Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Поделиться
HTML-код
  • Опубликовано: 1 июн 2024
  • Learn tricks and techniques like these, with us, in our amazing training courses!
    flashback.sh/training
    One of the first things you have to do when hacking and breaking embedded device security is to obtain the firmware. If you're lucky, you can download it from the manufacturer's website or, if you have a shell, you can just copy it over to your computer.
    But what if none of these options are available?
    In this video, we will show you how you can connect directly to a NOR flash chip with the SPI protocol to dump the firmware and find your vulns, even if off the shelf tools don't work!
    00:00 Intro
    00:40 Technical Introduction
    01:55 Flash Memory Types
    03:51 NOR Flash
    06:25 SPI Protocol
    07:55 Our Training
    09:27 Logic Analyzer
    12:04 How SPI Works
    13:53 Firmware Extraction
    Did you enjoy this video? Then follow us on Twitter, and subscribe to our channel for more awesome hacking videos.
    ~ Flashback Team
    flashback.sh
    / flashbackpwn
  • НаукаНаука

Комментарии • 329

  • @TheFlatronify
    @TheFlatronify Год назад +87

    Really informative video, thank you! Sadly I see there will be fewer and fewer devices "hackable" in the near future as more and more manufacturers (especially of routers / e.g. DOCSIS 3.1) start using hardware based encryption technology for their ROM. With little to no possibility to ever read extracted data. What do you think about this?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +115

      We see more vendors using all kinds of firmware protection in their devices but still quite a lot of this can be bypassed. We actually cover this topic and how to bypass firmware encryption in our training.
      Few examples that we have used or seen on real life devices:
      * Firmware upgrade is encrypted but there is decryption binary on the device. All you have to do is reverse or emulate the binary to decrypt outside of the device.
      * Firmware upgrade is encrypted but the actual firmware on the flash is not.
      * Firmware is encrypted but you can get access to a running system.
      * Firmware stored on flash is encrypted but encryption keys are not stored properly or are cached.
      * Firmware is protected by read-only fuse but it would be possible to bypass that check and extract firmware.
      * Side channel attacks allow to reveal encryption keys
      But if vendor did a really good job and encryption material is stored in hardware and it can't be retrieved easily or firmware can't be decrypted, you have to level up - find a zero day vulnerability using black box techniques, which we also did on few occasions. It's always a matter of how much time and energy you can invest on a target.

    • @Neeharpc
      @Neeharpc Год назад +2

      @@FlashbackTeam what about qualcom chipsets ? can we hack it , because they lock the cpu and gpu clock. trustzone and other hardware controles the clock frequencies now , any way to hack it ?

    • @inod5656
      @inod5656 Год назад +10

      smells like scriptkiddy in here

    • @gayusschwulius8490
      @gayusschwulius8490 Год назад +4

      Such encryption is inherently flawed because the mechanism to decrypt must reside within the device itself; so there's always - at least in theory - going to be a way to extract the decryption key from the device. I'm pretty sure the more common this becomes, the more people will find ways to do exactly that.

    • @cadmium1612
      @cadmium1612 Год назад +2

      @mr wpg Spoken like a true engineer. :)

  • @jakesweany2939
    @jakesweany2939 Год назад +181

    Everything is explained clearly without wasting time or over-explaining. Well done.

    • @StarsManny
      @StarsManny Год назад +4

      That's exactly what I was going to say!

  • @MoisesCaster
    @MoisesCaster Год назад +24

    Please never delete this video, it's very helpful.

    • @reegyreegz
      @reegyreegz 24 дня назад

      Download it qnd save it

  • @billclark5943
    @billclark5943 Год назад +11

    Very helpful for someone like myself just beginning to understand this stuff. Explaining the function and description of terminology is something i would normally have to do significant research for.

  • @noambergauz2806
    @noambergauz2806 Год назад +8

    Damn this channel is so underrated.. just stumbled upon this while scrolling but definitely gonna stay for more .. Thanks for explaining this so well!

    • @FlashbackTeam
      @FlashbackTeam  Год назад +2

      Thank you for your kind words. We are working on a new video that we will release in the coming weeks. We are very excited about it and it's going to be just awesome! This time more into vulnerability research and exploit development.

