Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Поделиться
HTML-код
  • Опубликовано: 25 янв 2025

Комментарии • 356

  • @TheFlatronify
    @TheFlatronify 2 года назад +107

    Really informative video, thank you! Sadly I see there will be fewer and fewer devices "hackable" in the near future as more and more manufacturers (especially of routers / e.g. DOCSIS 3.1) start using hardware based encryption technology for their ROM. With little to no possibility to ever read extracted data. What do you think about this?

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +142

      We see more vendors using all kinds of firmware protection in their devices but still quite a lot of this can be bypassed. We actually cover this topic and how to bypass firmware encryption in our training.
      Few examples that we have used or seen on real life devices:
      * Firmware upgrade is encrypted but there is decryption binary on the device. All you have to do is reverse or emulate the binary to decrypt outside of the device.
      * Firmware upgrade is encrypted but the actual firmware on the flash is not.
      * Firmware is encrypted but you can get access to a running system.
      * Firmware stored on flash is encrypted but encryption keys are not stored properly or are cached.
      * Firmware is protected by read-only fuse but it would be possible to bypass that check and extract firmware.
      * Side channel attacks allow to reveal encryption keys
      But if vendor did a really good job and encryption material is stored in hardware and it can't be retrieved easily or firmware can't be decrypted, you have to level up - find a zero day vulnerability using black box techniques, which we also did on few occasions. It's always a matter of how much time and energy you can invest on a target.

    • @Neeharpc
      @Neeharpc 2 года назад +2

      @@FlashbackTeam what about qualcom chipsets ? can we hack it , because they lock the cpu and gpu clock. trustzone and other hardware controles the clock frequencies now , any way to hack it ?

    • @inod5656
      @inod5656 2 года назад +11

      smells like scriptkiddy in here

    • @gayusschwulius8490
      @gayusschwulius8490 2 года назад +4

      Such encryption is inherently flawed because the mechanism to decrypt must reside within the device itself; so there's always - at least in theory - going to be a way to extract the decryption key from the device. I'm pretty sure the more common this becomes, the more people will find ways to do exactly that.

    • @cadmium1612
      @cadmium1612 2 года назад +2

      @mr wpg Spoken like a true engineer. :)

  • @jakesweany2939
    @jakesweany2939 2 года назад +201

    Everything is explained clearly without wasting time or over-explaining. Well done.

    • @StarsManny
      @StarsManny 2 года назад +3

      That's exactly what I was going to say!

  • @MoisesCaster
    @MoisesCaster 2 года назад +35

    Please never delete this video, it's very helpful.

    • @reegyreegz
      @reegyreegz 8 месяцев назад

      Download it qnd save it

  • @noambergauz2806
    @noambergauz2806 Год назад +13

    Damn this channel is so underrated.. just stumbled upon this while scrolling but definitely gonna stay for more .. Thanks for explaining this so well!

    • @FlashbackTeam
      @FlashbackTeam  Год назад +3

      Thank you for your kind words. We are working on a new video that we will release in the coming weeks. We are very excited about it and it's going to be just awesome! This time more into vulnerability research and exploit development.

  • @billclark5943
    @billclark5943 2 года назад +12

    Very helpful for someone like myself just beginning to understand this stuff. Explaining the function and description of terminology is something i would normally have to do significant research for.

  • @johncooper7636
    @johncooper7636 Год назад +2

    So dope that you guys put this out for free. If it was near me I would totally attend your in-person training. A paid virtual event would also be awesome.

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      We will be having both onsite and online trainings this year.

  • @KangJangkrik
    @KangJangkrik 2 года назад +39

    FYI: most routers are linux-based (e.g. Huawei created their own distro called "Dopra"), which means if you lucky then the flash isn't encrypted and you can mount EXT filesystem from it

    • @superslammer
      @superslammer 2 года назад +3

      They usually add a header to the firmware that you need to strip out.

