This is by far the best series I have ever found explaining all of these concepts. Your instruction method is fantastic. It is so understandable and detailed... THANK YOU!
@ryankitching59362 жыл бұрын
Thank thank thank you. This is incredible content.
@thecriticalpoint4 жыл бұрын
It really doesn't get any better than this. Less than 0.1% people know how to do what you can do and 99.9% of those people won't share their experience and approach because it's tradecraft, or because they suck at teaching. I studied computer engineering at Uni and none of these techniques were taught or applied. Your English is fine. It makes you sound like the Pope of 1337 Hacking Skillz.
@jorgebitar7 ай бұрын
🤣 Pope... 🤣🤣🤣🤣
@strategyoracle4 жыл бұрын
Very clear and informative. You mention at the end about your English - I wouldn't describe it as bad! There certainly is no barrier to understanding due to language in my view.
@MakeMeHack4 жыл бұрын
Hello Peter Upfold, thank you for your appreciation and support and thank you for your comment about my English, I am relieved to hear that. I read and list a lot of stuff in English, but I speak in English mainly with non-native speakers; I know that I have a marked Italian accent, and often, I mispronounce some words, but I am happy to know that this is not an obstacle.
@TOMJLAEL Жыл бұрын
Looks like you've not made a video in 3+ years. Very sad! 😢 I agree with @strate in that there's definitely no issue with your English. For me personally, there are times that the accent is a little thick. And difficult for me to understand. But that's no fault of your own. First of all, people from different regions of the US can sometimes have difficult understanding one another. They're both speaking English. But it's a matter of accents. Secondly, you are speaking about some deeply technical topics here. Which is like a third language in of itself. Neither Italian or English. So definitely cut yourself some slack. 🤗 You're a brilliant man, and I genuinely appreciate your efforts in sharing your knowledge. Hope all is well!
@tocube1 Жыл бұрын
Your English is no obstacle to your good explanations on the issues. it's been 2 years since your upload and I'm watching and enjoying it, which means it is informative and valuable, hence not expiring anytime soon. Thanks for the great content
@rydjaradat3 жыл бұрын
The best channel ever , with continuous elaborative dedicated thought process . THIS IS SIMPLY PURE GOLD . Thank you sir for this channel please continue with more devices don't stop.
@HawK40x4 ай бұрын
Hope you're doing well, idk if you gonna read this comment or no but I love your accent and that wants me to stay focused and listen to your lectures!
@vladislavruttgers27912 жыл бұрын
Very very high quality Content, the whole Series in fact is. Finally we have our friendly Italian Tech Nerd grandpa at our disposal. Love it :)
@cianfa72559 күн бұрын
Very good. I'm very glad to see a such detailed tutorial made by an Italian engineer (like me).
@lantapaukku76292 жыл бұрын
English is clear enough, after watching from episode #01 I am no longer distracted the italian dancing accent with scretched vowels. :-) No pun. This is an excellent series!!
@pier-carlvenne81474 жыл бұрын
Thanks a lot for these videos! I found this one a lot more difficult to understand than the previous ones, but I will certainly watch it until I understand everything. Good job!
@MakeMeHack4 жыл бұрын
Hi Pier-Carl, thank you for your support and for your feedback!
@salix_qmeou Жыл бұрын
You are Amazing, Valerio!!! Congrats on making this concise, didactic and useful material for us, I have 100% certain that a lot of people that don't comment on this series have the same feeling that I'm feeling right now. I'm Brazilian and I'm not confident about my English speaking as well but I can understand you perfectly, You're amazing!!!
@louroborosАй бұрын
Excellent video series! Best resource on hardware hacking I’ve found thus far.
@TymexComputing Жыл бұрын
Valerio di Giampietro and Marco Spiess are my favourite tech friends :) with a southern europe accent ;)
@TymexComputing Жыл бұрын
32:32 - English is ok - i can understand it - good that spoken slowly :) - i only needed to learn what does ardware acking mean and everything else was meaningful - BTW i think your video revealed some local system usernames ;) GDPR! l.fornalczyk (quelo) is one of them ;)
@magnusjonsson67204 жыл бұрын
I can only agree with others in the praise of these videos, you are great making something this complex actually understandable. I have been tinkering with electronics as hobby very long time and still find them really good to watch. Please keep it up, i will continue to watch and have shared on Facebook. Thumbs up :-)
@MakeMeHack4 жыл бұрын
Hello Magnus Jönsson, thank you for your appreciation, and thank you very much for sharing this content!