  • @StarsManny
    @StarsManny Год назад +6

    What an entertaining channel! I've been watching some pluralsight and udemy courses recently, and I wish the presenters of those courses had the same style and pace as you guys. You are always interesting. Well done!

  • @terminaltears
    @terminaltears Год назад +3

    Your videos are the best! Please don't stop making the tutorials! Thank you.

  • @idiotwithasolderingiron
    @idiotwithasolderingiron Год назад +36

    I will use this information to fix my kitchen stove as it had a rom checksum error. $400 is way to much for a control board. HACK THE PLANET. RIGHT TO REPAIR.

    • @nethacker91
      @nethacker91 5 месяцев назад +1

      How did it go?

    • @jimlthor
      @jimlthor 4 месяца назад +5

      Burned down their home... 😢

    • @aegoni6176
      @aegoni6176 22 дня назад

      Hope they didn't sue you

    • @idiotwithasolderingiron
      @idiotwithasolderingiron 21 день назад

      I am an Idiot. I failed to get a ROM dump I could read. Might be encrypted. Anyone wanna look at it?

    • @beekydogg
      @beekydogg 9 дней назад

      Why is your smart stove even able to have a checksum error? Why did get a smart stove? 😂

  • @johncooper7636
    @johncooper7636 5 месяцев назад +2

    So dope that you guys put this out for free. If it was near me I would totally attend your in-person training. A paid virtual event would also be awesome.

    • @FlashbackTeam
      @FlashbackTeam  5 месяцев назад

      We will be having both onsite and online trainings this year.

  • @stevekoehn1675
    @stevekoehn1675 Год назад +3

    Perfect! Not to simple, not to complicated, with practical information.. Thank You

  • @pawel753
    @pawel753 Год назад +1

    wow.... this is one of the most fascinating videos I've ever seen on YT....

  • @EmongTimothy
    @EmongTimothy Год назад +7

    More information than from my technical degree in a few minutes

  • @electrolabs337
    @electrolabs337 Год назад +4

    What a beautiful work!. Thank you for sharing your time and effort.

  • @KangJangkrik
    @KangJangkrik Год назад +37

    FYI: most routers are linux-based (e.g. Huawei created their own distro called "Dopra"), which means if you lucky then the flash isn't encrypted and you can mount EXT filesystem from it

    • @superslammer
      @superslammer Год назад +3

      They usually add a header to the firmware that you need to strip out.

    • @KangJangkrik
      @KangJangkrik Год назад +1

      @@superslammer you're right! I did figured out weeks ago on my old huawei router

    • @superslammer
      @superslammer Год назад +3

      @@KangJangkrik linux to the rescue :D

  • @Anx181
    @Anx181 Год назад +3

    Yesss! I love to see you back!
    Pleasee consider to upload more often

  • @ProfessorLinux
    @ProfessorLinux 19 дней назад +1

    Very interesting, and looking forward to more content!

  • @ZeekSuds
    @ZeekSuds Год назад +2

    impressive stuff guys. I'm just getting started with electrical engineering. I've been seeing that a lot of intelligence agencies like to play games with each other at this level. It's all really fascinating.

  • @kevinwydler7305
    @kevinwydler7305 Год назад +1

    I just discovered your team, thank you so much for this interesting content!

  • @setoman1
    @setoman1 Год назад +1

    I applaud your patience. My method of IoT “hacking” involves only two steps. Search, then destroy. I may start posting my handywork on another platform.

  • @diegolucassilva5994
    @diegolucassilva5994 Год назад +1

    That's nice. Great video brother!

  • @catharperfect7036
    @catharperfect7036 13 дней назад +1

    You are a proper educator. Insta-subbed.

  • @trumanhw
    @trumanhw Год назад +2

    I'll be promoting you guys in all the forums I'm in ... STARTING with this video!!

  • @theblankuser
    @theblankuser Год назад +4

    Damn this channel is a hidden gem

  • @axelandru9346
    @axelandru9346 28 дней назад +1

    Simple, efficient, educative !

  • @plunder573
    @plunder573 Год назад +1

    Thanks for this content we can see al the time you have spend to make this incredible video !

  • @justusjonas8506
    @justusjonas8506 Год назад +5

    Thanks for this content, it is really well explained.

