Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3
Using ARM SWD with a development board to debug the chip with GDB.
research: https://wallet.fail
DISCLAIMER: The security research shown here was done a while ago and since then the software and hardware was updated; These videos are not sponsored or endorsed by Ledger.
-=[ 💻 Related Products ]=-
→ Ledger Nano S:* https://amzn.to/2VAhMvM
→ USB Hub with switches:* https://amzn.to/2SJuaYv
→ any STM32 Nucleo-64 development board:* https://amzn.to/2VDDE9J
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#HardwareSecurity #ReverseEngineering
Видео Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3 канала LiveOverflow
research: https://wallet.fail
DISCLAIMER: The security research shown here was done a while ago and since then the software and hardware was updated; These videos are not sponsored or endorsed by Ledger.
-=[ 💻 Related Products ]=-
→ Ledger Nano S:* https://amzn.to/2VAhMvM
→ USB Hub with switches:* https://amzn.to/2SJuaYv
→ any STM32 Nucleo-64 development board:* https://amzn.to/2VDDE9J
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#HardwareSecurity #ReverseEngineering
Видео Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3 канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Setup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4](https://i.ytimg.com/vi/V6ZySLopflk/default.jpg)
![EEVblog #499 - What is JTAG and Boundary Scan?](https://i.ytimg.com/vi/TlWlLeC5BUs/default.jpg)
![Blue-pill STM32 Programming Using ST-LINK V2 Dongle](https://i.ytimg.com/vi/KgR3uM21y7o/default.jpg)
![What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through](https://i.ytimg.com/vi/xkdPjbaLngE/default.jpg)
![](https://i.ytimg.com/vi/rHUqOQDWnSI/default.jpg)
![JTAG TAP Controller Tutorial](https://i.ytimg.com/vi/PhaqHKyAvR4/default.jpg)
![Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)](https://i.ytimg.com/vi/FktI4qSjzaE/default.jpg)
![Looking at the PCB & Chips - Hardware Wallet Research #2](https://i.ytimg.com/vi/KGmyDiLrqSo/default.jpg)
![Intro to Hardware Reversing: Finding a UART and getting a shell](https://i.ytimg.com/vi/ZmZuKA-Rst0/default.jpg)
![#274 Free Inline Debugging for ESP32 and Arduino Sketches](https://i.ytimg.com/vi/psMqilqlrRQ/default.jpg)
![Threat Models - Hardware Wallet Research #1](https://i.ytimg.com/vi/MoGzPQhwW9s/default.jpg)
![#03 - How To Find The JTAG Interface - Hardware Hacking Tutorial](https://i.ytimg.com/vi/_FSM_10JXsM/default.jpg)
![Analysing a Firefox Malware browserassist.dll - FLARE-On 2018](https://i.ytimg.com/vi/5cvpGSSUZI0/default.jpg)
![Don't Get Phished! (Phishing Awareness)](https://i.ytimg.com/vi/NWtm4X6L_Cs/default.jpg)
![Uploading Arduino bootloader on a new micro-controller // With J-Link SEGGER, SWD for MCU SAMD21G](https://i.ytimg.com/vi/h2nKROPlFy0/default.jpg)
![STM32 F103 BLUEPILL - Getting Started with Arduino Core](https://i.ytimg.com/vi/zUk0lN1oEwQ/default.jpg)
![Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)](https://i.ytimg.com/vi/6Pf3pY3GxBM/default.jpg)
![JTAG/Boundary Scan: Basics](https://i.ytimg.com/vi/uzlZijwDmB4/default.jpg)
![Identify Bootloader main() and find Button Press Handler - Hardware Wallet Research #5](https://i.ytimg.com/vi/yJbnsMKkRUs/default.jpg)
![9.2 - Debugging - GDB Tutorial](https://i.ytimg.com/vi/bWH-nL7v5F4/default.jpg)