00010000 "kernel"
mtd2: 00340000 00010000 "root"
mtd3: 00240000 00010000 "system"
mtd4: 00010000 00010000 "factory"
mtd5: 00010000 00010000 "param"


Dump Firmware:
dd if=/dev/mtdblock0 of=uboot.bin
dd if=/dev/mtdblock1 of=kernel.bin
dd if=/dev/mtdblock2 of=rootfs.bin
dd if=/dev/mtdblock3 of=system.bin
dd if=/dev/mtdblock4 of=factory.bin
dd if=/dev/mtdblock5 of=param.bin


Flash New Bootloader:
fatload mmc 0 0x82000000 sannce.bin
sf probe
sf erase 0x0000 0x40000
sf write 0x82000000 0x00000 0x40000

### Current State:
Please go to https://github.com/EliasKotlyar/Xiaomi-Dafang-Hacks/issues/625



34 changes: 34 additions & 0 deletions information/sannce.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
1. Get Digma App from Play Store
2. Connect to Camera using Digma. Go to Settings -> Advanced Settings -> Telnet-Access
3. Connect via Telnet to Camera using following credentials:
root:hslwificam
4.



``

### Technical Information:
dev: size erasesize name
mtd0: 00040000 00010000 "boot"
mtd1: 00220000 00010000 "kernel"
mtd2: 00340000 00010000 "root"
mtd3: 00240000 00010000 "system"
mtd4: 00010000 00010000 "factory"
mtd5: 00010000 00010000 "param"


Dump Firmware:
dd if=/dev/mtdblock0 of=uboot.bin
dd if=/dev/mtdblock1 of=kernel.bin
dd if=/dev/mtdblock2 of=rootfs.bin
dd if=/dev/mtdblock3 of=system.bin
dd if=/dev/mtdblock4 of=factory.bin
dd if=/dev/mtdblock5 of=param.bin


Flash New Bootloader:
fatload mmc 0 0x82000000 sannce.bin
sf probe
sf erase 0x0000 0x40000
sf write 0x82000000 0x00000 0x40000

0 comments on commit 5ea8eb9

Please sign in to comment.