  • @pseabrook
    @pseabrook Год назад +1

    Love these videos flashback team!

  • @NullPointerExpert
    @NullPointerExpert Год назад +3

    I'd propose that while getting firmware images from a manufacturer's website is the easiest path, it still leaves the question of whether the firmware on the device is the same that is currently flashed to the device. While higher risk, and effort, pulling the firmware from the device is the most deterministic way to get the current firmware.

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      Yes, that's a very good point. Plus you can find extra info, i. e. Device's config that is not part of the firmware downloaded from vendor.

  • @jonathanolowinsky1493
    @jonathanolowinsky1493 Год назад +4

    This is really interesting, thank you for this content. Have you ever thought about analysing the SONOS smart speakers? I know that there is a lot of people interested in understanding these in order to be able to analyse the protocols used so that they can add their own DIY builds like with a raspberry pi to the network

  • @egybadboy79
    @egybadboy79 Год назад +1

    This channel is a treasure..

  • @interestingamerican3100
    @interestingamerican3100 Год назад +2

    I DEFINUTELY subscribed to this channel! F'ing quality bro!

  • @alfatech8604
    @alfatech8604 Год назад +2

    lol 😆🤣 9:55 oh Jesus got me cracking but all jokes aside this is one of the best well explained video on firmware extraction thanks

  • @PcParamedics868
    @PcParamedics868 Год назад +1

    WOW mind blow stunmbled on this channel and glued to the screen...

  • @crazyhacker2437
    @crazyhacker2437 Год назад +12

    Please regularly upload such a knowledgeable videos. After long time I am watching your videos. Love from India 🙏

  • @HelloYohan
    @HelloYohan 4 месяца назад +1

    Very good hacking ! Nice job guys. I hope one day I can do your training session

  • @jacodiedericks3045
    @jacodiedericks3045 Год назад +1

    Ima download it thanks for sharing!!

  • @UnCoolDad
    @UnCoolDad Год назад +1

    Interesting. Look forward to more content.

  • @miladgolfam49
    @miladgolfam49 Год назад +1

    thank you so much, Ive learnt alot from you in this video.

  • @gabriele5785
    @gabriele5785 Год назад +1

    I was waiting so bad for a new video! Great

  • @romyaz1713
    @romyaz1713 23 дня назад +1

    one of the essential videos on youtube )

  • @Howard-mr8xo
    @Howard-mr8xo 2 дня назад

    Amazing vid ... found a new rabbit hole .... yeeee haw

  • @bmacd11b
    @bmacd11b Год назад +9

    You should consider offering a recorded ‘on demand’ version of the course. I would buy it!

  • @in70x
    @in70x Год назад +3

    Lmao! Alright you got me with the Saleae joke.

  • @kagandemirarslan872
    @kagandemirarslan872 Год назад +1

    Pls more videos ! Thats awesome

  • @markmorillo9619
    @markmorillo9619 Год назад +1

    Thank you, it works perfect!

  • @florinburian7291
    @florinburian7291 Год назад +2

    Truly impressive!

  • @jamesmcmasters9392
    @jamesmcmasters9392 Год назад +1

    Very nice simple and clean

  • @abdulrehmantanveer5354
    @abdulrehmantanveer5354 Год назад +1

    He's so good at what he does.

  • @alexcrouse
    @alexcrouse Год назад +1

    Great work!

  • @Bianchi77
    @Bianchi77 Год назад +1

    Nice info, thanks :)

  • @AxWxK
    @AxWxK Год назад +6

    Nice! Used a similar process a few years back for some NAND flash. Didn't know about the hydrabus back then though. Instead I wrote a plugin using the older version of Saleae's SDK to dump the data of read commands to a binary file. Then had to do a little post-processing to get rid of the error correction codes that NAND has to transmit. Glad to see content showing an approach to the process!

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      In the past we were using Teensy with custom code to dump NAND Flash. Worth giving it a try too! But of course the most efficient is to simply use a programmer, but less fun.

    • @AxWxK
      @AxWxK Год назад +1

      @@FlashbackTeam Lots of lessons learned! I don't think I knew what a programmer was at the time. We relied on the SoC's bootloader to copy the file system from flash and we just copied the bus. Asking the flash to kindly show us its memory would have definitely been more elegant 😂. Luckily the flash data at rest wasn't encrypted!

