Glitching Linux Bootloader for Shells and Freedom - Rooting a TP-Link Security Camera

  Рет қаралды 33,214

Matt Brown

Matt Brown

Күн бұрын

Пікірлер: 150
@mattbrwn
@mattbrwn 13 күн бұрын
Getting asked about the probes used in this video. They are PCBite probes. Link: amzn.to/4eotvVh
@SeanBZA
@SeanBZA 13 күн бұрын
A tip for soldering the wires on is to get a roll of 48SWG enamelled copper wire with solderable insulation, which will tin when you apply a soldering iron tip to it. Allows you to solder to fine pins, and even to non filled vias with no problems, and gives a good connection. If the wire is to be there more or less permanent you can then tack it down with some UV cure glue, or even regular gel superglue if the bloom it will have is not going to worry you. Used it to repair damaged solder pads as well, soldering the IC pin to the wire, and then the wire to the track, and a drop of superglue to hold the lot down, followed the next day with a light scrub in IPA ( I was using TCE though, before it was banned from the military as well) to get the bloom off, leaving a good clean firm connection. Lasts decades with no issues, though not going to handle more than 50mA reliably, but getting you a wire out to a place where you can have a small strip of Veroboard 3 holes long, and however many point you want wide, stuck down to some point inside was a good way to have reliable monitoring.
@modal-kkurt4986
@modal-kkurt4986 12 күн бұрын
I was about to ask. Thanks!
@Fred_Klingon
@Fred_Klingon 10 күн бұрын
Me as well 😀
@Fred_Klingon
@Fred_Klingon 10 күн бұрын
Also lowering the temperature can help, otherwise it takes to much time to solidify, and it's not easy to stay still for so long
@PandemoniumMeltDown
@PandemoniumMeltDown 10 сағат бұрын
You should make a colab with Laurie Wired!
@ferrellsl
@ferrellsl 12 күн бұрын
Back in the day, glitching was used to hack the smartcards in satellite receivers to enable all the channels on Dish and DirectTV receivers. The smartcards had a simple CPU and once successfully glitched, the door was wide open to clone the cards, modify subscription info, etc. Good times!
@tboHammu
@tboHammu 13 күн бұрын
Matt the type of guy to just have a random password hash chilling in his browsers search bar 😂
@daviddunkelheit9952
@daviddunkelheit9952 13 күн бұрын
Right?! I remember that bit of lore…
@darren684
@darren684 13 күн бұрын
You guys don't?
@7481OK
@7481OK 13 күн бұрын
That’s kind a stuff I knew it is possible, but never made it. Thankfully Matt made it like it’s easy peasy and explained it perfectly.
@RickDkkrd
@RickDkkrd 13 күн бұрын
That's a great tip about uboot, just what I needed for a sigmastar camera module I have laying around for months.
@ckuethe
@ckuethe 13 күн бұрын
Even easier than soldering: short the clock pin to the data of the flash with a pair of tweezers, a screwdriver, a bit of wire, etc. You'll mess up the read just the same, thereby dropping into u-boot, with less chance of overheated traces, lifted traces, solder bridges...
@ThanassisTsiodras
@ThanassisTsiodras 12 күн бұрын
Nice video as always, Matt. A suggestion for your soldering - always tin your wire ends before soldering them on anything. It is much easier to solder a freshly tinned wire to your target.
@SarahKchannel
@SarahKchannel 13 күн бұрын
take a raspberry pi pico, as your UART interface, write a small program that detects the glitch timing and trigger the glitch on the GPIO - auto glich jail breaker.
@coffeegonewrong
@coffeegonewrong 22 сағат бұрын
Had the same thought but using a simpler Arduino loop timed to sense a power rail waking up and a variable to set the timing,
@NebOjsa
@NebOjsa 12 күн бұрын
ho ho ho, i didn't know your youtube channel Matt, so amazing demonstration of glitching a device. Just received my bus pirate 6 a couple of days ago. I was working on a little fiber converter where uart was of corse disabled at the boot. I dumped the firmware, but now i have a new exercise with this video, let's glitch it ! Thank you for sharing your knowledge, giving it to the community is what makes you a real hacker !!!!
