After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down. You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart. If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.
I am really glad i encountered your channel. Love your content and learned a lot. Your videos have exactly the right pace. Just wanna say thanks! Please keep it up.
I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing. (I'm a hw guy) Thanks.
Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.
Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log
Bro I have a screen dead google pixel 4a device. Everything is working behind the scenes but the display is dead and the repair cost of the display is too much but without display I cannot retrieve my data. So, can I extract the UFS chip out of the motherboard and then use this same method to extract my data?
@@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.
The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff. Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware
You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@MohmdSy5
Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol
bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.
Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D . I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(
Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.
I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?
I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.
@@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.
Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.
Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)
@@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.
Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand. Yeah, and the Emmc socket is a crap. Read and write took forever
Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?… Seems risky to be using proprietary hardware with proprietary crap software…
Sounds like you need to spend a little time in Ghidra with their software. You could bypass the virtual system detect.
After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down.
You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart.
If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.
@@Jeff-ss6qt I would just do it. I wouldn’t show anybody what I did. If I use a tool that doesn’t work, I modify the tool.
I am really glad i encountered your channel.
Love your content and learned a lot. Your videos have exactly the right pace.
Just wanna say thanks!
Please keep it up.
I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing.
(I'm a hw guy)
Thanks.
Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.
Hello Matt, always a pleasure watching your videos. Thank you!
Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log
A fun idea. you should get the firmware to your firmware reader box :)
Bro I have a screen dead google pixel 4a device. Everything is working behind the scenes but the display is dead and the repair cost of the display is too much but without display I cannot retrieve my data. So, can I extract the UFS chip out of the motherboard and then use this same method to extract my data?
I will never buy a black box with proprietary software that only runs on Windows.
Yes. Xi Xing Ping Ponf special. Aur packages for everything though or just bit bang what protocol they're using and dump.
@@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.
Yeah me too only FOSS on linux
@@Electrically-Electronic i dont understand tech guys who do hardware hacking that use and develop tools for windows. Linux is so much better
Okely dokely
The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff.
Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware
I also wanted to mention Eric cause he has done a great job explaining how to make a stealthy vm
You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@MohmdSy5
Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol
@Matt Brown Do you do FPGA stuff too?
Just thinking that bit banging with an ASIC, one could be able to interface anything ;)
I need chromecast part2 video
Matt, thank you! Appreciate your interesting topics.
bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.
The what I assume is a USB A to USB A cable bothers me greatly.
Yeah you assumed correctly 😜
Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D .
I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(
Lol crap
Thanks for pointing it out. Fixed now
can you pls make a video on how to get shell of synology TC500
Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.
My channel is a mix of old school hardware hacking and more security-focused reverse engineering. I see the word "Hacking" as a big tent.
@@mattbrwn ok. I wasnt sure what your content was about but i watched the arlo video first, so it makes sense.
Thaaaaank uuuuu Matt you are awesome for anyone want to get into hardware hacking
Keep it up, its highly interesting!
I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?
I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.
Yeah I could see UFS cards replacing SD cards for digital cameras
@@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.
Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.
Thank you, Matt!!
Thanks ❤
Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)
That's a very interesting chip and I don't think I know of anything off the top of my head to read it
@@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.
Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand.
Yeah, and the Emmc socket is a crap. Read and write took forever
Have you found a better option?
Nope, not for UFS.
@@mattbrwn Aliexpress has some ICfriend or EasyUFS products... did you try any of those?
Very interesting device but also why would they make these tools so annoying
Strange you can't use this app in a VM
It is at this point... you reverse the damn thing to crack it.
Ufi box is slow device, you can fin better on the market: easyjtag + plus with adapter, mipi tester,
Medus 2 pro
Or u15 reader from jcid,
3:40 yeah of course is just a way to verify you didn't crack the software. it doesn't functionally do anything when u use the UFS device
Who owns it? You paid for it
OK IS THERE A WAY TO EXTRACT DATA RECOVERY FROM EMMC SHIP THAT IS ENCRYPTED ??? AND WHICH TOOL CAN BE USED IN ORDER TO DECRYPTE IT
Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?…
Seems risky to be using proprietary hardware with proprietary crap software…
15:19
$(file - so /dev/sdx1)
I am so sorry for you rude person
One day a problem will arise for you and you will need help and then you will see justice
😂😂😂
@@mattbrwn 👎