Extracting and Modifying Firmware with JTAG

  Рет қаралды 49,869

Matt Brown

Matt Brown

Күн бұрын

Пікірлер: 54
@toadtws
@toadtws Жыл бұрын
Great video! Minor vim note: at @17:30, you can use capital R to enter Replace mode. That way you won't have to count anything. Just make sure you only modify ASCII characters.
@PeterBagel-ti5xw
@PeterBagel-ti5xw 7 ай бұрын
Oh my god, just found this channel and it's an absolute goldmine :-) thanks for all the awesome content!
@slincolne
@slincolne 5 ай бұрын
Minor correction to the video - video title states using JTAG to extract firmware, while Matt used SWD instead. JTAG is an industry standard interface, while SWD is more vender specific. Apart from showing the JTAGulator Matt does not actually use it :-(
@m0rjjj666
@m0rjjj666 5 ай бұрын
You can extract it with JTAG, Matt mentioned that, he just used SWT option
@jawaljawad4855
@jawaljawad4855 Ай бұрын
I see you vidéo is good thinks . I work in mcu mec1723 but in j link i cant found this serial i found mec170x how i can add mec1723 if not . I ts possible to connecte mec1723 with config of mec170x . Thinks
@norm1124
@norm1124 7 күн бұрын
@@m0rjjj666 If you find JTAG on the RP2040, you will be my hero - according to my current knowledge there is ONLY SWD available. Therefore I was astonished to see "JTAG" in the title too ...
@jc4190
@jc4190 2 жыл бұрын
Awesome video!! Could you do something with STM chips that are locked sometime soon? My vaguest of vague understanding is that you can sometimes do something with pulling boot select pins low to get it into a debug mode regardless of other configurations, but I don't have the first clue how to actually do that irl. Keep up the great videos m8!
@Patrick-ky7ez
@Patrick-ky7ez Жыл бұрын
Your channel is incredible!
@sammay1540
@sammay1540 Жыл бұрын
I recently came across your channel and I love your videos. If you ever have a project where you gain practical functionality of a device by hacking it, that would make a great video. Like the security camera sending the stream to a self hosted storage server or other ideas you may have.
@rajivsingh6633
@rajivsingh6633 Жыл бұрын
Dear sir I have a problem that the mcu has tooll0 pin reset pin vcc and ground . How I can extract firmware from the mcu
@woolfy02
@woolfy02 Жыл бұрын
I just got a bus pirate 3.6a and, I'm wanting to connect to a device using JTAG. The available pins on it are: TDO,TDI,TMS,TCK,GND,RESET Do I just connect it the same named pin, as from the bus pirate to the device? (Like TDO - TDO, TDI - TDI...etc etc for all of them). Years ago, I used uart but, I'm not seeing those connections on the board I'm trying to mess around with. I just can't seem to find a guide / tutorial that explains how to set it up for newbs.
@OMNI_INFINITY
@OMNI_INFINITY Жыл бұрын
Where is a repository link to PCB files of that badge? Looks like a nice little capacitive keyboard.
@colingill9317
@colingill9317 Ай бұрын
Hi there, Could you help me out. I need to download the firmware from a working C49 controller on a miner, and upload it into a controller I played around with and erased the whole nand from the terminal. Any ideas? I have a JTAG DLC 10 programmer, for Xilinx chips. Many thanks.
@goutham24693
@goutham24693 2 жыл бұрын
Hi Matt, very Informative video. Is there any way to convert the binary dump to source code or to understand it better ?
@shahzadasalim5032
@shahzadasalim5032 Ай бұрын
sir, can you help to find jtag pinout of NVME, please
@Finrow1
@Finrow1 2 жыл бұрын
How did you know to use the SI form of Mbit and not the binary form of Mbit?
@mattbrwn
@mattbrwn 2 жыл бұрын
Honestly I guessed 😅
@PoorRichard-o1u
@PoorRichard-o1u 19 күн бұрын
I would like to see the use of some software that can de-compile a firmware file.
@alanwake5927
@alanwake5927 Жыл бұрын
Where I could buy the student version of the j link
@michaelmclardy9165
@michaelmclardy9165 9 ай бұрын
Can you do the Huawei H112-372? how to get UART and JTAG.
@norm1124
@norm1124 7 күн бұрын
@mattbrwn Amazing video, I don't know this steps yet - IMHO the RP2040 has not JTAG at all, SWD only ;-) - but all others
@ggNotSuree
@ggNotSuree 7 ай бұрын