  • @theengineer9910
    @theengineer9910 4 месяца назад +1

    great video !

  • @ansharya4880
    @ansharya4880 Год назад +1

    hanks lot Sir.. You helping us..

  • @caleb7799
    @caleb7799 Год назад +2

    I particularly like the sound quality during the NOR description!

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      Thank you! We are slowly improving our recording hardware and editing techniques :-)

  • @ruimineiro746
    @ruimineiro746 Год назад +3

    Muito bom !!
    Obrigado.
    Tudo de bom para ti Pedro e também para o Radek.

  • @HollyTroll
    @HollyTroll Год назад +2

    this is some good quality stuff (even if i dont understand half of it lol)

  • @PCBWay
    @PCBWay Год назад +1

    that's really good!

  • @drewwilson8756
    @drewwilson8756 Год назад +1

    Interesting. Thanks!

  • @nikoboulikas1631
    @nikoboulikas1631 Год назад

    Excellent! used for hikvision

  • @user-yn5te8vj5j
    @user-yn5te8vj5j 11 месяцев назад

    I understand the general idea but executing it is a different story. I'm no hacker but this is very informative in itself. 👍

  • @soaphornseuo8630
    @soaphornseuo8630 Год назад +1

    Great resource

  • @jefersonmedeiros7677
    @jefersonmedeiros7677 Год назад +1

    Very Nice!

  • @maksymkashchuk5420
    @maksymkashchuk5420 Год назад +5

    Wow, it was cool to see how embedded devices get hacked as for man who is interested in embedded and IoT. Thanks for video

  • @ahmedwaheed7511
    @ahmedwaheed7511 Год назад +1

    well Done! Very helpful, like from Pakistan

  • @vibrion121
    @vibrion121 Год назад

    Quite interesting video!. Im thinking to apply this tecnique to a grandstream fxs voip adapter: i have two, one working properly another bricked (extract ok -> write bricked). It seems a corrupted flash , so it worth the effort

  • @cheaterman49
    @cheaterman49 Год назад +3

    This is really cool! I wanna dump the firmware of my e-scooter to hack it a bit, I didn't realize it could be that trivial :-) hopefully I get lucky and I can read/write firmware that easily!

    • @FlashbackTeam
      @FlashbackTeam  Год назад +2

      We're happy you got inspired. Keep in mind that it all depends on where a firmware is stored. If it's external flash it is relatively easy. If firmware is stored within SoC/MCU then it won't be that easy as most likely there will be read protection that would need to be bypassed first.

    • @cheaterman49
      @cheaterman49 Год назад +1

      @@FlashbackTeam That's exactly what I was thinking - I use MCUs for work stuff, and it's not necessarily that easy to dump their firmware given their flash is on-chip! I'm just hoping I might get lucky with the e-scooters one way or another ; if not dumping existing firmware to reverse it and tweak it, then perhaps finding an open source reimplementation that I could flash onto the chip, or making a new board myself if I have to (the main control board in that scooter isn't the one doing power distribution to drive the motors, so it's not unrealistic to just make my own, just will take more time...)

  • @crackwitz
    @crackwitz 7 месяцев назад +1

    Reassembling the memory from just sniffed traffic is feasible... But you only get the parts that are actually read. Might have to exercise the device a little so you get better coverage. Boot sequence might be enough to get a foot in.

  • @youngmonk3801
    @youngmonk3801 Год назад +1

    wow...nice!

  • @ChinoBuchonMX
    @ChinoBuchonMX Год назад +1

    Excelent video.

  • @slgadgetman
    @slgadgetman Год назад +2

    very informative video !

  • @mantisthefirst
    @mantisthefirst Год назад +1

    pięknie, mega wideo ;)

  • @stevdodd7515
    @stevdodd7515 Год назад +2

    Finally found something useful information 🤠

  • @colbyhartman9467
    @colbyhartman9467 Год назад +1

    Iv just found this channel though a other channel and brother learning curve on both wow thinking 🤔 ik what I want to do

  • @kaderdz4564
    @kaderdz4564 Год назад

    Jucy info good work

  • @Toto-cm5ux
    @Toto-cm5ux Год назад +1

    I love you !!

