#garfield Logs
Feb 05 2023
#garfield Calendar
01:00 AM ruenahcmohr: ok, interrupt vector is 0x02
01:10 AM ruenahcmohr: or 0x000002 or whatever
01:10 AM ruenahcmohr: reset vector is 0x0000000
02:54 AM ruenahcmohr: wow I'm almost 4500 already
05:47 AM polprog_: how many zeros have you got there bud
11:10 AM ruenahcmohr: not sure how big its address bus is
11:25 AM polprog_: they had very little ram actually
11:25 AM polprog_: less than 256 bytes
11:26 AM ruenahcmohr: yup
05:20 PM aandrew: heh
05:20 PM aandrew: the assclown who popped my esxi server was stupid lazy
05:23 PM aandrew: his script seems to only encrypt/scramble the first 'x' (where x is less than 1MB) of any .vmx and .vmdk files. I have a .vmx~ file in the same dir that is unscrambled, and I can mount -o loop,offset=1048576 some.vmdk /mnt and access the filesystem just fine
05:27 PM ruenahcmohr: !?
05:28 PM ruenahcmohr: log4j?
05:28 PM aandrew: hm?
05:37 PM ruenahcmohr: how they get in? was it a log4j thing?
05:37 PM aandrew: don't think so? they popped the ESXi hypervisor, not any of the VMs
05:37 PM aandrew: I don't see anything obvious in https://www.cvedetails.com/vulnerability-list/vendor_id-252/product_id-22134/Vmware-Esxi.html for 6.0u3 which is what I was running
05:38 PM ruenahcmohr: should I set up a z80 with an interrupt based off A7 and RFSH to do real time tracking?
05:45 PM aandrew: I haven't been paying attention to your latest escapade
05:45 PM aandrew: what're you up to?
07:33 PM ruenahcmohr: there is a distracton
07:33 PM ruenahcmohr: a minimal z80
07:33 PM ruenahcmohr: but its a fork of a distraction to play with these tms320
07:34 PM ruenahcmohr: the main task right now is supposed to be servo loop controllers and servos
07:34 PM ruenahcmohr: I have a task going to get arm6 going, which is why I'v been working out the mechanical stuff for it
07:35 PM ruenahcmohr: application of servos
11:18 PM ruenahcmohr: ok, tommroow is sprayers day
11:18 PM ruenahcmohr: need to make 4 more 12"