UFS/eMMC Firmware Extraction - UFI Box

Поділитися
Вставка
  • Опубліковано 24 гру 2024

КОМЕНТАРІ • 68

  • @Micron88
    @Micron88 5 місяців тому +11

    I am really glad i encountered your channel.
    Love your content and learned a lot. Your videos have exactly the right pace.
    Just wanna say thanks!
    Please keep it up.

  • @smokeweedeveryday9099
    @smokeweedeveryday9099 5 місяців тому +35

    Sounds like you need to spend a little time in Ghidra with their software. You could bypass the virtual system detect.

    • @Jeff-ss6qt
      @Jeff-ss6qt 5 місяців тому +1

      After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down.
      You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart.
      If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.

    • @smokeweedeveryday9099
      @smokeweedeveryday9099 5 місяців тому +12

      @@Jeff-ss6qt I would just do it. I wouldn’t show anybody what I did. If I use a tool that doesn’t work, I modify the tool.

  • @worroSfOretsevraH
    @worroSfOretsevraH 5 місяців тому +7

    I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing.
    (I'm a hw guy)
    Thanks.

  • @rbmwiv
    @rbmwiv 5 місяців тому +2

    Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.

  • @justbendev2324
    @justbendev2324 5 місяців тому +34

    I will never buy a black box with proprietary software that only runs on Windows.

    • @derrekvanee4567
      @derrekvanee4567 5 місяців тому +3

      Yes. Xi Xing Ping Ponf special. Aur packages for everything though or just bit bang what protocol they're using and dump.

    • @justbendev2324
      @justbendev2324 5 місяців тому +6

      @@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.

    • @Electrically-Electronic
      @Electrically-Electronic 5 місяців тому +4

      Yeah me too only FOSS on linux

    • @sertralina100mg
      @sertralina100mg 5 місяців тому +2

      @@Electrically-Electronic i dont understand tech guys who do hardware hacking that use and develop tools for windows. Linux is so much better

    • @DaleDix
      @DaleDix 5 місяців тому

      Okely dokely

  • @mpicuser
    @mpicuser 5 місяців тому +2

    Hello Matt, always a pleasure watching your videos. Thank you!

  • @philipp__3671
    @philipp__3671 5 місяців тому +4

    The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff.
    Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware

    • @Eye-Linux
      @Eye-Linux 5 місяців тому

      I also wanted to mention Eric cause he has done a great job explaining how to make a stealthy vm

    • @coolm98
      @coolm98 4 місяці тому

      You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@Eye-Linux

    • @joelg6740
      @joelg6740 4 місяці тому

      Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol

  • @6LordMortus9
    @6LordMortus9 5 місяців тому

    A fun idea. you should get the firmware to your firmware reader box :)

  • @sabkaBaap007
    @sabkaBaap007 2 місяці тому +1

    Bro I have a screen dead google pixel 4a device. Everything is working behind the scenes but the display is dead and the repair cost of the display is too much but without display I cannot retrieve my data. So, can I extract the UFS chip out of the motherboard and then use this same method to extract my data?

  • @_trbr
    @_trbr 5 місяців тому +1

    Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log

  • @yusuf9356
    @yusuf9356 5 місяців тому +6

    I need chromecast part2 video

  • @LostDeadSoul
    @LostDeadSoul 5 місяців тому +1

    @Matt Brown Do you do FPGA stuff too?
    Just thinking that bit banging with an ASIC, one could be able to interface anything ;)

  • @wasabinow
    @wasabinow 5 місяців тому

    Matt, thank you! Appreciate your interesting topics.

  • @0xssff
    @0xssff 4 місяці тому

    bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.

  • @Segphalt
    @Segphalt 5 місяців тому +3

    The what I assume is a USB A to USB A cable bothers me greatly.

    • @mattbrwn
      @mattbrwn  5 місяців тому +3

      Yeah you assumed correctly 😜

  • @charleshines5700
    @charleshines5700 5 місяців тому +1

    I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.

    • @mattbrwn
      @mattbrwn  5 місяців тому +1

      Yeah I could see UFS cards replacing SD cards for digital cameras

    • @charleshines5700
      @charleshines5700 5 місяців тому +1

      @@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.