@другдруг-е1ф4 жыл бұрын
Thank you for the great educational material! Thank you very much for that carefully worked on the drafting of the text. Thank you for sharing your experience. I've wanted these video tutorials for a long time
@antoniromanowicz68143 жыл бұрын
Sir, tour knowledge, skills, experience karę impressive. Plus the fact that you are so passionate and eager to teach. I only hope that it will bring you prosperity. Alp the best in 2021.
@SuspiciousAra11 ай бұрын
Hi, thank you for your time, doing videos about these things. I have a digital osciloscope that i did not used it for 8 months and now is not booting up, doe not do recovery. I find your informations intriguing :) useful :) i will watch more of your videos to tru to understand where i go with all this information, at the moment i have zero ideas but a lot of confidence :D i will not throw away this osciloscope, i will fix it. maybe.... :D
@mmfix38512 жыл бұрын
There is no better explanation about this type information! Thank you so much !
@matitalatina4 жыл бұрын
I love this series! Thank you for sharing your awesome knowledge!
@MakeMeHack4 жыл бұрын
Hello matitalatina, thank you for your appreciation, I am really thankful for your support.
@danielecastro8504 жыл бұрын
Sei un grande! io ci ho messo anni a scoprire tutto quello che hai spiegato fino al video #4. Tutta la parte di reverse-engineering del firmware l'avevo vista spiegata altrove su youtube ma non lentamente ed in modo chiaro ed ordinato come stai facendo tu: la tua non sarà una pronuncia british ma rende la tua trattazione semplice, lineare e quindi facile da digerire con termini inglesi semplici. Userò questo tuo metodo per confrontare il partition layout del FW originale con quello nel dts dell'immagine OpenWrt dell'AGPWI per cui ho aggiunto il supporto ufficiale. Come consiglio ti suggerisco di spiegare in modo più approfondito come funziona la JTAG internamente (scan-chain e TAP controller) ponendo l'accento sull'interfacciamento del controller TAP con le componenti interne delle nuove versioni della JTAG come EJTAG di MIPS e ARM-JTAG (flash memory controller, debug controller). In passato mi sono sempre rifiutato di usare la JTAG proprio perchè non capivo bene come funzionasse e, quindi, avevo paura di danneggiare i dispositivi. In giro per il web la JTAG non è ben spiegata per un neofita. Infine anche una breve spiegazione del DTS in linux, come buildare OpenWrt e come includere i driver per la gestione automatica del partition layout nel DTS credo sarebbero la ciliegina sulla torta :D
@MakeMeHack4 жыл бұрын
Ciao Daniele, ti ringrazio moltissimo per il tuo commento e scusami se rispondo così in ritardo, sono stato distratto da un paio di progetti collaterali che mi hanno distolto momentaneamente da KZbin. Anche io ci ho messo anni ad imparare quel poco che so, non sono infatti giovanissimo, ahimè :-) Appartengo alla generazione di quei giovani, più o meno coetanei di Linus Torvalds, che si sono appassionati a Linux quando Linux è stato rilasciato; io ho iniziato a giocarci nel 1993. Riguardo all'interfaccia JTAG ho visto che il video relativo è il più visualizzato per cui sicuramente ci tornerò, ti ringrazio dei validi consigli. Non essendo giovanissimo mi ricordo di quando lo standard JTAG venne emesso e l'accento che c'era allora (e che ho visto meno in seguito) era su controllabilità e osservabilità dei vari bit all'interno del chip. L'argomento del Device Tree e del building del firmware finora l'ho affrontato "di striscio" solo per costruire un ambiente di emulazione su QEMU, magari, anche qui, ci potrò tornare in seguito. Grazie di nuovo per i commenti ed i suggerimenti!
