Extracting and Modifying Firmware with JTAG

Поділитися
Вставка
  • Опубліковано 11 січ 2025

КОМЕНТАРІ • 52

  • @toadtws
    @toadtws Рік тому +15

    Great video! Minor vim note: at @17:30, you can use capital R to enter Replace mode. That way you won't have to count anything. Just make sure you only modify ASCII characters.

  • @PeterBagel-ti5xw
    @PeterBagel-ti5xw 7 місяців тому +7

    Oh my god, just found this channel and it's an absolute goldmine :-) thanks for all the awesome content!

  • @slincolne
    @slincolne 5 місяців тому +8

    Minor correction to the video - video title states using JTAG to extract firmware, while Matt used SWD instead. JTAG is an industry standard interface, while SWD is more vender specific. Apart from showing the JTAGulator Matt does not actually use it :-(

    • @m0rjjj666
      @m0rjjj666 4 місяці тому

      You can extract it with JTAG, Matt mentioned that, he just used SWT option

    • @jawaljawad4855
      @jawaljawad4855 Місяць тому

      I see you vidéo is good thinks . I work in mcu mec1723 but in j link i cant found this serial i found mec170x how i can add mec1723 if not . I ts possible to connecte mec1723 with config of mec170x . Thinks

  • @jc4190
    @jc4190 2 роки тому +4

    Awesome video!! Could you do something with STM chips that are locked sometime soon? My vaguest of vague understanding is that you can sometimes do something with pulling boot select pins low to get it into a debug mode regardless of other configurations, but I don't have the first clue how to actually do that irl. Keep up the great videos m8!

  • @Patrick-ky7ez
    @Patrick-ky7ez Рік тому +2

    Your channel is incredible!

  • @sammay1540
    @sammay1540 Рік тому +2

    I recently came across your channel and I love your videos. If you ever have a project where you gain practical functionality of a device by hacking it, that would make a great video. Like the security camera sending the stream to a self hosted storage server or other ideas you may have.

  • @goutham24693
    @goutham24693 2 роки тому +4

    Hi Matt, very Informative video. Is there any way to convert the binary dump to source code or to understand it better ?

  • @OMNI_INFINITY
    @OMNI_INFINITY Рік тому +1

    Where is a repository link to PCB files of that badge? Looks like a nice little capacitive keyboard.

  • @colingill9317
    @colingill9317 Місяць тому

    Hi there,
    Could you help me out. I need to download the firmware from a working C49 controller on a miner, and upload it into a controller I played around with and erased the whole nand from the terminal.
    Any ideas? I have a JTAG DLC 10 programmer, for Xilinx chips.
    Many thanks.

  • @woolfy02
    @woolfy02 Рік тому

    I just got a bus pirate 3.6a and, I'm wanting to connect to a device using JTAG. The available pins on it are:
    TDO,TDI,TMS,TCK,GND,RESET
    Do I just connect it the same named pin, as from the bus pirate to the device? (Like TDO - TDO, TDI - TDI...etc etc for all of them). Years ago, I used uart but, I'm not seeing those connections on the board I'm trying to mess around with. I just can't seem to find a guide / tutorial that explains how to set it up for newbs.

  • @PoorRichard-o1u
    @PoorRichard-o1u 10 днів тому

    I would like to see the use of some software that can de-compile a firmware file.

  • @rajivsingh6633
    @rajivsingh6633 Рік тому

    Dear sir I have a problem that the mcu has tooll0 pin reset pin vcc and ground .
    How I can extract firmware from the mcu

  • @ggNotSuree
    @ggNotSuree 7 місяців тому

    Trying to learn all of this and very overwhelmed. Are you able to access the jtag state machine this way? And command the actual registers? I’m reading how to do that, but nobody ever explains how they gain access to do that… and what they are typing the commands on/through…. Sorry if this is a stupid question

  • @shahzadasalim5032
    @shahzadasalim5032 Місяць тому

    sir, can you help to find jtag pinout of NVME, please

  • @michaelmclardy9165
    @michaelmclardy9165 9 місяців тому

    Can you do the Huawei H112-372? how to get UART and JTAG.

  • @RussellSenior
    @RussellSenior Рік тому +3

    Why not just hook up to the SPI NOR flash and dump that way? flashrom, ftw.

