Extracting Firmware from External Memory via JTAG

  Рет қаралды 111,077

Joe Grand

Joe Grand

Күн бұрын

Пікірлер: 84
@jimmylim893
@jimmylim893 5 жыл бұрын
hollyyy.. how in the world only 5000+ people interested in this sort of thing to date...
@Elfnetdesigns
@Elfnetdesigns 5 жыл бұрын
the other billions are more interested in Twitter drama and the next new iPhone..
@jimmylim893
@jimmylim893 5 жыл бұрын
@@Elfnetdesigns good one... Heart breaking fvcking truth..
@studyonly9857
@studyonly9857 2 жыл бұрын
Gthvfrt!!!!!
@spamlogs2701
@spamlogs2701 2 жыл бұрын
How can u expect someone to wanna watch this crap? Imagine ur grandpa trying to understand this mumbo jumbo.. that’s what 90% of the popular is like when it comes to this. Ur a small niche
@huhulili9021
@huhulili9021 2 жыл бұрын
True only 57k + after 3 years, this is a depressing world
@renakunisaki
@renakunisaki 4 жыл бұрын
Thank you for explaining every step. It's so frustrating when a tutorial just pulls some information out of their arse without explaining it.
@sintaklaas6427
@sintaklaas6427 Ай бұрын
Great content, thanks from Palermo, Sicily
@HackaweekTV
@HackaweekTV 6 жыл бұрын
Nice one Joe! Good to see you hackin hardware! :) Have a great new year and... KEEP ON HACKIN!
@usbbdm
@usbbdm 5 жыл бұрын
Just in case you do not know, using USB JTAG NT can read the 4M flash under 20 seconds. Not 5 hours. That is too long. Check my videos on routers programming.
@samuelubina5157
@samuelubina5157 2 жыл бұрын
SO SIR , SHOW US YOUr CHANNEL!!! SO we can be fully inform about this stuff your talking about!!!!
@1ManWrenching
@1ManWrenching 6 жыл бұрын
Could this be used to get a proprietary boot loader out of a chip? Like say, the Teensy 3.2?
@TommyAventador
@TommyAventador 2 жыл бұрын
I wonder if this would work on new iphones to retrieve icloud email?
@gabrielsennheiser
@gabrielsennheiser 4 жыл бұрын
I'd like to see a tutorial using the rasberry pi gpio pins and openocd to say recover a bricked netgear n900 (wndr4500v1/2)
@gmorb666
@gmorb666 3 жыл бұрын
Is this process just dumping the spi firmware? So i have xgecu on hand i can just read it straight from the rom instead of waiting 5 hours through jtag, correct?
@koenigsbier50
@koenigsbier50 2 жыл бұрын
I wish I could upvote this video a thousand times. This is awesome !
@coondogtheman
@coondogtheman 6 жыл бұрын
I'd be curious as to the processing power of these things and if any type of software can be run on them. Maybe games.
@woolfy02
@woolfy02 Жыл бұрын
I just got a bus pirate 3.6a and, I'm wanting to connect to a device using JTAG. The available pins on it are: TDO,TDI,TMS,TCK,GND,RESET Do I just connect it the same named pin, as from the bus pirate to the device? (Like TDO - TDO, TDI - TDI...etc etc for all of them). Years ago, I used uart but, I'm not seeing those connections on the board I'm trying to mess around with. I just can't seem to find a guide / tutorial that explains how to set it up, for newbs.
@binaryfreaks
@binaryfreaks 5 жыл бұрын
hi joe, I just received my bus blaster v4.1 but I'm experience some issues... can you tell me some tips about it? the error: warning: TDO seems to be stuck at 1
@rikvermeer1325
@rikvermeer1325 2 жыл бұрын
What would be a way to use JTAG to learn about the devices' internal serial communication? Could you point me in a direction?
@eddyboh2723
@eddyboh2723 2 жыл бұрын
Question, would this work if instead of using a sound blaster adapter, I were to use a small female 20pin to female USB 3.0 output adapter?
@csabertui
@csabertui 2 жыл бұрын
I'v done a loads of JTAG in the early 2010's sometimes it can be a pain...
@xl000
@xl000 2 жыл бұрын
is there a situation where you end up with something similar to a process dump and have to RE some unknow program in order to get the data you're looking for ? I mean grepping / parsing through the output of strings looks relativeley easy, but what if there are defensive contermeasures ? I can imagine ways to protect a private key, but this would always be defeated as the CPU is basically dong what we' re asking it to do. I guess that' s what Apple secure enclase is about