    • @KangJangkrik
      @KangJangkrik 2 года назад +1

      @@superslammer you're right! I did figured out weeks ago on my old huawei router

    • @superslammer
      @superslammer 2 года назад +3

      @@KangJangkrik linux to the rescue :D

  • @pawel753
    @pawel753 2 года назад +1

    wow.... this is one of the most fascinating videos I've ever seen on YT....

  • @noobsplain
    @noobsplain 2 года назад +4

    Your videos are the best! Please don't stop making the tutorials! Thank you.

  • @bradrickrobinson7452
    @bradrickrobinson7452 7 месяцев назад +1

    Thank you for explaining this for those who are trying to get into this line of work but find it difficult to do so. Keep up the great work!!!

  • @manuelmartinezbonilla9298
    @manuelmartinezbonilla9298 2 года назад +2

    ¡Gracias!

    • @FlashbackTeam
      @FlashbackTeam  2 года назад

      Thank you very much for supporting our channel!

  • @crazyhacker2437
    @crazyhacker2437 2 года назад +12

    Please regularly upload such a knowledgeable videos. After long time I am watching your videos. Love from India 🙏

  • @trumanhw
    @trumanhw 2 года назад +3

    I'll be promoting you guys in all the forums I'm in ... STARTING with this video!!

  • @PcParamedics868
    @PcParamedics868 2 года назад +3

    WOW mind blow stunmbled on this channel and glued to the screen...

  • @EmongTimothy
    @EmongTimothy 2 года назад +8

    More information than from my technical degree in a few minutes

  • @NullPointerExpert
    @NullPointerExpert 2 года назад +5

    I'd propose that while getting firmware images from a manufacturer's website is the easiest path, it still leaves the question of whether the firmware on the device is the same that is currently flashed to the device. While higher risk, and effort, pulling the firmware from the device is the most deterministic way to get the current firmware.

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +1

      Yes, that's a very good point. Plus you can find extra info, i. e. Device's config that is not part of the firmware downloaded from vendor.

  • @theblankuser
    @theblankuser 2 года назад +4

    Damn this channel is a hidden gem

  • @electrolabs337
    @electrolabs337 2 года назад +5

    What a beautiful work!. Thank you for sharing your time and effort.

  • @setoman1
    @setoman1 2 года назад +1

    I applaud your patience. My method of IoT “hacking” involves only two steps. Search, then destroy. I may start posting my handywork on another platform.

  • @egybadboy79
    @egybadboy79 2 года назад +1

    This channel is a treasure..

  • @ZeekSuds
    @ZeekSuds 2 года назад +3

    impressive stuff guys. I'm just getting started with electrical engineering. I've been seeing that a lot of intelligence agencies like to play games with each other at this level. It's all really fascinating.

  • @stevekoehn1675
    @stevekoehn1675 2 года назад +4

    Perfect! Not to simple, not to complicated, with practical information.. Thank You

  • @bmacd11b
    @bmacd11b 2 года назад +9

    You should consider offering a recorded ‘on demand’ version of the course. I would buy it!

  • @rgb123-jm5mc
    @rgb123-jm5mc Месяц назад

    Nothing better than the legitimate duo

  • @StarsManny
    @StarsManny 2 года назад +6

    What an entertaining channel! I've been watching some pluralsight and udemy courses recently, and I wish the presenters of those courses had the same style and pace as you guys. You are always interesting. Well done!

  • @Anx181
    @Anx181 2 года назад +3

    Yesss! I love to see you back!
    Pleasee consider to upload more often

  • @pseabrook
    @pseabrook 2 года назад +1

    Love these videos flashback team!

  • @ZaukataChen
    @ZaukataChen Месяц назад

    Thanks for sharing all your knowledge and experience.. 🙌

  • @catharperfect7036
    @catharperfect7036 8 месяцев назад +1

    You are a proper educator. Insta-subbed.