@danielecastro8504 жыл бұрын
@@MakeMeHack Praticamente hai cominciato a smanettare con Linux quando sono nato... pazzesco... Io la JTAG ho avuto la fortuna di studiarla in un corso della magistrale di ingegneria. Senza quel corso non so se ad oggi l'avrei mai usata... ti dicevo del dts perchè generalmente quando sblocco un router cerco sempre di rimpiazzargli il firmware con OpenWrt e credo che in molti facciano una cosa del genere. Amo quel sistema operativo... comunque grazie a te della risposta, sono ansioso di vedere uscire gli altri video di questa serie e quelli della JTAG! :D
@douglasheld Жыл бұрын
22:41 I can recommend, instead of computing SHA sums, it is less typing and perhaps a bit less esoteric, to use /usr/bin/diff which will simply report nothing, or "Binary files differ". In either case, a full scan of each input file is needed so there is no efficiency gain of computing the hash.
@ducky00694 жыл бұрын
Thank you for sharing your experience I've been struggling not knowing the proper hacking techniques this gives me a better understanding and how to apply these techniques. best regards, ducky
@MakeMeHack4 жыл бұрын
Hello ducky0069, thank you for your appreciation and support!
@bertblankenstein373811 ай бұрын
Ill have to watch again when I'm at the computer. I was messing around and was able to create some sort of filesystem but all the /dev files got linked to /dev/null for my protection so clearly fakeroot is in my future. Thank you.
@hanoma9fan2 жыл бұрын
Vừa vào đã nổi cả da gà 藍giọng a Phúc hayyy quá, mong sẽ tiếp tục cover ạ ❤️
@infinitytech1004 жыл бұрын
Thank you for sharing your experience I've been struggling not knowing the proper hacking techniques
@brighthope75582 ай бұрын
Thank you so much. Your contents are very very informative. I hope to see you again with a new content.
@gersonsoares66282 жыл бұрын
seu VALERIO ,não vai fazer mais videos sobre hard hacking para 2022?
@disperatorul2 жыл бұрын
Thank you for this. Very detailed and easy to follow. Please continue.
@DavideMenegalli4 жыл бұрын
Sono capitato per caso sul tuo canale ma mi sono subito iscritto, perché adoro l'argomento :-) Grazie !!
@sosscs Жыл бұрын
no video on using OpenOCD with JTAG to extract firmware from the processor?
@claudiologiudice92532 жыл бұрын
Valerio you are a source on inspiration for all of us!! Thank you!!
@ninetailscosmicfox5585 Жыл бұрын
Is it possible to combine entropy values with brute forcing techniques to create something more refined for breaking encryption? I feel like at least some encryption standards could be vulnerable to exposing useful sequences.
@ronwellman4 жыл бұрын
Perfect. You knowledge is extensive and much appreciated. Thanks.
@isthereanyname2 жыл бұрын
Would love to see more videos! They are very informative. Thank you.
@lodmania57453 жыл бұрын
i found the firmware in internet but it is a zip file. according to the firmware upgrading procedure of the router it accepts zip file and not requesting password. unfortunately when i try to work with the same zip file in binwalk it cannot even unzip without the password. also i cant access to the bin file. please give me a lead. should i manually get the stock firmware out of router using a UART module?
@SIMSTOREVN3 жыл бұрын
thanks for sharing, Can I ask if we can extract the firmware from the huawei 4G modem, to load the device with the same code?
@J012203 жыл бұрын
I love this series! Thank you for sharing
@AtAGlimpse_UB2 жыл бұрын
The thumbnail for fricking hilarious! XD
@TheRealKitWalker3 жыл бұрын
Another useful tut. Thanks so much 😍😍✌️✌️
@gionibegood69503 жыл бұрын
you english is good and the contents of video very useful, thank you
@lloydChristmas-j6n2 жыл бұрын
What happened to you Valerio?! Great content, would love to see more!
@cralx2k4 жыл бұрын
Thanks a lot for these AMAZING series.
@arfjreyes3 жыл бұрын
Hi valerio my hacker friend. Hope to you discuss more about binwalking in the future. Keep safe!
@Gimsys2 жыл бұрын
The accent is music to my ears. Like someone said this is very valuable information
@MrFreeze793 жыл бұрын
this is soo fascinating, I'm trying to learn how to hack my surveillance camera which has firmware which doesn't allow me to use it on my own personal system. I own the cameras but it doesn't let me use them on their own. I need to learn this !
@jordancrombie26763 жыл бұрын
Great video…clear, and concise. Most wonderful content
@wsws7939 Жыл бұрын
You are great! I learned a lot. Thanks
@detective5253 Жыл бұрын
amazing tutorial! thank you so much for this
@jdaniele3 жыл бұрын
Amazing tutorial Valerio, you Rock! Thanks for sharing.