@victorchorques4893
@victorchorques4893 13 күн бұрын
New video, cup of tea, sit and relax!! Amazing job! Thanks Matt
@fotografm
@fotografm 12 күн бұрын
Brilliant video ! It reminded me of how I once had to glitch a Thinkpad bios chip to get into the password protected bios 🙂
@talkingcure
@talkingcure 13 күн бұрын
i really like your content, it’s above my knowledge base but I’m learning more and more through your content. I like how you strike a balance between explaining things again / assuming your audience has seen your previous videos/know what you’re talking about. great stuff
@mjmeans7983
@mjmeans7983 13 күн бұрын
To solder to small pins in circuit, it's easier to use plastic insulated wire-wrap wire. Multiple colors. Single strand thin pure-copper wire with plastic insulation (not enameled speaker coil wire). Strip just enough of the insulation for the length of the pin you are attaching to, tin the end, hold the wire nearly perpendicular to the PCB (slight angle) so the wire is soldered parallel along the pin from the bend at the chip to the bend at the PCB. Best when you want to wire up more than two pins right next to each other to avoid solder bridges. A vertical microscope might not be the best option since one of your hands will be nearly directly over the pin being soldered. Not great capturing video. The best view to look at this is 30-60 degrees off vertical. I don't use a microscope. I use either a magnified adjustable desk light, or a Jewlers eye-loupe, or for really fine pins a set of dentist's magnified glasses. This kind of wire can also be used to solder to tiny discrete components that are right next to other tiny components where larger stranded wire is just too big.
@donreid358
@donreid358 13 күн бұрын
Yes #30 wire-wrap is great. Use Teflon coated wire, it has a higher melting point. You will want to tape it down, solid wire breaks pretty easily when bent a few times.
@tin2001
@tin2001 10 күн бұрын
I also noticed he's soldering to the base of the pins, aiming outwards at 90 degrees... Sometimes it works better when you come over the top, and solder parallel to the pin, down its side. Bend the wire to shape first, and hold it down with your finger on top of the chip. Obviously this doesn't work if you need to use loads of pins on both sides, but it's a trick to keep in mind.
@saad1983
@saad1983 13 күн бұрын
awesome work... p/s we all have those bad solder days. looking forward to seeing your next one.
@retsof
@retsof 13 күн бұрын
Nice, I have two of these at home and was wondering about messing with them 🤘
@diepeterpan
@diepeterpan 13 күн бұрын
My soldering was the same, watched a ton of videos, most important was to have nicely tinned solder tip and the temp is correct. Ans with a ton of practice its near perfect. ❤
@mattbrwn
@mattbrwn 13 күн бұрын
I swear I usually solder better when I'm not recording myself doing it...
@theodorekorehonen
@theodorekorehonen 13 күн бұрын
That's def the way it goes lol
@UnCoolDad
@UnCoolDad 13 күн бұрын
@@mattbrwnyour tip looks oxidised - get a new one.
@tin2001
@tin2001 10 күн бұрын
​@@mattbrwn I think lots of things are done better when not trying to record yourself doing it. Just having to work around the camera makes it harder before you even start on the psychology of it.
@Christian-o4u
@Christian-o4u 8 күн бұрын
I love that you show everything, very educational and cool for a programmer with interest for electronics and hacking. Also nice you leave in authentic parts like when it's a struggle to solder :D
@timmehlittleloud2251
@timmehlittleloud2251 12 күн бұрын
I was into this sort of thing years ago. Work took over and time got shorter. This and your other videos has rekindled my interest. Simple process on this one but superb video never the less. 👍👍👍
@BalticLab
@BalticLab 7 күн бұрын
Finally found a new interesting channel so subscribe to. Weird that you were never recommended to me before. Well, the algorithm works in mysterious ways I guess. 😃
@alalalavaladu3670
@alalalavaladu3670 13 күн бұрын
Funny seeing you struggle with soldering. Brings back memories from uni.
@iangraham6730
@iangraham6730 12 күн бұрын
Great viewing as always! Thanks Matt! Can you show how to modify firmware, and maybe add RTSP to a camera?
@tommyt623
@tommyt623 12 күн бұрын
IMO this would be good opportunity to followup (as you were saying) with a firmware dump, modify, re-program, etc. This would be beneficial in that it would provide ideas for those who run into situations where it would be required to do so. Viz inits resetting all tty connections, etc. Just my $.02. Great Videos!