  • @HelloYohan
    @HelloYohan Год назад +1

    Very good hacking ! Nice job guys. I hope one day I can do your training session

  • @botjoe10
    @botjoe10 6 месяцев назад +1

    could you use spi to upload flash files? would this be a way to fix "bricked" motherboards?

    • @FlashbackTeam
      @FlashbackTeam  6 месяцев назад +1

      Yes. You can also write using SPI. And yes, you can fix bricked motherboards this way. In fact, we did it in the past. After bios update of one of our laptops, it got bricked and we overwrote bios flash using SPI to restore it.

  • @alfatech8604
    @alfatech8604 2 года назад +2

    lol 😆🤣 9:55 oh Jesus got me cracking but all jokes aside this is one of the best well explained video on firmware extraction thanks

  • @diegolucassilva5994
    @diegolucassilva5994 2 года назад +1

    That's nice. Great video brother!

  • @crackwitz
    @crackwitz Год назад +1

    Reassembling the memory from just sniffed traffic is feasible... But you only get the parts that are actually read. Might have to exercise the device a little so you get better coverage. Boot sequence might be enough to get a foot in.

  • @ProfessorLinux
    @ProfessorLinux 8 месяцев назад +1

    Very interesting, and looking forward to more content!

  • @justusjonas8506
    @justusjonas8506 2 года назад +5

    Thanks for this content, it is really well explained.

  • @kevinwydler7305
    @kevinwydler7305 Год назад +1

    I just discovered your team, thank you so much for this interesting content!

  • @AxWxK
    @AxWxK 2 года назад +6

    Nice! Used a similar process a few years back for some NAND flash. Didn't know about the hydrabus back then though. Instead I wrote a plugin using the older version of Saleae's SDK to dump the data of read commands to a binary file. Then had to do a little post-processing to get rid of the error correction codes that NAND has to transmit. Glad to see content showing an approach to the process!

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +1

      In the past we were using Teensy with custom code to dump NAND Flash. Worth giving it a try too! But of course the most efficient is to simply use a programmer, but less fun.

    • @AxWxK
      @AxWxK 2 года назад +1

      @@FlashbackTeam Lots of lessons learned! I don't think I knew what a programmer was at the time. We relied on the SoC's bootloader to copy the file system from flash and we just copied the bus. Asking the flash to kindly show us its memory would have definitely been more elegant 😂. Luckily the flash data at rest wasn't encrypted!

  • @davidwittman7975
    @davidwittman7975 2 года назад +8

    What is the name of the blue clip you're using to connect to the legs of the chip?

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +10

      They are called Ponoma clips, and they're much more expensive than "normal" clips, but well worth the extra money.

    • @MCgranat999
      @MCgranat999 2 года назад +1

      Yeah, the normal clips are garbage. I'll check the Ponoma clip then!
      You're the first one I've done across that mentioned the name of the better clip so now I'll be able to actually buy one xP

  • @ZidanBaroi.2006
    @ZidanBaroi.2006 Месяц назад

    Concise and compherensive 👌👌

  • @axelandru9346
    @axelandru9346 8 месяцев назад +1

    Simple, efficient, educative !

  • @wowcolors
    @wowcolors Год назад +2

    I don't understand how you read the SPI flash in circuit on the target board. Doesn't applying power to the SPI flash chip power up the target board processor and thus both are trying to read (push pull) on the same data lines? Can't this blow out the drivers in the target board processor?

    • @FlashbackTeam
      @FlashbackTeam  Год назад +1

      Yes, applying power to chip in many cases will boot up entire board. As you mentioned, this can result in both us and a target to compete and race for the resources. However, from our experience, in those situation we usually wait a bit and after the target has done reading from flash we can start flash dumping.

    • @wowcolors
      @wowcolors Год назад +1

      @@FlashbackTeam Even when the CPU is not actively talking to the flash the lines are still in push-pull not high impedance so how can you talk to the chip without blowing up the line drivers in the cpu?

