Extracting and Modifying Firmware with JTAG

Поделиться
HTML-код
  • Опубликовано: 11 янв 2025

Комментарии •

  • @toadtws
    @toadtws Год назад +15

    Great video! Minor vim note: at @17:30, you can use capital R to enter Replace mode. That way you won't have to count anything. Just make sure you only modify ASCII characters.

  • @PeterBagel-ti5xw
    @PeterBagel-ti5xw 7 месяцев назад +7

    Oh my god, just found this channel and it's an absolute goldmine :-) thanks for all the awesome content!

  • @slincolne
    @slincolne 5 месяцев назад +8

    Minor correction to the video - video title states using JTAG to extract firmware, while Matt used SWD instead. JTAG is an industry standard interface, while SWD is more vender specific. Apart from showing the JTAGulator Matt does not actually use it :-(

    • @m0rjjj666
      @m0rjjj666 4 месяца назад

      You can extract it with JTAG, Matt mentioned that, he just used SWT option

    • @jawaljawad4855
      @jawaljawad4855 Месяц назад

      I see you vidéo is good thinks . I work in mcu mec1723 but in j link i cant found this serial i found mec170x how i can add mec1723 if not . I ts possible to connecte mec1723 with config of mec170x . Thinks

  • @jc4190
    @jc4190 2 года назад +4

    Awesome video!! Could you do something with STM chips that are locked sometime soon? My vaguest of vague understanding is that you can sometimes do something with pulling boot select pins low to get it into a debug mode regardless of other configurations, but I don't have the first clue how to actually do that irl. Keep up the great videos m8!

  • @Patrick-ky7ez
    @Patrick-ky7ez Год назад +2

    Your channel is incredible!

  • @sammay1540
    @sammay1540 Год назад +2

    I recently came across your channel and I love your videos. If you ever have a project where you gain practical functionality of a device by hacking it, that would make a great video. Like the security camera sending the stream to a self hosted storage server or other ideas you may have.

  • @goutham24693
    @goutham24693 2 года назад +4

    Hi Matt, very Informative video. Is there any way to convert the binary dump to source code or to understand it better ?

  • @OMNI_INFINITY
    @OMNI_INFINITY Год назад +1

    Where is a repository link to PCB files of that badge? Looks like a nice little capacitive keyboard.

  • @colingill9317
    @colingill9317 Месяц назад

    Hi there,
    Could you help me out. I need to download the firmware from a working C49 controller on a miner, and upload it into a controller I played around with and erased the whole nand from the terminal.
    Any ideas? I have a JTAG DLC 10 programmer, for Xilinx chips.
    Many thanks.

  • @woolfy02
    @woolfy02 Год назад

    I just got a bus pirate 3.6a and, I'm wanting to connect to a device using JTAG. The available pins on it are:
    TDO,TDI,TMS,TCK,GND,RESET
    Do I just connect it the same named pin, as from the bus pirate to the device? (Like TDO - TDO, TDI - TDI...etc etc for all of them). Years ago, I used uart but, I'm not seeing those connections on the board I'm trying to mess around with. I just can't seem to find a guide / tutorial that explains how to set it up for newbs.

  • @PoorRichard-o1u
    @PoorRichard-o1u 10 дней назад

    I would like to see the use of some software that can de-compile a firmware file.

  • @rajivsingh6633
    @rajivsingh6633 Год назад

    Dear sir I have a problem that the mcu has tooll0 pin reset pin vcc and ground .
    How I can extract firmware from the mcu

  • @ggNotSuree
    @ggNotSuree 7 месяцев назад

    Trying to learn all of this and very overwhelmed. Are you able to access the jtag state machine this way? And command the actual registers? I’m reading how to do that, but nobody ever explains how they gain access to do that… and what they are typing the commands on/through…. Sorry if this is a stupid question

  • @shahzadasalim5032
    @shahzadasalim5032 Месяц назад

    sir, can you help to find jtag pinout of NVME, please

  • @michaelmclardy9165
    @michaelmclardy9165 9 месяцев назад

    Can you do the Huawei H112-372? how to get UART and JTAG.

  • @RussellSenior
    @RussellSenior Год назад +3

    Why not just hook up to the SPI NOR flash and dump that way? flashrom, ftw.