@SimonCas
@SimonCas 12 күн бұрын
I do some fairly high level soldering, installing csp’s bga’s QFN’s you name it, fly wires from the solder balls etc. currently going through a metallurgy class about SMT from a metallurgy nerd. I know so much more than I care to know about solder lol.
@brunobmartim
@brunobmartim 12 күн бұрын
That was incredible. You are genius. Amazing video, thanks for sharing with us.
@OldColar
@OldColar 9 күн бұрын
Great video! During a software downgrade I bricked my C200, looking around online I found a post on Reddit that someone was able to interact with it via an ethernet port on the board and push the firmware via TFTP, unbricking the camera. Won't post the link as I'm sure anyone can find the post with some google-fu. Unfortunately I have zero skill with electronics and ended up ripping the pads from the board, but this takes it to the next level!
@somacruz8272
@somacruz8272 8 күн бұрын
you need to post that link you haven't been doing this long but what you jut did is the most infuriating thing to possibly put into a forum for this kind of hobby.
@cyberdusttv
@cyberdusttv 7 күн бұрын
​@@somacruz8272 youtube has been deleting links in comments for years at this point.
@TonyJewell0
@TonyJewell0 10 күн бұрын
Great video. You could sneak in an esp8266 that would connect to the tx/Rx, float the DO pin on the flash until it sees the second auto negotiate and then ground the DO. After that it could do the modifications to the bootcmd, run the normal init and then just provide telnet pass thru access to the root shell that it has.
@turnkit
@turnkit 10 күн бұрын
Matt, suggested future similar projects… focus on cheap hardware from Meraki that traditionally only could be used with a license but that which likely can use OpenWRT once ported. Especially the WiFi 6 and newer gear, eg MR28, MR36, MR36H, MR44, MR46, MR46E, MR56, MR76, MR78, MR86. Pioneer some work by getting a new model supported in OpenWRT like these models already are: (Google for OpenWRT and you’ll see a page full of already working models. Note that some like the MR33 have countermeasures in the 2017 firmware that will brick your hardware if going into uboot. Would like to see you fix that!) Then explain to the audience and demo how cheap “locked” Meraki gear can be reflashed with OpenWRT for inexpensive and powerful access points and switches. It’s enough if you can show and document just how to get into the newer access points; someone else will do the OpenWRT port. Getting in is apparently hard on some of these. Thanks for your channel.
@zapjunkie
@zapjunkie 13 күн бұрын
Another great video Matt! Any interesting network traffic on this tplink camera? Calling home for anything good?
@Sw1ndl3r-v2p
@Sw1ndl3r-v2p 13 күн бұрын
Hi, Matt. Thank you so much for sharing such fantastic videos on KZbin. I have a router device that doesn’t have an exposed UART interface, but I found in the MCU’s datasheet that certain pins are designated for UART functionality. Would it be possible to scrape off the solder mask on the corresponding pin traces and try to connect that way? Have you ever had a similar experience? This MCU uses a QFN128 package, with some pins located within the pad, so I can’t connect directly to its pins and can only try connecting through the exposed traces. My English isn’t very good, so I hope you can understand.
@mattbrwn
@mattbrwn 13 күн бұрын
you going to have to either find a place those UART pins are exposed on the board OR remove the chip, solder magnet wire to the traces, then return the BGA chip back to the board... which is easier said than done
@Sierra-Whisky
@Sierra-Whisky 8 күн бұрын
Awesome! I think you just gave me a very good reason to clean up the mess in my mancave and start poking in some devices I have laying around 😂
@timfoster5043
@timfoster5043 12 күн бұрын
No idea why this came up on my YT feed, but .. well, it was pretty cool. I have no idea why I'd want to hack my Tapo cameras. Didn't even know it could be done. But now I know...
@kb9mtd-aaronwebb
@kb9mtd-aaronwebb 13 күн бұрын
Great video! Another tool in the toolbox! Thanks!
@mousefad3673
@mousefad3673 9 күн бұрын
Awesome video, thanks!
@SimonCas
@SimonCas 12 күн бұрын
The solder wants to wick to the hottest part and away from the coolest. The leads will probably stay colder than the wire you are using to probe. Try a solid core wire, also that tip is probably oversized and slightly oxidized
@SimonCas
@SimonCas 12 күн бұрын
But honestly if works it’s not broke.
@firex5250
@firex5250 13 күн бұрын
What a wonderful video.
@foobarf8766
@foobarf8766 13 күн бұрын
Great tutorial thanks! I'm going to try this! The flash on mine is an eon qh64a-104hip, luckily it has UART test pads too.
@foobarf8766
@foobarf8766 13 күн бұрын
Update: it worked! But the bootargs is missing on this one, it seems they built the kernel with it's command line baked in to stop this kinda thing (it's a build option, setenv bootargs does nada for me). Glitch immediately after the 2nd 'click' from the IR shutter. Glitching earlier will revert to a u-boot mask ROM i think but it's impoverished with only an 'httpd' command for firmware updates.
@309electronics5
@309electronics5 12 күн бұрын
​@@foobarf8766Yep sometimes they bake the boot args into the kernel binary or the bootloader so you cant change them unless you try to glitch the flash or flash a custom firmware on it. I also had a device that did not allow me to change the bootargs or any kernel parameters
@foobarf8766
@foobarf8766 12 күн бұрын
​@@309electronics5 thanks dude, good to know its not just me! the vendor has a github repo so I can build it maybe but where to find the .config?
@Fillzee75
@Fillzee75 13 күн бұрын
Great video! It would be neat to install in the device a pi pico or similar micro to watch the uart output and perform the glitch automatically on every boot like a game console modchip. Not sure how useful it would be for this case but nice proof of concept.
@mattbrwn
@mattbrwn 13 күн бұрын
This would be a good exercise regardless of how practical it is... good idea!
@Fillzee75
@Fillzee75 13 күн бұрын
@@mattbrwn ...just some more brainstorming, maybe an ESP32 with a web interface that would let you could change the boot args for the next boot
@morphinedreamz
@morphinedreamz 13 күн бұрын
I have a Netgear AC1200 R6120 i tried doing this with by monitoring the UART serial console and the R6120 wouldnt boot with it set up, i had to manually short spi pin 2 to pin 4. I tried with a push-button and it wouldnt boot either lol
@HyenaEmpyema
@HyenaEmpyema 12 күн бұрын
This is really cool! I would love to be able to buy these proprietary-style hw on the cheap and then use them for libre software systems. thanks
@CSM0
@CSM0 8 күн бұрын
SigmaStar?
@jasperfirth8933
@jasperfirth8933 12 күн бұрын
Great stuff keep it up
@CorollaGTSSRX
@CorollaGTSSRX 12 күн бұрын
I'd like to see more glitch stuff. Can you do an automated one that needs more of a precise injection?
@felixcosty
@felixcosty 13 күн бұрын
Thanks for the video. Would still like to see a video flashing Freshtomato to a router to see if it has better security. More videos about taking control of an IOT and making my own, so it will not report home to some place in china or where ever. The devise will be 100% under user control.
@microcolonel
@microcolonel 8 күн бұрын
Security cameras are one of the things that absolutely must have observable, user serviceable firmware in many applications; but is somehow one of the few things that has no practical mass market option offering these properties.
@r4malho80
@r4malho80 11 күн бұрын
Estou lutando a muito tempo para mudar a logomarca de um DVR, mas não consigo chegar nesse ponto que você está. Parabéns pelo vídeo.
@MarkRuvald
@MarkRuvald 10 күн бұрын
I used a piezo speaker as it has high impedance. That allows to hear the TX during boot.
@Kabodanki
@Kabodanki 13 күн бұрын
I have one on my desk, it's a rainy day, let's break it, mess up and throw it away ;)
@Spudz76
@Spudz76 12 күн бұрын
Probably could also `setenv bootdelay=3` to enable break to bootloader prompt without future glitching (since UBoot input was not compiled completely out, and `stdin=serial`). This is similar to grub with a timeout of 0 vs non-zero.
@adamsempire
@adamsempire 11 күн бұрын
Matt , if you are on N.America . Where and when ?coolest guy I can speak of . You may may be the one .
@foobarf8766
@foobarf8766 13 күн бұрын
23:08 there's serial bitflips or something that turned the x in 0x3FE0000 into 0p3FE0000 i just noticed
@bubbasplants189
@bubbasplants189 13 күн бұрын
Think you might have been able to do it with just connecting one wire to the pin and touching it to a ground point (the big mounting holes)
@JustAnotherAlchemist
@JustAnotherAlchemist 11 күн бұрын
Well done! The ease of this has my head spinning with ideas. *Edit: I got a question, actually... * how do you deal with unknown/random CRC's when modifying bin files for write back to EEPROM/FLASH? I have a small I2C EEPROM (only like 256 bytes) .... it has a few addresses that shuffle in a way that looks suspiciously like a CRC... but I cannot figure out the polynomial or algo for how it's calculated. This EEPROM is, in essence, the vector into this device, so I have to be able to modify the data here to move further. I can't do that unless I pass the CRC validation.