Trying to learn all of this and very overwhelmed. Are you able to access the jtag state machine this way? And command the actual registers? I’m reading how to do that, but nobody ever explains how they gain access to do that… and what they are typing the commands on/through…. Sorry if this is a stupid question
@robertbauer6723
@robertbauer6723 2 жыл бұрын
Very informative, great info! Thank you for making this. BTW your audio is really low.
@mattbrwn
@mattbrwn 2 жыл бұрын
Thanks! Trying to find the sweet spot with the audio
@sercanalnca1962
@sercanalnca1962 2 ай бұрын
Can we do it on Windows or we have to use Linux?
@PapaGeegee
@PapaGeegee Жыл бұрын
Do u have epon firmware for Zte
@abdennour183
@abdennour183 8 ай бұрын
Does the J-link support Atmega32u4 ?
@paololuise6514
@paololuise6514 2 жыл бұрын
What is the debugger model you are using?
@mattbrwn
@mattbrwn 2 жыл бұрын
xgecu tl866ii plus Also have the newer xgecu t48
@RussellSenior
@RussellSenior Жыл бұрын
Why not just hook up to the SPI NOR flash and dump that way? flashrom, ftw.
@mattbrwn
@mattbrwn Жыл бұрын
This video was specially to demo JTAG
@MiroslavObrtel
@MiroslavObrtel Жыл бұрын
And that was preety amazing
@baghdadiabdellatif1581
@baghdadiabdellatif1581 Жыл бұрын
Great work 👌👏
@JamesColeman
@JamesColeman 8 ай бұрын
I am all for IOT companies not disabling JTAG. Just keep them away from evil maids, and you're all good.
@mattp4953
@mattp4953 2 жыл бұрын
So cool! What are you going to push to it next, if anything?
@mattbrwn
@mattbrwn 2 жыл бұрын
might require some big time reverse engineering :D I wonder if they released the source code to the badge......
@mattp4953
@mattp4953 2 жыл бұрын
@@mattbrwn another question: can it run doom (just thought of this)
@mattp4953
@mattp4953 2 жыл бұрын
@@mattbrwn have you thrown it into Ghidra yet? Assuming it’s an ELF, Is the binary stripped?
@daixtr
@daixtr 6 ай бұрын
Hi Matt. What would be your recommended JTAG model brand?
@welltonmanopelli3224
@welltonmanopelli3224 Жыл бұрын
Very nice
@turanamo
@turanamo Жыл бұрын
You could have added the part where you locate the h/w key to crack it 😛
@jesussaeta8383
@jesussaeta8383 Жыл бұрын
Yes the volume is very low on your end,
@a-listercrowley2737
@a-listercrowley2737 Жыл бұрын
Man I keep seeing JTAG written on different boards I'm still a rookie, got a long waaay to go
@zombielupin
@zombielupin Жыл бұрын
what microscope do you use for videos?
@mattbrwn
@mattbrwn Жыл бұрын
AmScope
@XenoTravis
@XenoTravis Жыл бұрын
I dislike that connector style so much. The cable is expensive and the pins will bend easily.
@BobCat0
@BobCat0 2 жыл бұрын
Your video is flipped.
@mattbrwn
@mattbrwn 2 жыл бұрын
lol good catch. I thought I fixed that... I'm kinda new to OBS
@throwaway1076
@throwaway1076 2 жыл бұрын
16 megabits is 2 megabytes, which is 0x200000... Converting 20000000 decimal to hex is not 2 megabytes.
@levonrockerz4299
@levonrockerz4299 Жыл бұрын
The last command is not supported by jlink commander v7.88j, start here^[nmatt@ripper badge]$, ..savebin is only working , I am trying to extract stm32f103r8,,
@bubbasplants189
@bubbasplants189 8 ай бұрын
Now to find an old xbox 🤣
@JenniferBrown-n3r
@JenniferBrown-n3r 3 ай бұрын
White Donna Martinez Brenda Lee Scott
@teltechservices7978
@teltechservices7978 Жыл бұрын
amazing man, thank you for the cool stuff , hacked by nmat😊
@manueluninteressant9917
@manueluninteressant9917 3 ай бұрын
Hi matt, do you can read this ic for me? Mb9af004bgl-g-103-ere1 Mb9af004bgl-g-103-k1ere1
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
Supercharge Your STM32 Nucleo Projects with Segger J-Link
8:17
PR TechTalk
Рет қаралды 7 М.
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
Правильный подход к детям
00:18
Beatrise
Рет қаралды 11 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
#03 - How To Find The JTAG Interface - Hardware Hacking Tutorial
27:52
Top 5 Tools for IoT Hacking Beginners
17:31
Matt Brown
Рет қаралды 24 М.
Accessing U-Boot through UART KS0 ultra
7:49
Crypto440
Рет қаралды 3,5 М.
Build Your Own Drone Tracking Radar:  Part 1
20:08
Jon Kraft
Рет қаралды 622 М.
Inside the V3 Nazi Super Gun
19:52
Blue Paw Print
Рет қаралды 2,4 МЛН
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 601 М.
Hacking a Knockoff Google Chromecast - Firmware Extraction
25:04
Matt Brown
Рет қаралды 113 М.
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН