Рет қаралды 106,364
Demonstration of extracting firmware from an embedded system through the JTAG interface.
The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface (dangerousprototypes.com/docs/B...) and UrJTAG open source software (urjtag.org).
It's Nerd Thunder month! Check out the folks mentioned at the end of the video:
- Exploitee.rs (IoT/consumer), exploitee.rs
- Chris Eagle (IDA/reverse engineering), github.com/cseagle
- Azeria (ARM exploitation), azeria-labs.com
- Craig Heffner (Routers/network), www.devttys0.com