@KallePihlajasaari
@KallePihlajasaari 8 күн бұрын
With such a small memory they may have used an 8 bit CRC. You could brute force this by changing the variable data from 00 to FF and re-testing.
@hafo821
@hafo821 11 күн бұрын
interesting 👀 i will definitely test it out on some devices
@SB-qm5wg
@SB-qm5wg 12 күн бұрын
excellent vid
@skewty
@skewty 11 күн бұрын
Maybe get SSHd running by reading some extra files off the network after boot? Might be easier than glitching it to get in each time.
@magoo9838
@magoo9838 13 күн бұрын
Marvelous
@franciscopacheco7003
@franciscopacheco7003 12 күн бұрын
The hell I need this berries thanks
@federicogorla31
@federicogorla31 3 күн бұрын
Great video as always. Can you tell us what the exact model is?
@norm1124
@norm1124 9 күн бұрын
Nice hack 🎉
@Shinika01
@Shinika01 13 күн бұрын
GG matt !
@daw00t
@daw00t 13 күн бұрын
What DMM and software are you using for the overlay in the video? I want it! :)
@bogdanmarinescu78
@bogdanmarinescu78 12 күн бұрын
Those serial issues are very weird, I never saw anything like that. I'd try to drop the baudrate a bit, just in case the serial controller inside the SoC is shit.
@0xTraceRabyte
@0xTraceRabyte 13 күн бұрын
Let's go 🤩
@andriibatyiev9834
@andriibatyiev9834 8 күн бұрын
I do not understand why you cannot override password hashes? At 24:44 in the video, you can see that overlayfs with writable sublayer (/overlay) is mounted as a root. So, it /should/ be possible to override any file, unless there is some other issue (like what is "pmpfs" filesystem).
@franciscopacheco7003
@franciscopacheco7003 12 күн бұрын
No men we need this more than ever her in latam those cams tons
@robertosutrisno8604
@robertosutrisno8604 13 күн бұрын
Any resources which tells why those glitches works? Is it a bug with the uboot/security measures or intended behavior? If I'm interpreting correctly you basically shorted the flash chip to make them temporarily unavailable to the uboot, then rather than gracefully handle the exception, uboot just give preboot access?
@tisme1105
@tisme1105 11 күн бұрын
Uboot wasn't able to read flash chip ID so couldn't autoboot and dropped into hush shell. More locked down IoT won't give you a shell, won't let you change bootargs etc.
@ДмитрийШпаков-о3н
@ДмитрийШпаков-о3н 12 күн бұрын
Cool.
@thehady1
@thehady1 13 күн бұрын
What did you study matt, comp science or electronics engineering
@coffeegonewrong
@coffeegonewrong 22 сағат бұрын
I ran into some weird text glitches with a UART port on another device. Eventually I switched to a different adapter and they went away. Might be as simple as a poor connection so the voltage rise/fall of the signal is delayed or doesn’t peak high enough for the adapter to it as a 1 or 0
@optimiserlenergie1094
@optimiserlenergie1094 9 күн бұрын
An interesting video idea would be to defeat a secure boot and be able to load your own firmware
@donpalmera
@donpalmera 13 күн бұрын
Probably didn't need to do all of this. Those chips have an in circuit programming mode in the uart pins.
@tisme1105
@tisme1105 11 күн бұрын
do you have reference link to read more on this for sigmastar?
@noxos.
@noxos. 12 күн бұрын
Hello Matt, can you please make a Video, that explains how I can get adb on an Echo Show 5 2 gen.
@ghwizz
@ghwizz 13 күн бұрын
Are there tools for glitching data transfers that are a bit more subtle? Like watching for a pattern coming across from an eeprom to a micro and just substituting a few bits as it goes across?
@bartzilla333
@bartzilla333 13 күн бұрын
You should do the w/ the Spotify Car Thing it will be bricked my Spotify soon.