    • @moldo8811
      @moldo8811 5 месяцев назад

      @@wowcolorsbecause the current to power up that chip is very low, and almost no current flowing through the data lines. It’s hard to burn something without enough current.

  • @olafschermann1592
    @olafschermann1592 Год назад +2

    What about reading firmware out of chips with included flash like STM32F4? They are often read-out protected against firmware extraction.

    • @FlashbackTeam
      @FlashbackTeam  Год назад +2

      You are right. In most of the cases, microcontrollers with internal flash are shipped with read protection. In those cases different techniques are needed. Unfortunately they are not-standardized and attack path would need to be unique per MCU family. One of the approaches here could be using fault injection to attack bootloader / early routines that checks a fuse state.

    • @arturschmidt2728
      @arturschmidt2728 11 месяцев назад

      Possibilities to going further into this for us? I need extract a firmware from uController too...

  • @DiegoSilva-dv9uf
    @DiegoSilva-dv9uf Год назад +1

    Valeu!

  • @plunder573
    @plunder573 2 года назад +1

    Thanks for this content we can see al the time you have spend to make this incredible video !

  • @romyaz1713
    @romyaz1713 8 месяцев назад +1

    one of the essential videos on youtube )

  • @meltedcheese1091
    @meltedcheese1091 Месяц назад

    Holy crap, that hydra bus is a lot more expensive than I thought it was gonna be

  • @interestingamerican3100
    @interestingamerican3100 2 года назад +2

    I DEFINUTELY subscribed to this channel! F'ing quality bro!

  • @philoffhistree
    @philoffhistree 5 месяцев назад

    you can use a pico as the logic analyzer and as a hydro thing

  • @charleshines2142
    @charleshines2142 Месяц назад

    About UFS, there are also UFS memory cards that look like MicroSD cards at first glance. They are said to be a lot faster than MicroSD. The only problem is that not a lot of devices use them. The funny thing is and I may be mistaken on it too BTW is that they re royalty free. If that is true I don't see any reason other than having to redesign things as the reason for no one switching over to it. Maybe they have a serious flaw and that is the reason why you don't see a lot of devices aside from a couple Samsung phones and laptops. Samsung may have something to do with the format but I do not believe that they were the only ones who created it. I don't believe that it is proprietary to Samsung at all but instead no one wanted to use it for some reason.

  • @DamjanDimitrioski
    @DamjanDimitrioski 2 года назад +4

    I found in my Rog Strix laptop some interface called JDEBUG2, which has 15 pins. Not really an embedded device, but I wanted to know more details on this interface and whether I can have some commands to show me laptop's diagnostics :).

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +1

      You can use a signal analyser like the one we show in the video to try and understand what it is. With that number of pins and name, a quick (probably wrong) guess would be JTAG. However, we would be very surprised if JTAG is enabled on a laptop shipped to the public!

    • @DamjanDimitrioski
      @DamjanDimitrioski 2 года назад +1

      @@FlashbackTeam ok, but do you have any info about what could JDEBUG2 stands for? The only thing I can research on google is asus related posts and jdebug on the java JVM.
      I will try to crossmatch jtag and jdebug for a test on a new search quest :).

    • @FlashbackTeam
      @FlashbackTeam  2 года назад

      Hard to tell what sort of debug interface it could be. I think best is if you find a schematic for this laptop. There should be a diagram and description of the interface. Maybe try to ask on some laptop repair forums / YT channels?

    • @ioanbustean7442
      @ioanbustean7442 2 года назад

      @@DamjanDimitrioski JDEBUG2 is JTAG Debug (header number 2) :) It's a debugging interface for troubleshooting eventual motherboards issues.

    • @DamjanDimitrioski
      @DamjanDimitrioski 2 года назад

      @@ioanbustean7442 thanks, any specific specification url or more info about header number 2?

  • @sunshinestudy3245
    @sunshinestudy3245 2 года назад

    Hello, Flashback.
    I have a question. 16:59 and 17:42
    The datasheet told us to use the Rising Clock. but why? Saleae told us the data use Falling Clock.

