I installed WhiteRussian that followed by the Kamikaze firmware and didnt realise that it was ssh based configuration opposed to WhiteRussians web gui, i though i fucked my WRT54GL router because of the problem, i have ssh access obviously but how do i revert back to WhiteRussian from kamikaze? I was so wrong about kamikaze Please Help!
Topic: Immediate help please, didn't realise Kamikaze was ssh based and not..
The content of this topic has been archived on 13 Apr 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.
The following should work:
(1) From desktop machine: locate the WhiteRussian .trx image file you wish to load
(2) Copy it to the target machine using scp: 'scp whatever.trx root@192.168.1.1:'
(3) ssh root@192.168.1.1
(4) ls -l (check that you can see the trx file copied in step 1, and it's the right size)
(5) mtd -r write whatever.trx linux
(6) cross fingers. Whatever happens, leave for at least 10 minutes before power-cycling.
OR: if you can't manage scp, then put the .trx image on a webserver which is accessible to the OpenWrt box, ssh into OpenWrt box, and then pull it down from the webserver:
wget http://some.host/somewhere/whatever.trx
mtd -r write whatever.trx linux
This last part is as documented at http://wiki.openwrt.org/OpenWrtDocs/Ins … 22f3061d47
P.S. A hint: don't mark your request as requiring "immediate help". It will almost certainly mean that people ignore it. See http://www.catb.org/~esr/faqs/smart-que … tml#urgent
Or you can try the tftp method with the WhiteRussian trx file -
'scp whatever.trx root@192.168.1.1:'
this can`t be the complete command line on osx got an error like "file does not exist"
"mini$ scp /Users/mini/Desktop/openwrt-brcm-2.4-squashfs.trx root@192.168.1.1"
must be something like "scp /path/to/file.trx root@192.168.1.1:/temp/file.trx"
thanks!!
I think you forgot the colon at the end of the line: root@192.168.1.1:
This copies to the default directory on the target, which (in the case of OpenWrt's root user) is /tmp
Important.
You have to use the WhiteRussian TRX image and not the BIN one, which is no more supported by Kamikaze
thank you ,
How long i need to wait to send the commands from my computer to the router after i reconnect the power cord ?
Check you can ssh into the unit - this should take about 30 seconds or so from power up. Once you can ssh in, then you're safe to scp the image across, and then run mtd.
ok,
"scp openwrt-brcm-2.4-squashfs.trx root@192.168.1.1:" made it
after i pulled the file over to my Asus i used :
mtd -r write openwrt-brcm-2.4-squashfs.trx linux
after some time it frooze in rebooting mode , i waited 5 minutes
then i reconnect the power plug.
Since then my router seems dead , no ping , no telnet, no ssh
is there something i can do ? beside of through him out of the window ? :-(
thanks
Or you can try the tftp method with the WhiteRussian trx file -
You can't tftp a trx file, the router won't accept it via tftp without an appropriate header.
@macbroadcast,
Hopefully you have boot_wait=on set. You can tftp a new firmware. Or, you could always use a JTAG cable.
@ MkFly thanks, can i use this "JTAG cable" on my Asus aswell ? Now i have two broken routers:-( Ausus and Linksys
Can i buy this "JTAG cable" somewhere!!??
thank you!!!
Asus does not have a jtag connector. But the restore mode should work (hold reset button when powering up the router, if the power light flashes, use the asus firmware restore utility)
this works just on any PC with XP, right ?, so i need to find one thanks ;-)
Hello , so i tryed with PC and the " recovery tools" for ASUS WL500GP without success, it has no Jtag connector so what else
can i do to unbrick my ASUS.
thanks
The restore mode will set the router IP to whatever was set in nvram as lan_ipaddr. Make sure the PC you are performing recovery from has static IP set in the same subnet as the router. Try ping before starting recovery tool...
thanks i will try that later , if this does not work , have you tryed the "pin9" method ?
The discussion might have continued from here.