03-01-2015, 10:34 AM
OK, I had access to the tab for a couple of hours, so here are my new findings.
If you are running windows do:
with your tablet already plugged in.
Start ExploraPark, and you should soon receive some lines of logs with your EID (same as with preivous Innotab devices)
This EID will be usefull to edit database, as database are encrypted !
I've reversed some code, and the encryption engine is SQLCipher, which is supported by http://www.sqlabs.com/sqlitemanager.php
The DB password is the USB PID: 1668 followed by your EID (so quite a long password to type !)
Then, you can grab a copy of the db called fakeapp.db, located in:
Start SQLiteManaged, and open the DB. It will prompt for a password. You are now in !
I have not tested yet which fields are mandatory in "downloaded_cartridge" table. You will see that the known *.bin files are mentionned there in the "url" field.
Does any of you have some cartridge to check the behavior ?
If you are running windows do:
Code:
adb logcat | find "eid"with your tablet already plugged in.
Start ExploraPark, and you should soon receive some lines of logs with your EID (same as with preivous Innotab devices)
This EID will be usefull to edit database, as database are encrypted !
I've reversed some code, and the encryption engine is SQLCipher, which is supported by http://www.sqlabs.com/sqlitemanager.php
The DB password is the USB PID: 1668 followed by your EID (so quite a long password to type !)
Then, you can grab a copy of the db called fakeapp.db, located in:
Code:
/data/data/com.vtech.innotab.vpm/databases/fakeapp.dbStart SQLiteManaged, and open the DB. It will prompt for a password. You are now in !
I have not tested yet which fields are mandatory in "downloaded_cartridge" table. You will see that the known *.bin files are mentionned there in the "url" field.
Does any of you have some cartridge to check the behavior ?