  • @cheaterman49
    @cheaterman49 2 года назад +3

    This is really cool! I wanna dump the firmware of my e-scooter to hack it a bit, I didn't realize it could be that trivial :-) hopefully I get lucky and I can read/write firmware that easily!

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +2

      We're happy you got inspired. Keep in mind that it all depends on where a firmware is stored. If it's external flash it is relatively easy. If firmware is stored within SoC/MCU then it won't be that easy as most likely there will be read protection that would need to be bypassed first.

    • @cheaterman49
      @cheaterman49 2 года назад +1

      @@FlashbackTeam That's exactly what I was thinking - I use MCUs for work stuff, and it's not necessarily that easy to dump their firmware given their flash is on-chip! I'm just hoping I might get lucky with the e-scooters one way or another ; if not dumping existing firmware to reverse it and tweak it, then perhaps finding an open source reimplementation that I could flash onto the chip, or making a new board myself if I have to (the main control board in that scooter isn't the one doing power distribution to drive the motors, so it's not unrealistic to just make my own, just will take more time...)

  • @abdulrehmantanveer5354
    @abdulrehmantanveer5354 2 года назад +1

    He's so good at what he does.

  • @miladgolfam49
    @miladgolfam49 2 года назад +1

    thank you so much, Ive learnt alot from you in this video.

  • @jacodiedericks3045
    @jacodiedericks3045 2 года назад +1

    Ima download it thanks for sharing!!

  • @Howard-mr8xo
    @Howard-mr8xo 8 месяцев назад +1

    Amazing vid ... found a new rabbit hole .... yeeee haw

  • @caleb7799
    @caleb7799 2 года назад +2

    I particularly like the sound quality during the NOR description!

    • @FlashbackTeam
      @FlashbackTeam  2 года назад

      Thank you! We are slowly improving our recording hardware and editing techniques :-)

  • @DarkDiamond007
    @DarkDiamond007 2 года назад +4

    This is really interesting, thank you for this content. Have you ever thought about analysing the SONOS smart speakers? I know that there is a lot of people interested in understanding these in order to be able to analyse the protocols used so that they can add their own DIY builds like with a raspberry pi to the network

  • @stevekoehn1675
    @stevekoehn1675 2 года назад +1

    You guys with the accents are smart, sometimes its too much work to understand. You speak clearly, everything about the presentation is perfect. You make it easy to understand things I should already know. Thanks

    • @FlashbackTeam
      @FlashbackTeam  2 года назад

      We are not native English speakers, but we always provide proper English subtitles (edited by us, not auto translated) in case you can't understand us / hate our voices :-)

  • @surajmandal_567
    @surajmandal_567 8 месяцев назад +1

    Hi flashback team. I want to understand and do things like what u doing but I don't know where to start learning.
    I know C programming (intermediate), I know data structures and algorithms, currently learning digital electronics, operating system and computer networks but I don't know where to proceed further actually doing these things.
    Any advice is highly appreciated.

  • @in70x
    @in70x 2 года назад +3

    Lmao! Alright you got me with the Saleae joke.

  • @nick066hu
    @nick066hu 5 месяцев назад

    Can someone pls estimate how complicated (intentionally obfuscated) is the protocol a laser printer uses to read out the chip in the toner cartridge? Checking its presence, and perhaps write retrieve usage data, I have some experience in programming a microcontroller, have a great logic analyzer, digital oscilloscopes. Would be interested to try to reverse engineer and afterwards emulate this for a particular make and model of a printer for my own joy. But would not want to waste a lot of time, do I correclty assume it is way beyond feasible as a shed project?

  • @ChannelT54
    @ChannelT54 6 месяцев назад

    Good job Pedro from the flash back team

  • @superdau
    @superdau 2 года назад +3

    How do you prevent the master MCU from talking to the flash at the same time? Most of the time when you provide power to the flash the MCU will powered as well, because they'll use the same power rail.

