It seems there isn't any USB HID support, so no external keyboard...
It seems there isn't any USB HID support, so no external keyboard...
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
#USB Demo file
[general]
id=
#USB Demo file
[general]
id=?????????????
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
#USB Demo file
[general]
id=9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
INSTALL_PACKAGE 0x0 oip-ssw-security-usergroup-helper-swl
DELETE_FILE /Data/mnt-wt/MessagingAppl/node/MsgTemplates.db
INSTALL_TAR_FROM_FILE / 42129 $(MEDIA_ROOT)/SWL/001315031486100876/Firmware/AUTO/1010113/ALL/OVIP/efs-app-data-resource.tar.gz
DELETE_FOLDER /mnt/mmc_ovip/media/datastore/radio
@MitchtheMitch did the extraction using the firmware file from web and binwalk.
I have compiled both Rui.Saraiva and mine extractions. There is the link: shorturl(dot)at(slash)ozMS8
@MitchtheMitch I did try the USB2Eth device after a hard reboot (long press on the phone toggle switch), the device is detected and the module is loaded, but no iface configured. Exactly the same if I plug it later.
@Crunchy_Nuts The SWL\*\Firmware\FirmwareList.ini has lines such as:
So maybe there's a way to write directly to the filesystem.Code:INSTALL_PACKAGE 0x0 oip-ssw-security-usergroup-helper-swl DELETE_FILE /Data/mnt-wt/MessagingAppl/node/MsgTemplates.db INSTALL_TAR_FROM_FILE / 42129 $(MEDIA_ROOT)/SWL/001315031486100876/Firmware/AUTO/1010113/ALL/OVIP/efs-app-data-resource.tar.gz DELETE_FOLDER /mnt/mmc_ovip/media/datastore/radio
@horuscurcino Your files are from a Chinese NAC firmware 22.06.17.42.
Did you change the ip address for the ethernet device to 192.168.2.122?
Netmask 255.255.255.0
The network interface isn't configured. You can see that in the engineering mode cheatcode (1140 IIRC) or dmesg - you can force create a new spylog (press and hold the 4th toggle switch (vehicle button) until you hear a beep) and extract that from the .dlt files. I had my network interface in promiscuous mode and no traffic. I also did try running a dhcp daemon to no avail.
Hi guys! Anyone know if is possibile to send G. Maps (using Android auto connection) on the 3d icockpit screen, like the stock Nav on a new Peugeot 208?
Hi guys !
Did you manage to progress in the project? I am very interested in your work ! :good:
No, you can only see the AA (and CarPlay/MirrorLink) in the central touchscreen. That infotainment system is basically the same used in older cars. The 3008 can have the NAC Wave 2 or 4 (in HYbrid/HYbrid4 versions) and the 208 the NAC Wave 3 or 4 systems.
Or RCC Wave 2 and 3, in systems without integrated sat nav.
It seems there isn't any USB HID support, so no external keyboard...
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
#USB Demo file
[general]
id=
#USB Demo file
[general]
id=?????????????
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
#USB Demo file
[general]
id=9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
hi guys, I'm also looking for a way to get into the hidden menu of the NAC (3d Connect Nav) Peugeot. My car is a 2008, with CarPlay, Mirrorlink and Android Auto. Now compared to what I saw for the KIA, I would try to figure out if there is a chance to enter the system that is declared Linux, and find a gateway like an android virtual emulator, on which even turns android auto, to install other applications directly on the multimedia of the car. The only 2 codes we know are: 1111 1122, the first for spylogs, the second one gives us a series of info on the system, but apparently they are only legible and there is no way to get inside. In practice using the code 1122 the first time also gave me only info on the radio, but then typing in increasing order the following codes and typing 1122 again, for several times I have drawn many other info. I took pictures that I would like to share with you to find out if there is a chance to find a way.
Hello! I had ask a professional about the full screen, here is the answer:The screen has 1 resolution of 1920x720.. It's just divided by PSA to show different info.. During a software update the whole screen is used so it should be possible somehow to trick the system in showing fullscreen stuff.