@yiannigeorgantas15513 жыл бұрын
Thank you for sharing! Great video
@gersonsoares66284 жыл бұрын
parabens excelente,video ,tutorial
@becauro3 жыл бұрын
Nice lesson. Do you intend to continue theses episodies ?
@drygdryg24 жыл бұрын
Thank you for the useful information! I want to note that in some cases unsquashfs does not work because manufacturer made changes to squashfs-tools to pack own firmware. In such cases, sasquatch helps: github.com/devttys0/sasquatch For example, I recently discovered Netis WF2411 firmware, and unsquashfs was failing with "read_ids: Bad inode count in super block" - sasquatch helped me to extract router filesystem.
@Mikedunk4 жыл бұрын
Thanks a lot for your Videos, how can I handle a list of .zlib files? After using binwalk to extract the files in the firmware the system folder is split into multiple .zlib files and multiple fs_1 folders. Also, how can I add Burp Suite's root certificate into the list of trusted certificates for traffic analysis? Thank you!
@MakeMeHack4 жыл бұрын
Hello Emmanuel Wamuo, thank you for your appreciation. I suppose that Binwalk misidentifies the .zlib files extracting something that was not intended to be a separate file. If it creates multiple fs_x folders is because it identifies (maybe wrongly) multiple file systems or multiple partitions inside the firmware file. Do you have files inside the fs_x folders? Regarding adding the BurpSuite's trusted CA certificate, it depends on your device, you should find where it has current CA certificates and put the BurpSuite's certificate there, adding or replacing current certificates.
@enthdegree4 жыл бұрын
amazing channel. do you have any book recommendations? thanks
@kenneth123skate3213 жыл бұрын
Exelent video tutorial !!!! tanks
@ANSARI5X54 жыл бұрын
Thanks for sharing a good knowledge
@xbeox4 жыл бұрын
Muito bom. Tudo o que eu queria saber e muito mais.😊 Ja ganhou mais um subscripto
@MakeMeHack4 жыл бұрын
Hello xbeox, thank you for your appreciation and support.
@نضالمحمد-ك1ي3 жыл бұрын
Hello dear I am one of your subscribers recently and I have followed a number of your explanations about ((uart)), but I have questions that I did not get an answer for. Is it possible to contact you when you find the right time
@raccoon75334 жыл бұрын
Hi, there is a firmware dumper available for your Canon M50 camera made by the Magic Lantern Team: www.magiclantern.fm/forum/index.php?topic=16534.0. This is a modified firmware update file which dumps the decrypted firmware to your cameras SD card without modifying the camera.
@starlinkpk3 жыл бұрын
very informative
@paulcohen1555 Жыл бұрын
Hi, Is the creator still active and answering the questions?
@ecuunlock4 жыл бұрын
Should be called hacking with Dracula!! Lol love your videos thanks!
@MakeMeHack4 жыл бұрын
Thanks for the idea!
@EnzoEpinet8 ай бұрын
Salve Valerio, le sue lezioni sono interessantissime e cerco di seguirle con passione ma purtroppo non ho le basi e la capacità di comprenderle. Sono un appassionato di elettronica e seguendo alcuni tutorial su youtube, sono riuscito ad estrarre l’immagine di una nand dissaldandola e successivamente risaldandola alla telecamera di cui ho perso la password. Fortunatamente la telecamera funziona ancora a seguito del mio intervento ma chiaramente non sono in grado di recuperare la password dell’utente admin. Sebbene immagino che lei sia una persona molto impegnata, le chiedo se potrebbe aiutarmi inviandole il link del file punto bin che ho ottenuto di circa 500 mb. Chiaramente continuerò ad apprezzare i suoi tutorial se non trovasse il tempo di aiutarmi. Chiedo scusa ai suoi iscritti per aver scritto in italiano. Grazie Enzo
@fahemabdelmalek5655 Жыл бұрын
thanks for sharing
@madmushroom8639 Жыл бұрын
Love it!
@123chupachups2 жыл бұрын
Grande!!😃
@mattli64642 жыл бұрын
Impressive,thks
@typedeaf2 жыл бұрын
Not gonna like, the English is hard on my ears, but the content makes up for it.