Setup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4

  Рет қаралды 70,870

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 87
@LiveOverflow
@LiveOverflow 6 жыл бұрын
Yaya I know! :D It's SWD not JTAG
@insidiousx6506
@insidiousx6506 6 жыл бұрын
"Doesn't even support X86 64-Bit..." hmm wat? xD
@JustTechGuyThings
@JustTechGuyThings 6 жыл бұрын
How are you feeling about the GHIDRA release 2 months from now? It's apparently better than IDA.
@QuickishFM
@QuickishFM 6 жыл бұрын
@@insidiousx6506 He means x86_64 which is often shortened to x64, so that's why there may be confusion
@zzco
@zzco 6 жыл бұрын
Also you kind of got your two audio clips too close to one another at 7:47
@johnrambo6549
@johnrambo6549 6 жыл бұрын
Mr @LiveOverflow Are you gaay ?
@HCKDKU
@HCKDKU 6 жыл бұрын
One and only channel on KZbin that uploads real hacking videos 😊
@HCKDKU
@HCKDKU 6 жыл бұрын
@Batch Drav yeah I agree buddy 😀
@jex8885
@jex8885 6 жыл бұрын
​@Batch Drav Sounds like you have some good recommendations, any other cool channels in the other categories you mentioned that I should also check out? :)
@jex8885
@jex8885 6 жыл бұрын
Batch Drav thx, I'll check them out 😊
@Jamown
@Jamown 6 жыл бұрын
3 videos this week, we are honoured! Keep up the great work LiveOverflow :)
@GalaxyCatz
@GalaxyCatz 6 жыл бұрын
Jamown his real name is Michael Stevens
@replaycoding
@replaycoding 6 жыл бұрын
I really appreciate the fact that you are doing this for free. It has helped me a lot when I was learning how to understand software. Thank You :)
@georgetroulis
@georgetroulis 6 жыл бұрын
I'm a student that just got into embedded programming with STM32 less than a year ago and I LOVE THESE VIDEOS. They're very insightful and you make them such that they make anyone watching them curious to learn more. Thank you for making these, keep up the awesome work ♥️♥️
@AlanMedina314
@AlanMedina314 3 жыл бұрын
I like your videos because we get to see a different perspective of the arm architecture beyond basic coding.
@amirroohi4566
@amirroohi4566 6 жыл бұрын
Why is ur voice so calming, I was doing some Italian homework and listening to the video, i do it all the time, doing some homework and listening to ur videos, nice stuff ;)
@quantumbracket6995
@quantumbracket6995 6 жыл бұрын
what I most love about this series is the intro animation
@PowerScissor
@PowerScissor 6 жыл бұрын
I have zero idea what's going on in any of these videos, and have no plans to ever learn anything related to them. Yet, I watch them all...the whole videos...and love them. What's wrong with me?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
Nothing! But it shows me that my videos can be entertaining regardless :3
@occamsrazor1285
@occamsrazor1285 6 жыл бұрын
1:21 Some, that may not know, may be interested to know why f00dbabe appears as beba0df0 in memory. This is called "endianess." When read from memory, into a register, it will be read as f00dbabe. Each byte, like f0 or be, is read straight forward, but the order of the bytes is written into memory backward. Hence: beba0df0. Endianess is an important concept in RE.
@RoiEXLab
@RoiEXLab 6 жыл бұрын
I really love this kind of videos because I'm interested in this topic, but I'd never be patient enough to waste my time dealing with hardware. I love software though
@wegi9621
@wegi9621 6 жыл бұрын
Absolutly amazing bro ! Thanks for sharing.
@HorochovPL
@HorochovPL 6 жыл бұрын
I'm about to dive into ARM (was sitting with AVR for a long time). Thank You for explaining how some stuff is managed after compiler does its job! Probably I won't need those informations, but it's nice to know.
@AxGxP
@AxGxP 5 жыл бұрын
Большое СПАСИБО!
@angelozinna96ct
@angelozinna96ct 5 жыл бұрын
You are a god for me, pls keep going!
@osenseijedi
@osenseijedi 6 жыл бұрын
IDA should sponsor you, bro. You made me want to buy a licence for my self
@hassansyed5661
@hassansyed5661 6 жыл бұрын
On most of the secure systems JTAG is locked. I would like to see how you unlock a JTAG if it is locked in the firmware :-)
@GRBtutorials
@GRBtutorials 6 жыл бұрын
Decap the chip, cover the flash memory and erase the fuses using a UV lamp. Easy peasy lemon squeezy. JK, this is much easier said than done. You could also try glitching it as they did with the Switch's processor, bypassing the fuse checking. Also easier said than done.
@Spirit532
@Spirit532 6 жыл бұрын
@@GRBtutorials On secure devices, fuses are generally OTP, physically destroyed transistors, not flash with secure bits.