    • @mattbrwn
      @mattbrwn  Рік тому +1

      This video was specially to demo JTAG

  • @daixtr
    @daixtr 6 місяців тому

    Hi Matt. What would be your recommended JTAG model brand?

  • @JamesColeman
    @JamesColeman 7 місяців тому

    I am all for IOT companies not disabling JTAG. Just keep them away from evil maids, and you're all good.

  • @robertbauer6723
    @robertbauer6723 2 роки тому +2

    Very informative, great info! Thank you for making this. BTW your audio is really low.

    • @mattbrwn
      @mattbrwn  2 роки тому +1

      Thanks! Trying to find the sweet spot with the audio

  • @Finrow1
    @Finrow1 2 роки тому +1

    How did you know to use the SI form of Mbit and not the binary form of Mbit?

    • @mattbrwn
      @mattbrwn  2 роки тому

      Honestly I guessed 😅

  • @abdennour183
    @abdennour183 8 місяців тому

    Does the J-link support Atmega32u4 ?

  • @paololuise6514
    @paololuise6514 Рік тому +2

    What is the debugger model you are using?

    • @mattbrwn
      @mattbrwn  Рік тому

      xgecu tl866ii plus
      Also have the newer xgecu t48

  • @mattp4953
    @mattp4953 2 роки тому +1

    So cool! What are you going to push to it next, if anything?

    • @mattbrwn
      @mattbrwn  2 роки тому +3

      might require some big time reverse engineering :D I wonder if they released the source code to the badge......

    • @mattp4953
      @mattp4953 2 роки тому

      @@mattbrwn another question: can it run doom (just thought of this)

    • @mattp4953
      @mattp4953 2 роки тому

      @@mattbrwn have you thrown it into Ghidra yet? Assuming it’s an ELF, Is the binary stripped?

  • @alanwake5927
    @alanwake5927 Рік тому

    Where I could buy the student version of the j link

  • @a-listercrowley2737
    @a-listercrowley2737 Рік тому +1

    Man I keep seeing JTAG written on different boards
    I'm still a rookie, got a long waaay to go

  • @sercanalnca1962
    @sercanalnca1962 2 місяці тому

    Can we do it on Windows or we have to use Linux?

  • @jesussaeta8383
    @jesussaeta8383 Рік тому

    Yes the volume is very low on your end,

  • @turanamo
    @turanamo Рік тому +1

    You could have added the part where you locate the h/w key to crack it 😛

  • @MiroslavObrtel
    @MiroslavObrtel Рік тому

    And that was preety amazing

  • @baghdadiabdellatif1581
    @baghdadiabdellatif1581 Рік тому

    Great work 👌👏

  • @PapaGeegee
    @PapaGeegee Рік тому

    Do u have epon firmware for Zte

  • @zombielupin
    @zombielupin Рік тому

    what microscope do you use for videos?

  • @welltonmanopelli3224
    @welltonmanopelli3224 Рік тому

    Very nice

  • @XenoTravis
    @XenoTravis Рік тому

    I dislike that connector style so much. The cable is expensive and the pins will bend easily.

  • @throwaway1076
    @throwaway1076 Рік тому +3

    16 megabits is 2 megabytes, which is 0x200000... Converting 20000000 decimal to hex is not 2 megabytes.

  • @BobCat0
    @BobCat0 2 роки тому +4

    Your video is flipped.

    • @mattbrwn
      @mattbrwn  2 роки тому +4

      lol good catch. I thought I fixed that... I'm kinda new to OBS

  • @JenniferBrown-n3r
    @JenniferBrown-n3r 3 місяці тому

    White Donna Martinez Brenda Lee Scott

  • @bubbasplants189
    @bubbasplants189 8 місяців тому

    Now to find an old xbox 🤣

  • @levonrockerz4299
    @levonrockerz4299 Рік тому

    The last command is not supported by jlink commander v7.88j, start here^[nmatt@ripper badge]$, ..savebin is only working , I am trying to extract stm32f103r8,,

  • @teltechservices7978
    @teltechservices7978 Рік тому +1

    amazing man, thank you for the cool stuff , hacked by nmat😊

  • @manueluninteressant9917
    @manueluninteressant9917 2 місяці тому

    Hi matt, do you can read this ic for me?
    Mb9af004bgl-g-103-ere1
    Mb9af004bgl-g-103-k1ere1