I'M BACK: Firmware Extraction Tips and Tricks

preview_player
Показать описание
I'm back!

Can't wait to make some more awesome hardware hacking videos! In this one I share some tips and tricks from a recent device I was looking at and how I fixed some of my stupid mistakes.

UART adapter datasheet:

IoT Hackers Hangout Community Discord Invite:

🛠️ Stuff I Use 🛠️

🪛 Tools:

🫠 Soldering & Hot Air Rework Tools:

🔬 Microscope Setup:

About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.

- Soli Deo Gloria

💻 Social:

#iot #hacking #wifi #reverseengineering #firmware
Рекомендации по теме
Комментарии
Автор

Congrats my dude, always nice to see your content!

Vidread
Автор

welcome back Matt, nice new space and loved the hack! Crazy about the firmware being overwritten but nice you got the dump first.

mytechnotalent
Автор

I like the video formats where you show the struggles you encounter.

bertblankenstein
Автор

Thanks for your efforts Matt! Your chip extraction of the echo device has helped me hack an unnamed device's emmc and find user names, emails, and photos. I was really only interested in getting at its operating system but found it kept user data unencrypted. Would also love to see a video where you hacked and read the emmc of a device noninvasively by finding the "hidden" pins on the board itself, ie CLK, CMD, Data, etc. Even if it was an already reported device it would be very educational to see how you do that. I tried to figure that out on my device with an oscillascope and even trace the pins to other pads on the board once i removed the emmc, but only managed to find 3. I know there is an article on how to do it with the OG tall echo device but seems to leave out some critical steps (for my level of experience) as I was reviewing it.

matthew-lawrence
Автор

glad to see you back! you should consider making a discord in the future, love your content!

christianziobro
Автор

❤ I am happy to have you back as a follower from Saudi Arabia

raynrayn.
Автор

Have you explored any glitch type attacks yet, Matt? Be good to see some content on that if you have. keep up the good work and thanks for your content!

sanuk
Автор

Hey mate im glad i found your channel! I have a question, I can get into my ROUTER's SHELL directly through telnet but i dont get the "root" access cuz i wanna make some changes.. so what do you recommended what should i do about it ? Thanks!

HawKx
Автор

Failures are just as important to show as success. Especially if you can walk through you thought process of turning a L into a W!

dmaynor
Автор

wrt the uboot thing, I believe `printenv` will sometimes show you how those commands are defined; that may help with avoiding that `test`function did

OfficialProjectSMP
Автор

Hello Matt i have one Questions hows install xgpro in Linux?

georgemariona
Автор

I need the contents of a motor controller chip read and I'm willing to pay. Can anyone help me?

LazloNQ
Автор

Recommend me a course I really want to learn

marcosethais
Автор

Can you help me with a Huawei modem to extract firmware friend?

CarlosLopez-wscq
welcome to shbcf.ru