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +2

      From our experience, in most of the cases that is not a problem if a device also powers up. However, on some occasions we give it more time for the device to finish booting process. Once a firmware is loaded to a memory there should be less operations directly on a flash.
      If dumping in-circuit is impossible we can always desolder the flash chip.

  • @edgeeffect
    @edgeeffect Год назад +1

    I see lots of SOIC-8 flash chips like at 9:56 with a second set of pads at 90 degrees to the SOIC-8. I'd love to know what's going on here because it seems to common. I assume it's for some kind of SOIC-16 flash chip instead of the '8 but I've never heard anyone talk about it.

  • @HollyTroll
    @HollyTroll 2 года назад +2

    this is some good quality stuff (even if i dont understand half of it lol)

  • @kagandemirarslan872
    @kagandemirarslan872 2 года назад +1

    Pls more videos ! Thats awesome

  • @thiagocanella
    @thiagocanella 7 месяцев назад

    I am trying to look a way to read and possibly write a dashboard firmware, but there is no datasheet, even the dashboard being more than 20 years old.
    any tip?

  • @UnCoolDad
    @UnCoolDad 2 года назад +1

    Interesting. Look forward to more content.

  • @gabriele5785
    @gabriele5785 2 года назад +1

    I was waiting so bad for a new video! Great

  • @raufxhah7066
    @raufxhah7066 Год назад

    what about the microcontroller used in scientific calculators ??

  • @nerdshala2997
    @nerdshala2997 9 месяцев назад

    Well, how do you do the same if internal NOR flash is used?

  • @owencurran6640
    @owencurran6640 Год назад +2

    I’m looking to do something exactly like this to make my life easier in work, does anyone know of an alternative to the logic analyser that’s used in the video? I want to mess around with it but that one is quite expensive and I can’t justify spending that much on something that might not work for what I need. Any help is greatly appreciated!

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      We highly recommend Saleae if you can afford it. However, there are plenty of alternatives - it depends how fast or slow your target protocol is. SPI is a relatively slow protocol, so you will be fine with cheaper alternatives, but those cheaper ones won't be able to sniff higher speed protocols such as USB.
      Have a look in Amazon and AliExpress, you will find lots of them!

  • @TearHere-w7n
    @TearHere-w7n Год назад

    I understand the general idea but executing it is a different story. I'm no hacker but this is very informative in itself. 👍

  • @avalona8373
    @avalona8373 2 года назад +2

    can hydrabus use to communicate with JTAG?

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +3

      It can, with openocd. It also supports JTAG pin discovery.

  • @SP-ny1fk
    @SP-ny1fk 8 месяцев назад

    You guys should work on a firmware update to allow the installation of a thirdparty Nas system.

  • @armincal9834
    @armincal9834 8 месяцев назад

    Do we really need all the extra hardware(like hydra)? Cant we just use an arduino or even a breadboard mcu and program it to read from the memory? Or does hydra do more than just read from the memory?

  • @JackSparrow-tt3xg
    @JackSparrow-tt3xg 2 года назад +1

    Amazing Video, Any time coming to India for training?!

  • @maksymkashchuk5420
    @maksymkashchuk5420 2 года назад +5

    Wow, it was cool to see how embedded devices get hacked as for man who is interested in embedded and IoT. Thanks for video

  • @theengineer9910
    @theengineer9910 Год назад +1

    great video !

  • @florinburian7291
    @florinburian7291 2 года назад +2

    Truly impressive!

  • @markmorillo9619
    @markmorillo9619 2 года назад +1

    Thank you, it works perfect!

  • @OMNI_INFINITY
    @OMNI_INFINITY Год назад

    Nice video. Sad it used such a proprietary board, but thankful that board is open source.

  • @a94cobra
    @a94cobra 2 года назад +1

    Will this read a ST 8S003F3P chip that is locked?