@GRBtutorials
@GRBtutorials 6 жыл бұрын
@@Spirit532 Well, yeah, now that I looked for it, it seems like STM32 have OTP memory (also known as PROM, programmable ROM, usually made out of antifuses) for JTAG lockout, so that leaves us with just three options: glitching, finding some kind of vulnerability in the fuse check, or some kind of extremely complex physical attack. The only scenario in which glitching or vulnerabilities in the fuse checking would be impossible to find would be if there was no fuse checking at all. If we were making a secure MCU with paranoid security, we could put JTAG (or other debug interface) handling code in OTP memory, and when locking it out, blow all the antifuses. Then the JTAG handling code would get converted to zeros or ones (which we could define as the opcode for NOP).
@Kudi10004
@Kudi10004 6 жыл бұрын
For the STM32F0 sub-series exist some known vulnerabilities: www.aisec.fraunhofer.de/en/FirmwareProtection.html
@hassansyed5661
@hassansyed5661 6 жыл бұрын
@@GRBtutorials The only best solution is glitching. I would love to see someone sharing a video on Glitching ;) it's a very sensitive topic to discuss in public :)
@CharmanteEstPris
@CharmanteEstPris 6 жыл бұрын
Can't be clickbait if they don't understand the title. ¯\_(ツ)_/¯
@LiveOverflow
@LiveOverflow 6 жыл бұрын
as long as you understand the video it's fine!
@CharmanteEstPris
@CharmanteEstPris 6 жыл бұрын
@@LiveOverflow Ahaha, thanks! Great content once again. :)
@rhysperry111
@rhysperry111 6 жыл бұрын
I both love and h8 the fact that this is spanned over multiple videos. It allows me to appreciate and understand your videos but I hate the w8!
@LiveOverflow
@LiveOverflow 6 жыл бұрын
I wish I know magic to create videos too!!!!
@metaorior
@metaorior 6 жыл бұрын
thanks alot man this is very interesting
@2003vito
@2003vito 6 жыл бұрын
never clicked on a video so fast without even reading the thumbnail or the title xd
@soorajjp1847
@soorajjp1847 6 жыл бұрын
believe me ur great in hacking electronics. I'm an electronics engineer but don't know the most of the stuffs which u did.
@allegas1
@allegas1 6 жыл бұрын
Whoa, just in time! I dumped my segway kickscooter (f103 cpu) firmware using fake update, which read it all from inside out. More skilled guys assembled it back together, as first 1kb was smashed by dumper. Now i understand, that it was just a table and it how it can be recovered.
@avri210984
@avri210984 6 жыл бұрын
I'm wondering what USB hub did you use and would you recommend it ? Thanks!
@derrickberg2825
@derrickberg2825 6 жыл бұрын
@LiveOverFlow PLEASE MAKE A SERIES ON THE HACKERONE CTF! I'm stuck on a few levels and i've been going through all your videos for the 100th time trying to get some ideas. I think it's best if you just take a look at these CTF's!
@QuickishFM
@QuickishFM 6 жыл бұрын
Nice video! Is it possible to change the BNE to a normal branch (or a JMP) to bypass the f00dbabe check, reupload to the chop, and then load custom firmware onto it?
@GRBtutorials
@GRBtutorials 6 жыл бұрын
Yes, but what's the point in doing that if you have physical access to the device? Might as well just load the custom firmware via JTAG from the beginning.
@QuickishFM
@QuickishFM 6 жыл бұрын
@@GRBtutorials yeah that's a fair point. I'm guessing you'd have to manufacture a foodbabe firmware and then fake a loading page with APLU commands for it right? That's the only way I can think of without jtag access
@d3line
@d3line 6 жыл бұрын
QuickishFM yeah, but load via aplu checks that the signature of the new firmware is done with correct private key (hopefully securely stored by developers). If I understand it correctly.
@QuickishFM
@QuickishFM 6 жыл бұрын
@@d3line Oh I see, makes more sense then
@emilyvavra2127
@emilyvavra2127 2 жыл бұрын
Very nice video, and thanks for sharing this. Also do you happen to know how I can load the aarch64 I have downloaded the packages from GitHub and there isn't any explanations on how to post ida to look into because overtime I try to patch and assemble it returns Sorry, this processor module doesn't support the assembler. Any help on that would be greatly appreciated. Thank you.
@Alexander-jm1oi
@Alexander-jm1oi 6 жыл бұрын
Bro, we need advanced C tutorials. Something like what to do after you studied pointers, strings, structs. Maybe some libraries?
@malgailany
@malgailany 6 жыл бұрын
In STM32 MCUs, the firmware developer can lock the firmware and will prevent others from accessing it with serial wire debug (SWD), or JTAG. I wonder why the firmware inside the Ledger wasn't locked and kept open?
@stdio.
