UFS/eMMC Firmware Extraction - UFI Box

  Рет қаралды 11,490

Matt Brown

Matt Brown

Күн бұрын

Пікірлер: 68
@Micron88
@Micron88 3 ай бұрын
I am really glad i encountered your channel. Love your content and learned a lot. Your videos have exactly the right pace. Just wanna say thanks! Please keep it up.
@worroSfOretsevraH
@worroSfOretsevraH 3 ай бұрын
I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing. (I'm a hw guy) Thanks.
@smokeweedeveryday9099
@smokeweedeveryday9099 3 ай бұрын
Sounds like you need to spend a little time in Ghidra with their software. You could bypass the virtual system detect.
@Jeff-ss6qt
@Jeff-ss6qt 3 ай бұрын
After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down. You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart. If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.
@smokeweedeveryday9099
@smokeweedeveryday9099 3 ай бұрын
@@Jeff-ss6qt I would just do it. I wouldn’t show anybody what I did. If I use a tool that doesn’t work, I modify the tool.
@mpicuser
@mpicuser 3 ай бұрын
Hello Matt, always a pleasure watching your videos. Thank you!
@rbmwiv
@rbmwiv 3 ай бұрын
Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.
@justbendev2324
@justbendev2324 3 ай бұрын
I will never buy a black box with proprietary software that only runs on Windows.
@derrekvanee4567
@derrekvanee4567 3 ай бұрын
Yes. Xi Xing Ping Ponf special. Aur packages for everything though or just bit bang what protocol they're using and dump.
@justbendev2324
@justbendev2324 3 ай бұрын
@@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.
@Electrically-Electronic
@Electrically-Electronic 3 ай бұрын
Yeah me too only FOSS on linux
@sertralina100mg
@sertralina100mg 3 ай бұрын
@@Electrically-Electronic i dont understand tech guys who do hardware hacking that use and develop tools for windows. Linux is so much better
@DaleDix
@DaleDix 3 ай бұрын
Okely dokely
@6LordMortus9
@6LordMortus9 3 ай бұрын
A fun idea. you should get the firmware to your firmware reader box :)
@wasabinow
@wasabinow 3 ай бұрын
Matt, thank you! Appreciate your interesting topics.
@XYZ56771
@XYZ56771 3 ай бұрын
Keep it up, its highly interesting!
@mohammedalghfeli4190
@mohammedalghfeli4190 3 ай бұрын
Thaaaaank uuuuu Matt you are awesome for anyone want to get into hardware hacking
@LostDeadSoul
@LostDeadSoul 3 ай бұрын
@Matt Brown Do you do FPGA stuff too? Just thinking that bit banging with an ASIC, one could be able to interface anything ;)
@_trbr
@_trbr 3 ай бұрын
Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log
@Jennn
@Jennn 3 ай бұрын
Thank you, Matt!!
@sabkaBaap007
@sabkaBaap007 16 күн бұрын
Bro I have a screen dead google pixel 4a device. Everything is working behind the scenes but the display is dead and the repair cost of the display is too much but without display I cannot retrieve my data. So, can I extract the UFS chip out of the motherboard and then use this same method to extract my data?
@0xssff
@0xssff 2 ай бұрын
bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.
@yusuf9356
@yusuf9356 3 ай бұрын
I need chromecast part2 video
@philipp__3671
@philipp__3671 3 ай бұрын
The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff. Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware
@MohmdSy5
@MohmdSy5 3 ай бұрын
I also wanted to mention Eric cause he has done a great job explaining how to make a stealthy vm
@coolm98
@coolm98 3 ай бұрын
You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@MohmdSy5
@joelg6740
@joelg6740 3 ай бұрын
Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol
@charleshines5700
@charleshines5700 3 ай бұрын
I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.
@mattbrwn
@mattbrwn 3 ай бұрын
Yeah I could see UFS cards replacing SD cards for digital cameras
@charleshines5700
@charleshines5700 3 ай бұрын
@@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.
@RetroDelete
@RetroDelete 3 ай бұрын
Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D . I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(
@mattbrwn
@mattbrwn 3 ай бұрын
Lol crap
@mattbrwn
@mattbrwn 3 ай бұрын
Thanks for pointing it out. Fixed now
@Unknown2023_1
@Unknown2023_1 3 ай бұрын
I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?
