The Nook Tablet, launched with a hardware security hole
The device was released allowing ADB to be accessed. Barnes and Nobel quickly patched this hole. o XDA Recognized Developer AdamOutler released a reversion package imediately, and XDA Senior Member Dean Gibson worked on restoring this ability in 1.4.1. AdamOutler then released a Nook Tablet HackPack, discovered a method to boot the Nook Tablet securely from SDCard and showed us how to set up UART with the assistance of XDA Senior Member Pokey9000.
Finally, pulling together all the techniques learned, member hkvc was able to totally bypass the device’s security at the bootloader. He calls it NOP Based Security Bypass. hkvc’s technique loads a custom kernel into memory, modifies security registers, then executes a custom kernel. This requires a hardware modification and may lead to the first mobile device with a modchip. However, using the power of booting from SDCard this will be an unpatchable security exploit and allow custom ROMs like CyanogenMod and Ice Cream Sandwich to run on the Nook Tablet eventually.
Score one more hack for XDA-Developers.
Reversion Package: http://forum.xda-developers.com/showthread.php?t=1402190
1.4.1 restored: http://forum.xda-developers.com/showthread.php?t=1413734
Booting nook tablet from SDCard: http://forum.xda-developers.com/report.php?p=20888654
Nook Tablet Hack Pack: http://forum.xda-developers.com/showthread.php?t=1411379
Setting up uart: http://forum.xda-developers.com/showthread.php?t=1423009
NOP Based Security Bypass: http://forum.xda-developers.com/showthread.php?t=1425044
Join us for xda:devcon 2014. For a limited time, XDA Portal readers get 20% off registration!