So an update on what we're working on with USB sniffing, I now using a program called Device Monitoring Studio and I run it when I flash a SBF. It is showing me literally all the data being transferred to the phone. What me and WugFresh are looking for is some clues to the key that signs the SBF as it was from Motorola. That way we can build a SBF with custom kernels and such.
Its alot of data to sift through, but one thing has caught my interest....
2E 4F
3D 4D 6F 74 6F 72 6F 6C 61 20 49 6E 63 2C 20 4F
55 3D 4D 6F 74 6F 72 6F 6C 61 20 50 4B 49 2C 20
43 4E 3D 48 41 42 20 43 41 20 34 34 37 4A E5 EF
4A 67 1D 2B BA 01 00 04 39 4F 3D 4D 6F 74 6F 72
6F 6C 61 20 49 6E 63 2C 20 4F 55 3D 4D 6F 74 6F
72 6F 6C 61 20 50 4B 49 2C 20 43 4E 3D 43 53 46
20 43 41
.O
=Motorola Inc, O
U=Motorola PKI,
CN=HAB CA 447Jåï
Jg.+º...9O=Motor
ola Inc, OU=Moto
rola PKI, CN=CSF
CA
And there's another 100 references to PKI, RSA public, and private keys.
Other devices have been cracked using hardware as opposed to hacking into it, most recently that guy who found the RSA private key for the Apple Airport express. I don't know if any Dev's have even tried taking this approach before but I think I shows some promise.