Extracting Firmware from External Memory via JTAG
Demonstration of extracting firmware from an embedded system through the JTAG interface.
The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface (http://dangerousprototypes.com/docs/Bus_Blaster) and UrJTAG open source software (http://urjtag.org).
It's Nerd Thunder month! Check out the folks mentioned at the end of the video:
- Exploitee.rs (IoT/consumer), http://exploitee.rs
- Chris Eagle (IDA/reverse engineering), https://github.com/cseagle
- Azeria (ARM exploitation), https://azeria-labs.com
- Craig Heffner (Routers/network), http://www.devttys0.com
Видео Extracting Firmware from External Memory via JTAG канала Joe Grand
The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface (http://dangerousprototypes.com/docs/Bus_Blaster) and UrJTAG open source software (http://urjtag.org).
It's Nerd Thunder month! Check out the folks mentioned at the end of the video:
- Exploitee.rs (IoT/consumer), http://exploitee.rs
- Chris Eagle (IDA/reverse engineering), https://github.com/cseagle
- Azeria (ARM exploitation), https://azeria-labs.com
- Craig Heffner (Routers/network), http://www.devttys0.com
Видео Extracting Firmware from External Memory via JTAG канала Joe Grand
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware ExtractionEEVblog #499 - What is JTAG and Boundary Scan?Simple Tools and Techniques for Reversing a binary - bin 0x06JTAGulator: Introduction and Demonstration (Expanded)EEVblog #313 - Bus Pirate LCD DebuggingBSidesSF 2018 - The IoT Hacker's Toolkit (David Tomaschik)PROTOCOLS: UART - I2C - SPI - Serial communications #001DEFCON 17: An Open JTAG DebuggerRemote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3Intro to Hardware Reversing: Finding a UART and getting a shellSamy Kamkar's Crash Course in How to Be a Hardware HackerSimple Firmware Extraction w/ Device Programmerlearning to reverse engineer routers - reading serial flash ROMs#03 - How To Find The JTAG Interface - Hardware Hacking TutorialElectronics Reverse Engineering Walkthrough - Hacking the Monoprice Select Mini 3D PrinterHack All The Things: 20 Devices in 45 MinutesFavorite Bus Pirate featuresSetup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4JTAG/Boundary Scan: BasicsIntro to hardware security: UART access and SPI firmware extraction