Is this password also valid for the 2017 NAC? it is possible to install android apps on the NAC, since it has android auto it must have a small android system where you can install applications.
I tried to use the cerficate shipped with the firmware to encrpyt, but the firware keys can't decode it, so not this certificate used for the encrpytion. I managed to create self signed certificate from the firware key and can encrypt the firmware back, but I'm not sure if device has any certificate check.I got rootfs\usr\bin\sem_dm_server is file and use ida to open. Can't find the id you said...
Also I try to modify the rootfs.fsn.Then may update use the modify rootfs.
But can't encrypt ....
I just decrypt rootfs.fsn02.And use the crt file in SWL to encrypt the rootfs.fsn02.
But the file out is not same with the original file. Is that the public key or encrypt command error.I think just the key error.
How to find the original public key.
Did you manage to unlock nav or 5ghz? I'm trying too but couldnt find any info.I have found keys to decrypt firmware in Github "psa-nac-firmware-reverse-engineering"
I have uploaded firmware, decrypted-extracted firmware, and script_keys in google drive to make it easier to download anyone who is interested in this.
"drive.google.com/drive/folders/1_twUGEcjGGxYGINgGsaCYC23DraC8pNx?usp=sharing"
PS: I am no expert in all these, just here to find a way to enable 5GHZ (wireless), wireless android auto, and tomtom traffic in Australia.
---------- Post added at 12:34 PM ---------- Previous post was at 12:02 PM ----------
Found it!
The id is ->Code:9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
You find it under rootfs\usr\bin\sem_dm_server
So the complete content of the usb file is
Code:#USB Demo file [general] id=9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f # Activate engineering mode # engineering_mode=0 (Absent) engineering_mode=1 (Present) engineering_mode=1 # Create one spy # create_spy=0 (don't create spy) create_spy=1 (create spy) create_spy=1 # Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND sync_spies_with_usb=1
Create a file and rename it to ID (without any file extension!) and copy the code above into the file.
Copy the file in the root directory of the usb stick and plug it in to the nac.
After you insert it in the nac, it will copy the spylogs to usb.
And maybe you can do other things with the engineering mode.![]()
Hi @carson512. You are many steps forward me to reach the id as @Crunchy_Nuts said.I got rootfs\usr\bin\sem_dm_server is file and use ida to open. Can't find the id you said...
Also I try to modify the rootfs.fsn.Then may update use the modify rootfs.
But can't encrypt ....
I just decrypt rootfs.fsn02.And use the crt file in SWL to encrypt the rootfs.fsn02.
But the file out is not same with the original file. Is that the public key or encrypt command error.I think just the key error.
How to find the original public key.
No!I want to know if it's possible to disable to black bars on widescreen display.. On the PSA website they say this space is dedicated to the infotainment system. But it's really anoying to have a 'premium' display with 2 black bars and no widescreen support.
View attachment 5442239
The screen has 1 resolution of 1920x720.. It's just divided by PSA to show different info.. During a software update the whole screen is used so it should be possible somehow to trick the system in showing fullscreen stuff.No!
As you can see on your picture the side has differnt resolution and can not show the high resolution objects. It is a shame that PSA can not install fully high resolution display. the price difference should be coins.
I'm waiting that update....The screen has 1 resolution of 1920x720.. It's just divided by PSA to show different info.. During a software update the whole screen is used so it should be possible somehow to trick the system in showing fullscreen stuff.
Hello! I had ask a professional about the full screen, here is the answer:The screen has 1 resolution of 1920x720.. It's just divided by PSA to show different info.. During a software update the whole screen is used so it should be possible somehow to trick the system in showing fullscreen stuff.
Hello! I had ask a professional about the full screen, here is the answer:
"Not possible without being root and even being root it is almost impossible because each part of the screen is a separated process (and it is a proprietary binary to edit)"
How you get in this menu? Can you share?
It seems there isn't any USB HID support, so no external keyboard...
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
#USB Demo file
[general]
id=
#USB Demo file
[general]
id=?????????????
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
#USB Demo file
[general]
id=9cfd0bf57a94a3beb6c990e9c9c78247a8bc78fd3310aa6f58a247f8dabe3b7f
# Activate engineering mode
# engineering_mode=0 (Absent) engineering_mode=1 (Present)
engineering_mode=1
# Create one spy
# create_spy=0 (don't create spy) create_spy=1 (create spy)
create_spy=1
# Option to automatically sync spies with USB. Currently it exports spies to USB and delete the existing ones on NAND
sync_spies_with_usb=1
hi guys, I'm also looking for a way to get into the hidden menu of the NAC (3d Connect Nav) Peugeot. My car is a 2008, with CarPlay, Mirrorlink and Android Auto. Now compared to what I saw for the KIA, I would try to figure out if there is a chance to enter the system that is declared Linux, and find a gateway like an android virtual emulator, on which even turns android auto, to install other applications directly on the multimedia of the car. The only 2 codes we know are: 1111 1122, the first for spylogs, the second one gives us a series of info on the system, but apparently they are only legible and there is no way to get inside. In practice using the code 1122 the first time also gave me only info on the radio, but then typing in increasing order the following codes and typing 1122 again, for several times I have drawn many other info. I took pictures that I would like to share with you to find out if there is a chance to find a way.