  • @jraulc
    @jraulc 2 года назад +1

    A new subscriber here, but is unfair when channels like this are Not popping up more often on the recommendations when the algorithm know I'm tech nerdy...

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +1

      Happy you like it! It looks like RUclips algorithm finally decided to give our channel a chance!

  • @PCBWay
    @PCBWay 2 года назад +1

    that's really good!

  • @ahmedwaheed7511
    @ahmedwaheed7511 2 года назад +1

    well Done! Very helpful, like from Pakistan

  • @pedrovelazquez138
    @pedrovelazquez138 2 года назад +2

    I remember encountering myself with a "Flashrom repository" or something like that. It had tons and tons of Flash Chips to look at, so much that I got overwhelmed with the information.
    It is great that nowadays reverse engineering is becoming something more common.
    Greetings from Paraguay.

  • @fusca14tube
    @fusca14tube 2 года назад +4

    Amazing! Is there any plans to come to Brazil? Obrigado!

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +3

      Hi Fabiano, if the right opportunity pops up, for sure. We both would love to go there, we haven't been yet!

    • @fusca14tube
      @fusca14tube 2 года назад

      @@FlashbackTeam Thanks

    • @FlashbackTeam
      @FlashbackTeam  2 года назад +2

      @@fusca14tube de nada meu irmão ;)

  • @kensmechanicalaffair
    @kensmechanicalaffair Год назад

    How do you exactly what the functions are, in FlashRom?

  • @cihan1995
    @cihan1995 Год назад

    thanks for the video. I ve got one question. What is flash is internal to the MCU, so how would it be possible to extract the firmware ? Thank you.

    • @FlashbackTeam
      @FlashbackTeam  Год назад

      In such cases a target specific attack is required. It would need a separate research and maybe use different techniques like glitching.

  • @alexcrouse
    @alexcrouse 2 года назад +1

    Great work!

  • @warunakumara7671
    @warunakumara7671 Год назад

    sir can we extract the code from pic micrcontroller write protected device

  • @Trendyshock
    @Trendyshock 2 года назад +1

    hanks lot Sir.. You helping us..

  • @slgadgetman
    @slgadgetman 2 года назад +2

    very informative video !

  • @jamesmcmasters9392
    @jamesmcmasters9392 2 года назад +1

    Very nice simple and clean

  • @HeroDragon116
    @HeroDragon116 9 месяцев назад

    Can you do it with a stm8s with Read-Out Protection? Im suffering trying to extract firmware from a Sinotimer three-phase protector

  • @hassansyed5661
    @hassansyed5661 Год назад

    So to glitch an SPI flash we have to figure out SCLK and then run a brute force to figure out time to glitch

  • @ArcAiN6
    @ArcAiN6 2 года назад

    I just want to point out that "package" has absolutely nothing to do with how many legs an IC has. In this case, the package for the SPI flash, is an SOIC, often times, manufacturers will add a quantifier to the package name to denote the leg count to differentiate the device from others of the same type and class, in this case, for the SPI flash, the quantifier is 8, due to there being 8 legs. However, this doesn't alter the fact that the package is still an SOIC.
    An example of the differences in packages can easily be shown when looking at the differences between SOT-523, SOT-323, and SOT-23. In the case of transistors with these packages, they can all be the same exact transistor, with 3 legs, but the packages are different. With Sot-523 being roughly 1.6mm x 1.6mm, Sot-323 being roughly 2mm x 2.1mm, and Sot-23 being roughly 2.9mm x 2.4mm.
    Of coarse, there are many other types of packages, but this just illustrates the difference between package, and leg count, or package quantifiers.

    • @FlashbackTeam
      @FlashbackTeam  2 года назад

      Yes, you are right. We know there are a lot of different packages available. However, from our experience, some are more common then the others. In most of the cases, on the targets that we have worked on, they are as in the video. After first guess looking at the IC, we would always cross-check with the datasheet.