@namesurname201
@namesurname201 3 ай бұрын
Thanks ❤
@Segphalt
@Segphalt 3 ай бұрын
The what I assume is a USB A to USB A cable bothers me greatly.
@mattbrwn
@mattbrwn 3 ай бұрын
Yeah you assumed correctly 😜
@lilmancc35
@lilmancc35 3 ай бұрын
Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.
@mattbrwn
@mattbrwn 3 ай бұрын
My channel is a mix of old school hardware hacking and more security-focused reverse engineering. I see the word "Hacking" as a big tent.
@lilmancc35
@lilmancc35 3 ай бұрын
@@mattbrwn ok. I wasnt sure what your content was about but i watched the arlo video first, so it makes sense.
@tweebs1
@tweebs1 3 ай бұрын
Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.
@phuo2185
@phuo2185 3 ай бұрын
can you pls make a video on how to get shell of synology TC500
@SkippyDa
@SkippyDa 3 ай бұрын
Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)
@mattbrwn
@mattbrwn 3 ай бұрын
That's a very interesting chip and I don't think I know of anything off the top of my head to read it
@SkippyDa
@SkippyDa 3 ай бұрын
@@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.
@ReggeditCh04
@ReggeditCh04 3 ай бұрын
Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand. Yeah, and the Emmc socket is a crap. Read and write took forever
@UndernetSystems
@UndernetSystems 3 ай бұрын
Very interesting device but also why would they make these tools so annoying
@SB-qm5wg
@SB-qm5wg 3 ай бұрын
Strange you can't use this app in a VM
@xephael3485
@xephael3485 3 ай бұрын
Have you found a better option?
@mattbrwn
@mattbrwn 3 ай бұрын
Nope, not for UFS.
@xephael3485
@xephael3485 3 ай бұрын
@@mattbrwn Aliexpress has some ICfriend or EasyUFS products... did you try any of those?
@lmaoroflcopter
@lmaoroflcopter 3 ай бұрын
It is at this point... you reverse the damn thing to crack it.
@Nebbia_affaraccimiei
@Nebbia_affaraccimiei 3 ай бұрын
3:40 yeah of course is just a way to verify you didn't crack the software. it doesn't functionally do anything when u use the UFS device
@cimogt7857
@cimogt7857 2 ай бұрын
Ufi box is slow device, you can fin better on the market: easyjtag + plus with adapter, mipi tester, Medus 2 pro Or u15 reader from jcid,
@kaydog890
@kaydog890 3 ай бұрын
Who owns it? You paid for it
@roberthealey7238
@roberthealey7238 2 ай бұрын
Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?… Seems risky to be using proprietary hardware with proprietary crap software…
@sososisi8790
@sososisi8790 3 ай бұрын
OK IS THERE A WAY TO EXTRACT DATA RECOVERY FROM EMMC SHIP THAT IS ENCRYPTED ??? AND WHICH TOOL CAN BE USED IN ORDER TO DECRYPTE IT
@UltirianHeavyIndustry
@UltirianHeavyIndustry 3 ай бұрын
15:19
@Unknown2023_1
@Unknown2023_1 3 ай бұрын
One day a problem will arise for you and you will need help and then you will see justice
@mattbrwn
@mattbrwn 3 ай бұрын
😂😂😂
@Unknown2023_1
@Unknown2023_1 3 ай бұрын
@@mattbrwn 👎
@Unknown2023_1
@Unknown2023_1 3 ай бұрын
I am so sorry for you rude person
@xenoxaos1
@xenoxaos1 3 ай бұрын
$(file - so /dev/sdx1)
Hacking The Mojo C-75 - Root Shell via Firmware Modification
32:43
Não sabe esconder Comida
00:20
DUDU e CAROL
Рет қаралды 63 МЛН
бабл ти гель для душа // Eva mash
01:00
EVA mash
Рет қаралды 7 МЛН
Colorful Pasta Painting for Fun Times! 🍝 🎨
00:29
La La Learn
Рет қаралды 308 МЛН
This dad wins Halloween! 🎃💀
01:00
Justin Flom
Рет қаралды 58 МЛН
tippin' the iceberg but oscilloscope
1:51
The other blackops yoshi
Рет қаралды 9
4G GPS Tracker Reverse Engineering - GPS Digital Signal Decoding
20:04
Open Source Flash Programmer Software - minipro FTW
20:18
Matt Brown
Рет қаралды 10 М.
Accessing U-Boot through UART KS0 ultra
7:49
Crypto440
Рет қаралды 2,7 М.
Using Linux to Intercept IoT Device Traffic
23:46
Matt Brown
Рет қаралды 14 М.
4G GPS Tracker Reverse Engineering - Cell Modem Interactions
16:50
Hacking a Knockoff Google Chromecast - Firmware Extraction
25:04
Matt Brown
Рет қаралды 106 М.
Hacking The Mojo C-75 - Chip-Off Firmware Extraction
40:11
Matt Brown
Рет қаралды 31 М.
CLONING AND REPLACING THE EMMC CHIP USING THE UFI BOX
14:02
4G GPS Tracker Reverse Engineering - Hardware Analysis
18:39
Matt Brown
Рет қаралды 17 М.
Não sabe esconder Comida
00:20
DUDU e CAROL
Рет қаралды 63 МЛН