@FennecTECH
@FennecTECH 5 жыл бұрын
God i love WRT54G routers. I was sad when i smoked mine :(
@samsamuels1421
@samsamuels1421 3 жыл бұрын
Hi joe do you have a course i have another tipe of Device the metros will work?
@juniorlucival
@juniorlucival 5 жыл бұрын
? when the software don't have chip information ? how will identify the parameters?
@israelcruz7597
@israelcruz7597 3 жыл бұрын
Why would users not use higher level GUI-based software (Free) to do the same thing with pull-down menus?
@antoniosegura950
@antoniosegura950 Жыл бұрын
Great teacher,cfe mac generator for back to the life a dead wrt,im lost the original firmwares,v2,im looking for a cfe bootloader generator to match with generic original firmware,any clue?,and many thanks
@antoniosegura950
@antoniosegura950 Жыл бұрын
Im use a usbjtagnt
@tristunalekzander5608
@tristunalekzander5608 4 жыл бұрын
I just get "invalid parameter: unknown cable driver 'jtagkey'" ... I have installed the necessary drivers please help and thanks
@rayfelch954
@rayfelch954 5 жыл бұрын
That's awesome if you have 'ejtag' support, but what if your target is MIPS32 and your 'initbus ejtag' request gets you 'error: not found EJCONTROL or EJIMPCODE register'? I've tried this on a linksys-wrt54gl v6 router, same exact setup using busblaster with no luck... thanks for your great videos. I love my JTAGULATOR btw
@Elfnetdesigns
@Elfnetdesigns 5 жыл бұрын
UGH v6 is the cheapest of the cheap of the WRT54G series... hardly any memory to work with and very limited features. You can barely get DD-WRT on them and they still work sort of stable snd that DD-WRT is a stripped down version designed to fit on the small memory of the v6.. You are better off with a V2 or something in the 802.11N era. 54G was nice 20 years ago but is a dead horse these days..
@hazromanescconstantin3637
@hazromanescconstantin3637 4 жыл бұрын
You can acces data from Arm processor with password protection ?
@Cotten-
@Cotten- 2 жыл бұрын
You are such a great teacher. I wish I could shadow you.
@jairoripoll1301
@jairoripoll1301 3 жыл бұрын
buenas noches como podria conectar launchpad EXP430G2ET A UN CHIP M430F149 VIA JTAP
@steliosstamatakis844
@steliosstamatakis844 2 жыл бұрын
can you use jtagulator new features and not busbluster for this?
@hmbrt12
@hmbrt12 4 жыл бұрын
Wooooooaaaahhh!!! Thanks!!⚡🤖👌🏼
@DatamedicsRecovery
@DatamedicsRecovery 4 жыл бұрын
Hi Joe. Any chance you would consider learning how to jtag newer WD HDD PCBs? WD has decided to lock out their PCBs in a way that prevents the normal vendor specific ATA commands from doing things like read/write the ROM code, etc. and it's becoming an issue for data recovery. I know some guys are already unlocking them via jtag, but they are selling their unlocked boards at a crazy markup. The knowledge of how to do this is definitely worth some $$ for me, but I'm no jtag expert. It's knowledge I'd be willing to pay for.
@shutrumpracing2451
@shutrumpracing2451 3 жыл бұрын
can you do this on an altera max7000?
@rahulsethi_
@rahulsethi_ 5 жыл бұрын
what if the data shown by string function is encrypted??
@renakunisaki
@renakunisaki 4 жыл бұрын
It will always have a lot of false positives, just ignore those.
@antoniosegura950
@antoniosegura950 Жыл бұрын
Or how edit cfe mac adress in firmware
@petejackson7976
@petejackson7976 5 жыл бұрын
How do you identify where to connect cables from the interface to the target machine?
@Elfnetdesigns
@Elfnetdesigns 5 жыл бұрын
datasheets
@myramgrand
@myramgrand 2 жыл бұрын
He is so engaging and real! Great presentation!
@vondarycrentsil9180
@vondarycrentsil9180 4 жыл бұрын
Can u extract anki robot vector firmware? Pls , and thanks
@johnpapadopoulos8440
@johnpapadopoulos8440 5 жыл бұрын
Nice job. Is it possible to use that jtag for bootloop phone brick? TIA
@Elfnetdesigns
@Elfnetdesigns 5 жыл бұрын
you put the wrong firmware in or tried to load a "hacked" firmware and got it in a good ole loop huh? Phones are not worth it once the bootloop, as cheap as they are these days you can buy a brand new tracfone smartphone with service cheaper than you can buy the jtag reader for..