  • @phuo2185
    @phuo2185 5 місяців тому

    can you pls make a video on how to get shell of synology TC500

  • @tweebs1
    @tweebs1 5 місяців тому +1

    Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.

  • @mohammedalghfeli4190
    @mohammedalghfeli4190 5 місяців тому

    Thaaaaank uuuuu Matt you are awesome for anyone want to get into hardware hacking

  • @Unknown2023_1
    @Unknown2023_1 4 місяці тому

    I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?

  • @XYZ56771
    @XYZ56771 5 місяців тому

    Keep it up, its highly interesting!

  • @lilmancc35
    @lilmancc35 5 місяців тому +1

    Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.

    • @mattbrwn
      @mattbrwn  5 місяців тому +2

      My channel is a mix of old school hardware hacking and more security-focused reverse engineering. I see the word "Hacking" as a big tent.

    • @lilmancc35
      @lilmancc35 5 місяців тому +1

      @@mattbrwn ok. I wasnt sure what your content was about but i watched the arlo video first, so it makes sense.

  • @RetroDelete
    @RetroDelete 5 місяців тому +1

    Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D .
    I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(

    • @mattbrwn
      @mattbrwn  5 місяців тому

      Lol crap

    • @mattbrwn
      @mattbrwn  5 місяців тому

      Thanks for pointing it out. Fixed now

  • @SkippyDa
    @SkippyDa 5 місяців тому

    Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)

    • @mattbrwn
      @mattbrwn  5 місяців тому

      That's a very interesting chip and I don't think I know of anything off the top of my head to read it

    • @SkippyDa
      @SkippyDa 5 місяців тому

      @@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.

  • @Jennn
    @Jennn 5 місяців тому

    Thank you, Matt!!

  • @xephael3485
    @xephael3485 4 місяці тому

    Have you found a better option?

    • @mattbrwn
      @mattbrwn  4 місяці тому

      Nope, not for UFS.

    • @xephael3485
      @xephael3485 4 місяці тому

      @@mattbrwn Aliexpress has some ICfriend or EasyUFS products... did you try any of those?

  • @SB-qm5wg
    @SB-qm5wg 5 місяців тому

    Strange you can't use this app in a VM

  • @ReggeditCh04
    @ReggeditCh04 5 місяців тому

    Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand.
    Yeah, and the Emmc socket is a crap. Read and write took forever

  • @namesurname201
    @namesurname201 5 місяців тому

    Thanks ❤

  • @Nebbia_affaraccimiei
    @Nebbia_affaraccimiei 5 місяців тому +1

    3:40 yeah of course is just a way to verify you didn't crack the software. it doesn't functionally do anything when u use the UFS device

  • @lmaoroflcopter
    @lmaoroflcopter 5 місяців тому

    It is at this point... you reverse the damn thing to crack it.

  • @UltirianHeavyIndustry
    @UltirianHeavyIndustry 5 місяців тому

    15:19

  • @sososisi8790
    @sososisi8790 4 місяці тому

    OK IS THERE A WAY TO EXTRACT DATA RECOVERY FROM EMMC SHIP THAT IS ENCRYPTED ??? AND WHICH TOOL CAN BE USED IN ORDER TO DECRYPTE IT

  • @UndernetSystems
    @UndernetSystems 5 місяців тому +1

    Very interesting device but also why would they make these tools so annoying

  • @kaydog890
    @kaydog890 5 місяців тому +1

    Who owns it? You paid for it

  • @cimogt7857
    @cimogt7857 4 місяці тому

    Ufi box is slow device, you can fin better on the market: easyjtag + plus with adapter, mipi tester,
    Medus 2 pro
    Or u15 reader from jcid,

  • @roberthealey7238
    @roberthealey7238 3 місяці тому

    Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?…
    Seems risky to be using proprietary hardware with proprietary crap software…

  • @Unknown2023_1
    @Unknown2023_1 4 місяці тому

    One day a problem will arise for you and you will need help and then you will see justice

  • @xenoxaos1
    @xenoxaos1 5 місяців тому

    $(file - so /dev/sdx1)

  • @Unknown2023_1
    @Unknown2023_1 4 місяці тому

    I am so sorry for you rude person