    • @mattbrwn
      @mattbrwn  Год назад +1

      This video was specially to demo JTAG

  • @daixtr
    @daixtr 6 месяцев назад

    Hi Matt. What would be your recommended JTAG model brand?

  • @JamesColeman
    @JamesColeman 7 месяцев назад

    I am all for IOT companies not disabling JTAG. Just keep them away from evil maids, and you're all good.

  • @robertbauer6723
    @robertbauer6723 2 года назад +2

    Very informative, great info! Thank you for making this. BTW your audio is really low.

    • @mattbrwn
      @mattbrwn  2 года назад +1

      Thanks! Trying to find the sweet spot with the audio

  • @Finrow1
    @Finrow1 2 года назад +1

    How did you know to use the SI form of Mbit and not the binary form of Mbit?

    • @mattbrwn
      @mattbrwn  2 года назад

      Honestly I guessed 😅

  • @abdennour183
    @abdennour183 8 месяцев назад

    Does the J-link support Atmega32u4 ?

  • @paololuise6514
    @paololuise6514 Год назад +2

    What is the debugger model you are using?

    • @mattbrwn
      @mattbrwn  Год назад

      xgecu tl866ii plus
      Also have the newer xgecu t48

  • @mattp4953
    @mattp4953 2 года назад +1

    So cool! What are you going to push to it next, if anything?

    • @mattbrwn
      @mattbrwn  2 года назад +3

      might require some big time reverse engineering :D I wonder if they released the source code to the badge......

    • @mattp4953
      @mattp4953 2 года назад

      @@mattbrwn another question: can it run doom (just thought of this)

    • @mattp4953
      @mattp4953 2 года назад

      @@mattbrwn have you thrown it into Ghidra yet? Assuming it’s an ELF, Is the binary stripped?

  • @alanwake5927
    @alanwake5927 Год назад

    Where I could buy the student version of the j link

  • @a-listercrowley2737
    @a-listercrowley2737 Год назад +1

    Man I keep seeing JTAG written on different boards
    I'm still a rookie, got a long waaay to go

  • @sercanalnca1962
    @sercanalnca1962 2 месяца назад

    Can we do it on Windows or we have to use Linux?

  • @jesussaeta8383
    @jesussaeta8383 Год назад

    Yes the volume is very low on your end,

  • @turanamo
    @turanamo Год назад +1

    You could have added the part where you locate the h/w key to crack it 😛

  • @MiroslavObrtel
    @MiroslavObrtel Год назад

    And that was preety amazing

  • @baghdadiabdellatif1581
    @baghdadiabdellatif1581 Год назад

    Great work 👌👏

  • @PapaGeegee
    @PapaGeegee Год назад

    Do u have epon firmware for Zte

  • @zombielupin
    @zombielupin Год назад

    what microscope do you use for videos?

  • @welltonmanopelli3224
    @welltonmanopelli3224 Год назад

    Very nice

  • @XenoTravis
    @XenoTravis Год назад

    I dislike that connector style so much. The cable is expensive and the pins will bend easily.

  • @throwaway1076
    @throwaway1076 Год назад +3

    16 megabits is 2 megabytes, which is 0x200000... Converting 20000000 decimal to hex is not 2 megabytes.

  • @BobCat0
    @BobCat0 2 года назад +4

    Your video is flipped.

    • @mattbrwn
      @mattbrwn  2 года назад +4

      lol good catch. I thought I fixed that... I'm kinda new to OBS

  • @JenniferBrown-n3r
    @JenniferBrown-n3r 3 месяца назад

    White Donna Martinez Brenda Lee Scott

  • @bubbasplants189
    @bubbasplants189 8 месяцев назад

    Now to find an old xbox 🤣

  • @levonrockerz4299
    @levonrockerz4299 Год назад

    The last command is not supported by jlink commander v7.88j, start here^[nmatt@ripper badge]$, ..savebin is only working , I am trying to extract stm32f103r8,,

  • @teltechservices7978
    @teltechservices7978 Год назад +1

    amazing man, thank you for the cool stuff , hacked by nmat😊

  • @manueluninteressant9917
    @manueluninteressant9917 2 месяца назад

    Hi matt, do you can read this ic for me?
    Mb9af004bgl-g-103-ere1
    Mb9af004bgl-g-103-k1ere1