For those who are unfamiliar with Gemini TimeBomb, please read below
The TimeBomb only exists in original Gemini images v4.31 or newer for Dreambox model DM500-S.
This tutorial will help you manually remove TimeBomb from original Gemini Images...
Things you'll need
Steps
If you're interested in trying, I have downloaded all original Gemini images (v4.31 and above) and disinfected them all. Below are the download links for the disinfected (clean) images. Feel free to try at your own risk
Source: Dreambox Wiki
In April 2008, Dream Multimedia allegedly introduced a time bomb into their latest flash to disable the boot loader on counterfeit models. An unofficial firmware group called Gemini who used the latest flash drivers in their firmware, found that flash corruption would be caused on clone DM500-S receivers. Other developers of unofficial firmware groups would find boxes to be affected by this if they use the latest drivers, providing another time bomb is to be introduced.
In April 2008, Dream Multimedia allegedly introduced a time bomb into their latest flash to disable the boot loader on counterfeit models. An unofficial firmware group called Gemini who used the latest flash drivers in their firmware, found that flash corruption would be caused on clone DM500-S receivers. Other developers of unofficial firmware groups would find boxes to be affected by this if they use the latest drivers, providing another time bomb is to be introduced.
This tutorial will help you manually remove TimeBomb from original Gemini Images...
Things you'll need
- Linux Machine (32-bit only) (I used Ubuntu Desktop 10.04 32bit on VMWare Virtual Machine). Any other 23-bit Linux OS will do
- Scripts attached with this post
- Original Gemini image that you need to disinfect
Steps
- Download the required scripts from or scripts.zip
- Extract scripts to a folder on your Linux machine (I used $HOME/Desktop/scripts)
- Download original Gemini Image and save it somewhere on your Linux machine
- Open Terminal window and change directory to the scripts folder from step 2
- Execute RemoveTimeBomb providing original (infected) Gemini image as the first command-line argument (from step 3) and the name of the new (disinfected, to be created) image as the second argument
Code:[I]Generic example:[/I] ./RemoveTimeBomb OriginalImage.img NewImage.img [I]Example:[/I] ./RemoveTimeBomb Gemini_0470_DM500_max_var_12122009.img CleanImage.img
- When done, you should see the following lines in the terminal window (If you see anything else it means that the program was not able to remove the TimeBomb)
Code:... - Checking for TimeBomb... [FOUND] - Patching image... [SUCCESS] - Creating new image: CleanImage.img... [SUCCESS] ...
- You may want to take a look at the other information printed in the terminal window for more information about what was done. Here is a sample output for reference (Also see the below screenshot):
Code:khalidomar@Ubuntu-VM-32Bit:~/Desktop/scripts$ ./RemoveTimeBomb Gemini_0470_DM500_max_var_12122009.img CleanImage.img - Checking required tools... [PASS] - Using temporary directory: /tmp/tmp.UpES42Ui4m - Extracting from: Gemini_0470_DM500_max_var_12122009.img... [SUCCESS] - Checking for TimeBomb... [FOUND] - Patching image... [SUCCESS] - Creating new image: CleanImage.img... [SUCCESS] - Cleanup temporary files and directories Done!
If you're interested in trying, I have downloaded all original Gemini images (v4.31 and above) and disinfected them all. Below are the download links for the disinfected (clean) images. Feel free to try at your own risk
Comment