@bartzilla333
@bartzilla333 13 күн бұрын
There are a bunch of videos getting to U-Boot
@SimonCas
@SimonCas 12 күн бұрын
Please tell me that flash chip was reinstalled? There’s no way it came that messy
@ChandrashekarCN
@ChandrashekarCN 12 күн бұрын
💖💖💖💖
@ExplosiveAnyThing
@ExplosiveAnyThing 13 күн бұрын
The reason why I guess it didnt paste it correctly is because of the hardware flow control
@ahmadshami5847
@ahmadshami5847 13 күн бұрын
10:33 what is this kind of probes called that he is using? They seem so seemless to use like a plugging mechanism.
@mattbrwn
@mattbrwn 13 күн бұрын
PCBite probes :)
@jaysonrees738
@jaysonrees738 13 күн бұрын
I think that's known as a pogo pin, and they appear to be on a wire armature for hands free placement. The pins have a tiny spring inside that helps apply pressure and keep contact.
@theodorekorehonen
@theodorekorehonen 13 күн бұрын
Hey what do you mean by a wire armature? I'd like to have a similar setup and did a fair bit of googling after watching a previous vid but I must've not had the right terms to search for
@jaysonrees738
@jaysonrees738 13 күн бұрын
@@theodorekorehonen A more common term is probably bendable third hand.
@morphinedreamz
@morphinedreamz 13 күн бұрын
Hey Matt, the livestream you recently did with the spi glitch is what got me into my Netgear AC1200 R6120 but I'm having issues modifying the squashfs on a downloaded firmware update. I'm trying to modify setup.cgi to drop a reverse shell but the location of /etc is "/etc/null" I've tried "mkdir /etc" but it auto deletes after unmounting squashfs.img. The kernel panic doesn't allow UART input. Any suggestions? eg: research material, personal advice etc
@nikon9871
@nikon9871 13 күн бұрын
Possible to do the same thing on a blink mini camera? I hate the Amazon bs you have to deal with.
@Malunus_coin
@Malunus_coin 13 күн бұрын
Maybe
@myronredden6955
@myronredden6955 11 күн бұрын
Why aren't you using IC chip clips?
@theodorekorehonen
@theodorekorehonen 13 күн бұрын
Here's a random suggestion. Yealink makes some office phones that are branded verizon that even when you flash standard yealink firmware to them, the first thing it does is connect to a server and download the Verizon stuff. And then no web gui. You can get around this by interrupting the connection to that server at just the right time and then change the address of the server in the web gui to garbage but it's a giant pain to do. Would there be a way to do this solely by messing with the hardware? I know this is random but I had some of these phones and they were a giant PITA to deal with
@latimer4964
@latimer4964 13 күн бұрын
Get the server address they use and then use a proxy to connect to the server you want instead.
@dingokidneys
@dingokidneys 12 күн бұрын
It looks like you just want to kill access to the server dishing up the Verizon firmware. You should be able to do this with a firewall rule on your router - if destination is nasty IP, drop connection - or sinkhole the domain name in DNS using say a Pi-hole. Use Wireshark to check if the server IP is found via DNS or if it is hard coded to know which is best way to proceed.
@tin2001
@tin2001 10 күн бұрын
​@@dingokidneys Or put the phones on a VLAN that doesn't have DNS specified in the DHCP. Or use a custom DHCP response for those devices that gives no DNS servers.
@JasonBlack66
@JasonBlack66 11 күн бұрын
"Qstar"? that dont look like any 'Q' im used to.
@mnageh-bo1mm
@mnageh-bo1mm 13 күн бұрын
persistence we want to see persistenceeeeeeeeeeeeeeeeeeeee
@mattbrwn
@mattbrwn 13 күн бұрын
probably will be with a firmware mod in an upcoming vid.
@ajaythakkar9873
@ajaythakkar9873 13 күн бұрын
Could you add the link for the probe tool you're using to connect to the MCU UART pins?
@mattbrwn
@mattbrwn 13 күн бұрын
just added in the pinned comment since more than 1 person asked!
@theseenandunseen
@theseenandunseen 13 күн бұрын
so if Uboot does not recognize the flash type, it falls back onto a default type that consequently will load the kernel image at the wrong offset, throwing an exception that eventually leads into the uboot prompt?