@tono_01
@tono_01 5 жыл бұрын
@@Elfnetdesigns Your answer seems to be a bit over generalised to me. Phones that are expensive can get bootloop too and it would be interesting to know if you can repair them with this technique.... @John Papadopoulos: In principle, yes you can repair them using this same technique. BUT..... firmware for cellphones require a lot of knowledge if you start poking into them yourself..... They might have encryption that you need to defeat before you can write the code to the device, the more expensive ones (Iphones) do not have JTAG anymore. Or if they do, you need to know very good whoch part of the firmware is for what part of the phone (baseband, phone itself etc.). In my opinion: not an easy task.
@ddlc7022
@ddlc7022 2 жыл бұрын
How do you install or set urJTAG for MAC ?
@ddlc7022
@ddlc7022 2 жыл бұрын
Joe any comment ?
@brucelau6929
@brucelau6929 5 жыл бұрын
Thanks. It helps a lot.
@zerodegrekelvin2
@zerodegrekelvin2 4 жыл бұрын
Thanks for the demo of poor man Bus Blaster JTAG 8-) I mostly use/loan the BDI2000/3000 from where I worked and I feel pain when you waited 5h to extract 4MB. When I say "poor man" it does not mean pejorative, more of MacGyver compliment.
@dariadaria9255
@dariadaria9255 4 жыл бұрын
Can someone please tell me best JTAG vendors in market?
@salmantalash4515
@salmantalash4515 5 жыл бұрын
can we do it in windows
@Veso266
@Veso266 5 жыл бұрын
how would UrJTAG damage your hardware?
@309electronics5
@309electronics5 Жыл бұрын
deleting the firmwarw from the device without backup or when an error occurs
@iitguwahaticseairunder500r2
@iitguwahaticseairunder500r2 2 жыл бұрын
You just used this in the recent samsung video!!
@iitguwahaticseairunder500r2
@iitguwahaticseairunder500r2 2 жыл бұрын
To kingpin 👑
@dillonjensen3728
@dillonjensen3728 5 жыл бұрын
Good video!
@RicardoCooper
@RicardoCooper 6 жыл бұрын
Five hours? Thankfully I have a FlashcatUSB and USBJTAG NOT that can read this much faster! P.S. I already know the pinout but, can the JTAGulator be used with the WRT54G?
@cocosloan3748
@cocosloan3748 5 жыл бұрын
Cool !
@sarupk
@sarupk Жыл бұрын
thank you!!!!
@rootcoolk
@rootcoolk 6 жыл бұрын
Cool Man
@scanners99
@scanners99 2 жыл бұрын
Creo que Te amo
@pardal902
@pardal902 3 жыл бұрын
well, today I think 90% of JTag extracting is impossible, all vendors locking it.
@alexluzinki206
@alexluzinki206 Жыл бұрын
nice
@AZ-be4hg
@AZ-be4hg 3 жыл бұрын
5hrs to get 'admin' paaswd. Nice work,bro :)
@MukeshKumar-xi2dj
@MukeshKumar-xi2dj 3 жыл бұрын
hi joegrand wanna some help
@ThePlombix
@ThePlombix 2 жыл бұрын
you need a mounain with your name on , youtube is not enought
@-BILYAKIS-
@-BILYAKIS- 2 жыл бұрын
in short, Software control Hardware
@ArnaudMEURET
@ArnaudMEURET 2 жыл бұрын
Quite fascinating that you pour your money in an Apple laptop where nothing works like everywhere else Unix…😅
@hamburgermods1396
@hamburgermods1396 2 жыл бұрын
yes yes just like the xbox360 jtag
@mugishastevenyoutubestuden9311
@mugishastevenyoutubestuden9311 2 жыл бұрын
🖒🖒🖒
@joshse8709
@joshse8709 2 жыл бұрын
U know how I know ur vegan?
@JTAG123Slamma
@JTAG123Slamma Жыл бұрын
JTAG
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 598 М.
Confessions of a Hacker known as Kingpin - @JoeGrand
12:36
Altium Stories
Рет қаралды 703 М.
ВЛОГ ДИАНА В ТУРЦИИ
1:31:22
Lady Diana VLOG
Рет қаралды 1,2 МЛН
Почему Катар богатый? #shorts
0:45
Послезавтра
Рет қаралды 2 МЛН
Hacking a Knockoff Google Chromecast - Firmware Extraction
25:04
Matt Brown
Рет қаралды 112 М.
Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3
12:20
Simple Firmware Reverse Engineering
8:50
Engineer Man
Рет қаралды 120 М.
Extracting and Modifying Firmware with JTAG
21:03
Matt Brown
Рет қаралды 49 М.
[016] IT9919 Hacking - part 1 - Reading firmware with flashrom
32:55
Hacking a Samsung Galaxy for $6,000,000 in Bitcoin!?
36:25
Joe Grand
Рет қаралды 4,8 МЛН
#03 - How To Find The JTAG Interface - Hardware Hacking Tutorial
27:52
Introduction to Firmware Reversing
11:32
Tony Gambacorta
Рет қаралды 314 М.