I am really glad i encountered your channel. Love your content and learned a lot. Your videos have exactly the right pace. Just wanna say thanks! Please keep it up.
@worroSfOretsevraH3 ай бұрын
I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing. (I'm a hw guy) Thanks.
@smokeweedeveryday90993 ай бұрын
Sounds like you need to spend a little time in Ghidra with their software. You could bypass the virtual system detect.
@Jeff-ss6qt3 ай бұрын
After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down. You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart. If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.
@smokeweedeveryday90993 ай бұрын
@@Jeff-ss6qt I would just do it. I wouldn’t show anybody what I did. If I use a tool that doesn’t work, I modify the tool.
@mpicuser3 ай бұрын
Hello Matt, always a pleasure watching your videos. Thank you!
@rbmwiv3 ай бұрын
Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.
@justbendev23243 ай бұрын
I will never buy a black box with proprietary software that only runs on Windows.
@derrekvanee45673 ай бұрын
Yes. Xi Xing Ping Ponf special. Aur packages for everything though or just bit bang what protocol they're using and dump.
@justbendev23243 ай бұрын
@@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.
@Electrically-Electronic3 ай бұрын
Yeah me too only FOSS on linux
@sertralina100mg3 ай бұрын
@@Electrically-Electronic i dont understand tech guys who do hardware hacking that use and develop tools for windows. Linux is so much better
@DaleDix3 ай бұрын
Okely dokely
@6LordMortus93 ай бұрын
A fun idea. you should get the firmware to your firmware reader box :)
@wasabinow3 ай бұрын
Matt, thank you! Appreciate your interesting topics.
@XYZ567713 ай бұрын
Keep it up, its highly interesting!
@mohammedalghfeli41903 ай бұрын
Thaaaaank uuuuu Matt you are awesome for anyone want to get into hardware hacking
@LostDeadSoul3 ай бұрын
@Matt Brown Do you do FPGA stuff too? Just thinking that bit banging with an ASIC, one could be able to interface anything ;)
@_trbr3 ай бұрын
Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log
@Jennn3 ай бұрын
Thank you, Matt!!
@sabkaBaap00716 күн бұрын
Bro I have a screen dead google pixel 4a device. Everything is working behind the scenes but the display is dead and the repair cost of the display is too much but without display I cannot retrieve my data. So, can I extract the UFS chip out of the motherboard and then use this same method to extract my data?
@0xssff2 ай бұрын
bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.
@yusuf93563 ай бұрын
I need chromecast part2 video
@philipp__36713 ай бұрын
The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff. Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware
@MohmdSy53 ай бұрын
I also wanted to mention Eric cause he has done a great job explaining how to make a stealthy vm
@coolm983 ай бұрын
You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@MohmdSy5
@joelg67403 ай бұрын
Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol
@charleshines57003 ай бұрын
I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.
@mattbrwn3 ай бұрын
Yeah I could see UFS cards replacing SD cards for digital cameras
@charleshines57003 ай бұрын
@@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.
@RetroDelete3 ай бұрын
Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D . I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(
@mattbrwn3 ай бұрын
Lol crap
@mattbrwn3 ай бұрын
Thanks for pointing it out. Fixed now
@Unknown2023_13 ай бұрын
I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?
@namesurname2013 ай бұрын
Thanks ❤
@Segphalt3 ай бұрын
The what I assume is a USB A to USB A cable bothers me greatly.
@mattbrwn3 ай бұрын
Yeah you assumed correctly 😜
@lilmancc353 ай бұрын
Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.
@mattbrwn3 ай бұрын
My channel is a mix of old school hardware hacking and more security-focused reverse engineering. I see the word "Hacking" as a big tent.
@lilmancc353 ай бұрын
@@mattbrwn ok. I wasnt sure what your content was about but i watched the arlo video first, so it makes sense.
@tweebs13 ай бұрын
Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.
@phuo21853 ай бұрын
can you pls make a video on how to get shell of synology TC500
@SkippyDa3 ай бұрын
Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)
@mattbrwn3 ай бұрын
That's a very interesting chip and I don't think I know of anything off the top of my head to read it
@SkippyDa3 ай бұрын
@@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.
@ReggeditCh043 ай бұрын
Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand. Yeah, and the Emmc socket is a crap. Read and write took forever
@UndernetSystems3 ай бұрын
Very interesting device but also why would they make these tools so annoying
@SB-qm5wg3 ай бұрын
Strange you can't use this app in a VM
@xephael34853 ай бұрын
Have you found a better option?
@mattbrwn3 ай бұрын
Nope, not for UFS.
@xephael34853 ай бұрын
@@mattbrwn Aliexpress has some ICfriend or EasyUFS products... did you try any of those?
@lmaoroflcopter3 ай бұрын
It is at this point... you reverse the damn thing to crack it.
@Nebbia_affaraccimiei3 ай бұрын
3:40 yeah of course is just a way to verify you didn't crack the software. it doesn't functionally do anything when u use the UFS device
@cimogt78572 ай бұрын
Ufi box is slow device, you can fin better on the market: easyjtag + plus with adapter, mipi tester, Medus 2 pro Or u15 reader from jcid,
@kaydog8903 ай бұрын
Who owns it? You paid for it
@roberthealey72382 ай бұрын
Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?… Seems risky to be using proprietary hardware with proprietary crap software…
@sososisi87903 ай бұрын
OK IS THERE A WAY TO EXTRACT DATA RECOVERY FROM EMMC SHIP THAT IS ENCRYPTED ??? AND WHICH TOOL CAN BE USED IN ORDER TO DECRYPTE IT
@UltirianHeavyIndustry3 ай бұрын
15:19
@Unknown2023_13 ай бұрын
One day a problem will arise for you and you will need help and then you will see justice