@stdio. 6 жыл бұрын
You mean ReadOutProtection? I got the same question here, cause most of the devices that I checked have enabled 'ReadOutProtection'.
@hamburglurgl
@hamburglurgl 6 жыл бұрын
Cool stuff
@gameglitcher
@gameglitcher 3 жыл бұрын
Just rewatching this video and thinking about IDA, now I cant help but think if NSA knew about log4j when they released Ghidra.
@u0000-u2x
@u0000-u2x 6 жыл бұрын
Anyone have a suggestion to a free alternative to IDA for ARM reversing?
@u0000-u2x
@u0000-u2x 3 жыл бұрын
oh hey me from the past... turns out you found Ghidra and now rock at it ;)
@neoXXquick
@neoXXquick 6 жыл бұрын
is it possible to get dumped firmware?
@oussamalarbi6637
@oussamalarbi6637 6 жыл бұрын
best videos well explained and for dislikers they r haters
@milan8204
@milan8204 6 жыл бұрын
You need to make an collab with great scott
@thekakan
@thekakan 6 жыл бұрын
I love Great Scott's channel. He makes things, and these guys hacks into them. I don't think that they'll get along well lol
@u0000-u2x
@u0000-u2x 6 жыл бұрын
how would we know who is talking? :P
@Vogel42
@Vogel42 6 жыл бұрын
why use IDA 6.6 when IDA 7.0 is free?
@LiveOverflow
@LiveOverflow 6 жыл бұрын
Does that have arm? I dont even know. But I own 6.6 so I used that
@Vogel42
@Vogel42 6 жыл бұрын
@@LiveOverflow sorry i thought it did, i just checked and found that IDA freeware version supports only 16 architectures and ARM is not one of them.
@zuhayr1337
@zuhayr1337 6 жыл бұрын
Who else doesn't understand anything at all... Yet learns something....
@Kong_plays
@Kong_plays 6 жыл бұрын
Nice
@moweME
@moweME 6 жыл бұрын
The ledger is just a huge CTF...
@Gunhed507
@Gunhed507 6 жыл бұрын
Jese... one tease after another... :)
@jp2en
@jp2en Ай бұрын
You've loaded the dump to the wrong address, right? )))
@xxkryaxx
@xxkryaxx 6 жыл бұрын
I understood absolutely nothing, but okay.
@blackdj29
@blackdj29 6 жыл бұрын
me too, but looks pretty cool, isnt it? XD
@nasmRE
@nasmRE 6 жыл бұрын
RE > all
@TheVektast
@TheVektast 6 жыл бұрын
Resident Evil??? :D sure
@u0dgellxna
@u0dgellxna 6 жыл бұрын
@@TheVektast :Ffff
@nasmRE
@nasmRE 6 жыл бұрын
@@TheVektast ^^
@seanscon
@seanscon 6 жыл бұрын
f00dbabe? what a strange name
@steefant
@steefant 6 жыл бұрын
Not really. They are often combinations of f00d, babe, cafe, b00b, c0de - basically anything that is representable in hex in 4 characters to combine it to a full 8-character/32b value. Java uses cafebabe as the first 4 bytes of .class files (cf. Java's logo). And there was this little story not too long ago: mjg59.dreamwidth.org/14955.html
@nihil_0x
@nihil_0x 4 жыл бұрын
IDA Can't find entrypoint because of, its a raw binary! But how the f*ck the processor know where to execute from the program?
@Zooiest
@Zooiest 6 жыл бұрын
First like
@SciDOCMBC
@SciDOCMBC 5 жыл бұрын
you have to be careful with all this zeros, there are rumors that some people have broken their tongue for this reason 😜😜😜
@rhysperry111
@rhysperry111 6 жыл бұрын
I both love and h8 the fact that this is spanned over multiple videos. It allows me to appreciate and understand your videos but I hate the w8!
Looking at the PCB & Chips - Hardware Wallet Research #2
11:10
LiveOverflow
Рет қаралды 59 М.
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
#04 - How To Get The Firmware - Hardware Hacking Tutorial
34:08
Make Me Hack
Рет қаралды 172 М.
Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader
14:40
Hardware Wallet Hack: Ledger Nano S - f00dbabe
15:34
LiveOverflow
Рет қаралды 271 М.
rust runs on EVERYTHING (no operating system, just Rust)
14:29
Low Level
Рет қаралды 218 М.
In-depth: ELF - The Extensible & Linkable Format
19:02
stacksmashing
Рет қаралды 202 М.
#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov
1:30:37
Threat Models - Hardware Wallet Research #1
14:00
LiveOverflow
Рет қаралды 68 М.
Extracting Firmware from External Memory via JTAG
7:59
Joe Grand
Рет қаралды 111 М.
Local Root Exploit in HospitalRun Software
20:48
LiveOverflow
Рет қаралды 69 М.
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН