Merge pull request #17 from myfreeweb/master

Support FreeBSD via macOS backend
This commit is contained in:
Mikaela Szekely 2018-05-23 16:51:06 -04:00 committed by GitHub
commit 0ed3a06e64
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 3 additions and 3 deletions

View File

@ -39,7 +39,7 @@ The vulnerability is documented in the 'report' subfolder; more details and
guides are to follow! Stay tuned... guides are to follow! Stay tuned...
### Use Instructions ### Use Instructions
The main launcher is "fusee-launcher.py". Windows, Linux, and macOS are all natively supported! Instructions for Windows specifically can be found on the [wiki](https://github.com/reswitched/fusee-launcher/wiki/Instructions-(Windows)). The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported! Instructions for Windows specifically can be found on the [wiki](https://github.com/reswitched/fusee-launcher/wiki/Instructions-(Windows)).
With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. `./fusee-launcher.py payload.bin`. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver. With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. `./fusee-launcher.py payload.bin`. Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver.

View File

@ -141,11 +141,11 @@ class MacOSBackend(HaxBackend):
Simple vulnerability trigger for macOS: we simply ask libusb to issue Simple vulnerability trigger for macOS: we simply ask libusb to issue
the broken control request, and it'll do it for us. :) the broken control request, and it'll do it for us. :)
We also support platforms with a hacked libusb. We also support platforms with a hacked libusb and FreeBSD.
""" """
BACKEND_NAME = "macOS" BACKEND_NAME = "macOS"
SUPPORTED_SYSTEMS = ['Darwin', 'libusbhax', 'macos'] SUPPORTED_SYSTEMS = ['Darwin', 'libusbhax', 'macos', 'FreeBSD']
def trigger_vulnerability(self, length): def trigger_vulnerability(self, length):