@tin2001
@tin2001 10 күн бұрын
If I recall, uboot will try a list of boot options in an order defined at compile time (much like BIOS on a PC trying the floppy drive then the CD drive, then the hard drive). If this all fails, it drops to the prompt. Most manufacturers don't bother changing any of these defaults... Partly because it isn't necessary for the product to work reliably (if the flash fails, the device is dead anyway), and partly because they set it up for development purposes to boot off multiple things, and simply never bother changing it.
@TheCurtisnixon
@TheCurtisnixon 11 күн бұрын
protip, tin your wires before trying to connect them.
@shantilkhadatkar1195
@shantilkhadatkar1195 13 күн бұрын
the echo back is always wierd at 115200 baud rate
@SimonTschuor
@SimonTschuor 13 күн бұрын
setenv bootdelay 1 😉
@foobarf8766
@foobarf8766 13 күн бұрын
If uboot was built with #define CONFIG_AUTOBOOT_KEYED_CTRLC you can just ctrl-c too I think?
@309electronics5
@309electronics5 12 күн бұрын
​@@foobarf8766depends. Sometimes Uboot does have that prompt but then it just insta loads the kernel and initrd into memory and boots it so you need some delay so uboot will wait for the ctrl c input and then stop booting
@limpbiskit66
@limpbiskit66 13 күн бұрын
So can this be used to gain root access in phones with locked bootloaders? Looking at you, Smasnug
@JanSoltan-wj1hs
@JanSoltan-wj1hs 13 күн бұрын
No. The AVB (Android Verified Boot) spec states that when the bootloader can't verify the boot/recovery partition (where the kernel image is), and the bootloader is "locked", the device should enter the RED verified boot state (the boot fails entirely). Also, the bootloader cannot under any condition allow for the loading and execution of unsigned (non-original) code. In practice, this means that if you somehow manage to alter the boot image that's being loaded, the bootloader will refuse to boot and enter some kind of emergency download mode (in the case of Samsung, it's called "ODIN") to let you restore the device. This mode however, will only let you flash firmware that's signed by the manufacturer's key.
@cvabds
@cvabds 13 күн бұрын
cant you cross compile another kernel?
@eni4ever
@eni4ever 13 күн бұрын
That soldering job was brutal!
@der.Schtefan
@der.Schtefan 9 күн бұрын
As German, I am always triggered how other nations pronounce "etc"
@ingulari3977
@ingulari3977 12 күн бұрын
Which camera is it? Tapo C200 ?
@mattbrwn
@mattbrwn 12 күн бұрын
C210
@MarcioZbs
@MarcioZbs 13 күн бұрын
Is there a conector for external antenna on this cam?
@R0lNUJ
@R0lNUJ 12 күн бұрын
@herauthon
@herauthon 11 күн бұрын
is that Linux for MIPS ?
@Adiga_50
@Adiga_50 13 күн бұрын
To be accurate UART gives you a console not a terminal
@riccardozappitelli450
@riccardozappitelli450 13 күн бұрын
you look like wilson from dr house, lol
@simondj8572
@simondj8572 12 күн бұрын
bro could you share your linux config? thanks
@mazensmz
@mazensmz 11 күн бұрын
Do the same for Playstation 5
I Went Too Fast
16:24
SuperfastMatt
Рет қаралды 161 М.
If people acted like cats 🙀😹 LeoNata family #shorts
00:22
LeoNata Family
Рет қаралды 15 МЛН
Accompanying my daughter to practice dance is so annoying #funny #cute#comedy
00:17
Funny daughter's daily life
Рет қаралды 12 МЛН
Players vs Pitch 🤯
00:26
LE FOOT EN VIDÉO
Рет қаралды 135 МЛН
Turn Off the Vacum And Sit Back and Laugh 🤣
00:34
SKITSFUL
Рет қаралды 4,5 МЛН
Free Data From Space With Othernet (Is Almost Over!)
27:33
saveitforparts
Рет қаралды 91 М.
This is in a Different Class Than a Raptor Engine!
38:47
Tech Ingredients
Рет қаралды 175 М.
Linux Kernel 6.12 | This is Historic
1:07:22
Maple Circuit
Рет қаралды 75 М.
Tandy CM-1: A broken high-end 26khz monitor from 1984
1:07:47
Adrian's Digital Basement
Рет қаралды 59 М.
The World's Simplest Audio Amp just got BETTER?! (MOSFET Amp) EB#61
13:50
If people acted like cats 🙀😹 LeoNata family #shorts
00:22
LeoNata Family
Рет қаралды 15 МЛН