Mastering UART Communication: Gaining Access & Extracting Firmware on Unknown Boards

  Рет қаралды 83,383

Technically Unsure

Technically Unsure

Күн бұрын

Welcome to our comprehensive guide on UART (Universal Asynchronous Receiver-Transmitter) communication, where we delve into the intriguing world of hardware hacking and reverse engineering. In this tutorial, we embark on a journey to uncover the secrets of unknown boards, focusing on identifying and tapping into UART ports to gain unparalleled access to device functionalities.
We start by introducing the basics of UART communication and its significance in the realm of electronics. With the help of various FTDI (Future Technology Devices International) devices, we demonstrate how to establish a connection through a UART cable, facilitating both reading and writing operations on WiFi routers and other boards.
Our exploration doesn't stop there; we delve deeper into the hardware to identify and analyze the flash memory components used in these unknown devices. By skillfully dumping the firmware, we unlock a new realm of possibilities for understanding and manipulating device behavior.
Utilizing the powerful tool 'binwalk,' we dissect the extracted firmware to unveil hidden secrets, including passwords, configurations, and proprietary algorithms. This hands-on tutorial not only equips you with practical skills but also empowers you with the knowledge to analyze and assess the security posture of various devices.
Whether you're a seasoned hardware hacker, an aspiring reverse engineer, or simply curious about the inner workings of electronic devices, this video is your gateway to mastering UART communication and firmware analysis. Join us on this captivating journey to transform the unknown into the known, one board at a time."
Remember to like, share, and subscribe for more in-depth tutorials and guides on hardware hacking and reverse engineering. Drop your questions and experiences in the comments below; let's learn and grow together in this fascinating world of electronics!
#UART #FTDIDevices #FirmwareDumping #Binwalk #HardwareHacking #WiFiRouterHacking #FlashMemory #ElectronicsExploration #CircuitBoardAnalysis #DIYElectronics #TechHacks #EmbeddedSystems #SerialCommunication #FirmwareAnalysis #GadgetHacking #Cybersecurity #HackingTools #ReverseEngineering #ElectricalEngineering #TechDIY #IoTHacking #MakerCommunity #ElectronicHobbyist #TechTutorials #CircuitHacking #SoftwareAnalysis #ComputerEngineering #TechInnovation #GadgetModification #TechnologyExplained

Пікірлер: 21
@UniqueEvents-j6l
@UniqueEvents-j6l 3 ай бұрын
Great job! Kindly do a video on how to edit the firmware and write it back to the chip 🙏
@griffin188
@griffin188 3 ай бұрын
You're a Bad Ass! I think you provided everyone a solid foundation with knowledge to build skills.
@steve3122
@steve3122 2 ай бұрын
What microscope are you using?
@TechnicallyUnsure
@TechnicallyUnsure 2 ай бұрын
At the time of recording this video, I was using Andonstar, but see my latest video on Tomlov, I switched to using Tomlov since kzbin.info/www/bejne/pILdeIpprMhgjdk
@Dvid9331
@Dvid9331 3 ай бұрын
Note: If a 8 pin chip is next to a bigass inductor, it's possibly a power supply IC 😉
@nicolas4667
@nicolas4667 4 ай бұрын
Hello, really nice video ! How long does it take to read the flash on the TP Link ?
@TechnicallyUnsure
@TechnicallyUnsure 4 ай бұрын
Roughly 2 minutes I would say
@soupborsh6002
@soupborsh6002 4 ай бұрын
Thank you! 😘
@OsmanSheikh-cy5rc
@OsmanSheikh-cy5rc 6 ай бұрын
your video it's awesome
@Krauleidys
@Krauleidys 4 ай бұрын
I guess those resistors on TX and RX lines, working as voltage divider. In this case you can use 5 voltage logic.
@carolinapirate2830
@carolinapirate2830 10 сағат бұрын
What microscope are you using to look at that? My eyes are not as good as they use to be.
@TechnicallyUnsure
@TechnicallyUnsure 9 сағат бұрын
You can see it here kzbin.info/www/bejne/pILdeIpprMhgjdk
@fluffythedragonslayer
@fluffythedragonslayer 6 ай бұрын
But can you extract that chip data using the UART port?
@TechnicallyUnsure
@TechnicallyUnsure 6 ай бұрын
Unfortunately no, you can not. UART is just for communicating with the OS, reading and writing to the "terminal".
@mohsenSL
@mohsenSL 6 ай бұрын
Good job I bought a T48 a while ago. For handling with controllers Atmega16, v32, 644 T48 did its job with atmega644 microcontroller But with the Atmega16, 32 controller it copy random and mismatched data to the data on mcu memory If you match the data in the beffer with the data in the controller, it gives more than 900 errors I wrote to the manufacturer China... No respond. I wrote agine in Chinese , they did not respond and did not provide any support I never recommend programmed t48
@kerbalette156
@kerbalette156 3 ай бұрын
Hmm n300. Wonder what website has a write up on exactly what you did…
@siwi4818
@siwi4818 4 ай бұрын
‏‪28:38‬‏ Can you please link me to buy this blue clip, because black is bad
@nicknackthenoo
@nicknackthenoo 5 ай бұрын
The mystery board looks like a HooToo Tripmate Nano Travel Router. I have one the same.
@TechnicallyUnsure
@TechnicallyUnsure 5 ай бұрын
Oh. My. God. Thank you man! I really didn't know what it was and I just googled it and YES! I had that, you are 100% absolutely correct. Thanks for letting me know
@1DumbSquirrel
@1DumbSquirrel 23 күн бұрын
so im guessing you watched a video that suggested that you make a video that has a bunch of pointless hand movements. to help explain stuff. thanks, great job
Hacking a Knockoff Google Chromecast - Firmware Extraction
25:04
Matt Brown
Рет қаралды 109 М.
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН
#behindthescenes @CrissaJackson
0:11
Happy Kelli
Рет қаралды 27 МЛН
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 595 М.
Android Reverse Engineering
20:36
Technically Unsure
Рет қаралды 254 М.
IoT Hacking - Netgear AC1750 NightHawk - UART Root Shell
41:23
Matt Brown
Рет қаралды 35 М.
Chip Off Firmware Extraction - Hacking the Totolink WiFi Router
31:15
Hack everything: re-purposing everyday devices - Matt Evans
50:39
Linux.conf.au 2012 -- Ballarat, Australia
Рет қаралды 808 М.
Real Hardware Hacking for S$30 or Less - Presented by Joe FitzPatrick
45:01
Infosec In the City
Рет қаралды 19 М.
This is $87 ??!! TexHoo N100 based MiniPC
20:46
Technically Unsure
Рет қаралды 2,1 М.
ArmSoM CM5 | Can it Beat the Raspberry Pi CM5?
29:12
Technically Unsure
Рет қаралды 4,8 М.
#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov
1:30:37
IoT Hacking - Polycom Conference Phone - Firmware Extraction
33:53
ССЫЛКА НА ИГРУ В КОММЕНТАХ #shorts
0:36
Паша Осадчий
Рет қаралды 8 МЛН