  • @johnjacobjinglehimerschmid3555
    @johnjacobjinglehimerschmid3555 Год назад +1

    Amazing ....

  • @joseperez-bw1iz
    @joseperez-bw1iz Год назад +1

    thx dude

  • @migojolo2933
    @migojolo2933 Месяц назад

    You're my Master 🌹❤️

  • @JackSparrow-tt3xg
    @JackSparrow-tt3xg Год назад +1

    Amazing Video, Any time coming to India for training?!

  • @maxc7198
    @maxc7198 21 день назад +1

    Real stuff

  • @TenjinAerospace
    @TenjinAerospace Год назад

    great video, I have a question though , I did EEPROM dump from a speedometer cluster quite a few times, nothing illegal, since I'm into car repair business , some vehicles come with bad clusters and guy would bring another one from a dump and asked me to program the mileage that would correspondent to vehicle being repaired , now there is a program that once you got your dump would calculate new hex value for new given mileage , however this generator software only works for certain vehicle brands, I wonder why same hex value for a given number gets interpreted as a different number in terms of mileage on different eeproms ? thanks

  • @stevekoehn1675
    @stevekoehn1675 Год назад +1

    You guys with the accents are smart, sometimes its too much work to understand. You speak clearly, everything about the presentation is perfect. You make it easy to understand things I should already know. Thanks

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      We are not native English speakers, but we always provide proper English subtitles (edited by us, not auto translated) in case you can't understand us / hate our voices :-)

  • @AiMR
    @AiMR Год назад +1

    Great video! Hey, is there a less expensive alternative to the Saleae Logic Analyzer that will achieve similar results?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +2

      There are some Chinese clones of Saleae, such as this one: www.sigrok.org/wiki/MCU123_Saleae_Logic_clone
      Unfortunately Saleae doesn't sell the small 4 channel cheaper version that we show in the video any more. But keep in mind this version can't sniff high speed protocols like USB, while the other Saleae big boys can.
      If you're doing it as a hobby, I guess the Chinese clones work well enough. But if you are going to take this seriously, we highly recommend buying a proper Saleae.

  • @sunshinestudy3245
    @sunshinestudy3245 Год назад

    Hello, Flashback.
    I have a question. 16:59 and 17:42
    The datasheet told us to use the Rising Clock. but why? Saleae told us the data use Falling Clock.

  • @manuelmartinezbonilla9298
    @manuelmartinezbonilla9298 Год назад +2

    ¡Gracias!

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      Thank you very much for supporting our channel!

  • @user-mp9um5qj3u
    @user-mp9um5qj3u 24 дня назад

    Hi flashback team. I want to understand and do things like what u doing but I don't know where to start learning.
    I know C programming (intermediate), I know data structures and algorithms, currently learning digital electronics, operating system and computer networks but I don't know where to proceed further actually doing these things.
    Any advice is highly appreciated.

  • @SteveJones172pilot
    @SteveJones172pilot Год назад +1

    Really great video.. I've never done this, but have most of the tools and have been thinking of trying it just for fun.. I'm curious though - When you are powering that EEPROM from the clip, I'd be worried that I'd also be backfeeding power to the rest of the circuit, and potentially causing it to boot up, which might cause the MCU to start taking over the SPI bus.. Is there some way to guarantee you're only powering the memory that I'm missing, or is this really not as big of a problem as I am envisioning? Could techniques like finding the reset pin on the MCU and holding it low to prevent booting perhaps be a good workaround? Any other hints? How much experience is needed before I shouldn't expect to be completely lost in one of your in person training classes!?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +2

      Hi. Thanks for your feedback. Very interesting questions.
      1) From our experience, some boards would indeed be powered-up when we connect to the chip. Keep in mind, that we are supplying 3.3V so I assume it really depends on the board design. However, we didn't find it a big of an issue for us. When this happens, we usually wait a bit to increase the chance that the SPI bus is free. On many targets, after the boot process is finished and firmware placed in memory, there is much less data being fetched by a CPU compared to a booting stage. We just start our dump at that moment. Also, SPI protocol has that CS line which selects a chip. So all in all, it's not big of an issue for us. But keep in mind we are not electronics engineers, we are just hacking those devices using whatever works for us.
      2) The reset pin technique is a very good idea. In fact we used it in the past on one of the target but for a different purpose.
      3) If you can interrupt boot sequence, for example by entering bootloader menu, there should be very little interaction with the chip.
      4) So far in most of the cases we didn't have to desolder SPI chip to read content from it. Usually in-circuit and it just works. It is on a contrary to NAND TSOP-48. Those almost never work in-circuit and we need to desolder it.
      5) As for the training, it's an intermediate level course. The hardware part is on first day and we always use hw hacking only for the purpose of getting the firmware or enabling debugging. Sort of a first step in the chain. Then on the remaining days we move on to vulnerability finding and exploitation. For that reason, a student needs to have a good linux command line knowledge and some basics of reverse engineering and C knowledge. But we never leave anybody behind.

    • @phr3ui559
      @phr3ui559 8 месяцев назад

      which MCU

  • @internet.security.analyst
    @internet.security.analyst 7 месяцев назад +1

    Good

  • @ahmadali-ik5nb
    @ahmadali-ik5nb Год назад +1

    Thx

  • @douglasalmeida6878
    @douglasalmeida6878 Год назад

    How extract firmware from a altera device with jtag? Great work!

  • @OMNI_INFINITY
    @OMNI_INFINITY 10 месяцев назад

    Nice video. Sad it used such a proprietary board, but thankful that board is open source.

  • @oldpain7625
    @oldpain7625 Год назад +1

    Cool! I'd like to see more of the data extracted and what you can do with it. Translate to English so to speak.

  • @jraulc
    @jraulc Год назад +1

    A new subscriber here, but is unfair when channels like this are Not popping up more often on the recommendations when the algorithm know I'm tech nerdy...

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      Happy you like it! It looks like RUclips algorithm finally decided to give our channel a chance!

  • @wowcolors
    @wowcolors Год назад +2

    I don't understand how you read the SPI flash in circuit on the target board. Doesn't applying power to the SPI flash chip power up the target board processor and thus both are trying to read (push pull) on the same data lines? Can't this blow out the drivers in the target board processor?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      Yes, applying power to chip in many cases will boot up entire board. As you mentioned, this can result in both us and a target to compete and race for the resources. However, from our experience, in those situation we usually wait a bit and after the target has done reading from flash we can start flash dumping.

    • @wowcolors
      @wowcolors Год назад +1

      @@FlashbackTeam Even when the CPU is not actively talking to the flash the lines are still in push-pull not high impedance so how can you talk to the chip without blowing up the line drivers in the cpu?

  • @pedrovelazquez138
    @pedrovelazquez138 Год назад +2

    I remember encountering myself with a "Flashrom repository" or something like that. It had tons and tons of Flash Chips to look at, so much that I got overwhelmed with the information.
    It is great that nowadays reverse engineering is becoming something more common.
    Greetings from Paraguay.

  • @armincal9834
    @armincal9834 19 дней назад

    Do we really need all the extra hardware(like hydra)? Cant we just use an arduino or even a breadboard mcu and program it to read from the memory? Or does hydra do more than just read from the memory?

  • @davidwittman7975
    @davidwittman7975 Год назад +8

    What is the name of the blue clip you're using to connect to the legs of the chip?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +10

      They are called Ponoma clips, and they're much more expensive than "normal" clips, but well worth the extra money.

    • @MCgranat999
      @MCgranat999 Год назад +1

      Yeah, the normal clips are garbage. I'll check the Ponoma clip then!
      You're the first one I've done across that mentioned the name of the better clip so now I'll be able to actually buy one xP

  • @kjrey9878
    @kjrey9878 Год назад

    Why are you not at BlackHat?! This was excellent video!

  • @n-i-n-o
    @n-i-n-o Год назад +1

    Dear Santa.. I know what I want for Christmas. :D

  • @ecaparts
    @ecaparts Год назад +2

    MISO line - "data should be shitted out" 😂
    I get it now, why its called firmware 'dumping'...
    Very informative video, thank you!

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      It's shifted, not shi**ed! :D

    • @ecaparts
      @ecaparts Год назад +1

      @@FlashbackTeam Haha. Maybe it’s the accent. It really sounds like it at 13:16 😂
      Thanks again for the very informative video!