Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader

Поділитися
Вставка
  • Опубліковано 7 жов 2024

КОМЕНТАРІ • 147

  • @ThanassisTsiodras
    @ThanassisTsiodras 4 роки тому +213

    The signal-to-noise ratio of your channel is off the charts! Congrats - keep it up.

  • @teslatrooper
    @teslatrooper 4 роки тому +95

    As a mostly embedded programmer this is great, much easier to follow when there's no complicated OS to worry about.

    • @asafcohen3562
      @asafcohen3562 4 роки тому +15

      also an embedded programmer here just wanted to say c is unreplaceable

    • @BRUHItsABunny
      @BRUHItsABunny 4 роки тому +2

      @@asafcohen3562 i have no idea and 0 experience in C nor embedded programming however I am interested as to why C is irreplaceable when it comes to embedded programming

    • @AA-gl1dr
      @AA-gl1dr 4 роки тому +1

      As a beginner in coding this really helps me understand what I’m learning so much better.

    • @asafcohen3562
      @asafcohen3562 4 роки тому +1

      @@BRUHItsABunny c is basically the only option if you want to do effective embedded programming

    • @AdriGDev
      @AdriGDev 4 роки тому +8

      @@asafcohen3562 Id say rust is another great rising option too right now.

  • @mathiasensimon
    @mathiasensimon 2 роки тому +11

    I've legit been looking for so long for content creators who just explain such things in detail without all the bs

    • @stacksmashing
      @stacksmashing  2 роки тому +1

      Thanks :)

    • @mathiasensimon
      @mathiasensimon 2 роки тому +1

      @@stacksmashing though it did take off very fast at the middle ahaha

  • @seamasclerkin5301
    @seamasclerkin5301 4 роки тому +41

    Great video! Would love to see some more embedded FW reverse engineering like this :D

  • @asafcohen3562
    @asafcohen3562 4 роки тому +19

    great editing its cool that you dont pass on the technical aspects and not just the theoretical concepts

  • @caralynx
    @caralynx 3 роки тому +9

    One thing I'd suggest with regards to memory mapping is to clear the write flag in the flash regions. That way Ghidra automatically dereferences constants and show strings as quoted strings rather than a pointer to a string. Do keep in mind it also removes what it considers to be extraneous reads and writes and unreachable code based on constants, so if there's some configurable options in the firmware, it may remove code from the decompilation for other options that it sees as unreachable.

  • @TomStorey96
    @TomStorey96 3 роки тому +4

    Would just like to say, your videos inspired me to have a go at reverse engineering something, so I grabbed a Cisco 2501 router off ebay (because its got a Motorola 68030 in it), and used Ghidra to explore the boot ROMs (was amazed that it supported the m68k architecture!), figured out the memory map, and managed to get FreeRTOS running on it after creating a m68k port for it. :-)
    Love your channel!

    • @stacksmashing
      @stacksmashing  3 роки тому +2

      That’s awesome to hear! And sounds like a super interesting project - you should do a write up! :)

    • @TomStorey96
      @TomStorey96 3 роки тому +1

      ​@@stacksmashing Ive put notes of what I have found so far up on github, including my FreeRTOS port. I dont know if I can post links here (sometimes works, sometimes doesnt), but you can find it by searching users for my name as one word (the one that doesnt end in sn).
      Theres more I would like to find out about it, including a couple more registers within two proprietary chips, but its a monumental task!

  • @matisec3413
    @matisec3413 3 роки тому +6

    Now I ask myself why I didn't know this channel before. Great work!

  • @rakeshchowdhury202
    @rakeshchowdhury202 4 роки тому +13

    IOT reversing from Ghidra Ninja? I absolutely love it!! 😍

  • @TheBrick2
    @TheBrick2 4 роки тому +3

    Excellent thanks for writing the SVD loader script. This video popped into my feed and ironically I am just waiting on some details of cortex M3 project which may require some reversing (although hopefully not from a work POV).

  • @purduephotog
    @purduephotog 4 роки тому +4

    I am really impressed and grateful. This was the most useful jump start I've gotten.

  • @AlmightyGauss
    @AlmightyGauss 4 роки тому +2

    Excellent upload timing, my STM32 blue pill arrived but a couple days ago. Keep up the good work!

  • @viteosen
    @viteosen Рік тому

    it's 2023 and again im coming back to this video! epic!
    some advice for memory map:
    Set 'flash' and 'flash_mirror' sections as non-writable (only read 'R' and executable 'X'). This may fix a lot of decompiler wierdness.

  • @isso013
    @isso013 3 роки тому +5

    I swear. You give better lectures than all my CA teachers together!

  • @Troxilitis
    @Troxilitis 4 роки тому +8

    I don't have this device nor do RE for a living. But damn this is getting me close to trying this out. Always found integrated boards and chipsets fascinating

    • @dieSpinnt
      @dieSpinnt 4 роки тому

      16 Bucks, Amazon or else where. Search for "NUCLEO stm32f446re". Use Ghidra Ninja's links in the description to ST-Microelectronics to get an overview for this bugger or discover many more different types. These are great to begin with. What are you waiting for? :))

  • @Aveneid
    @Aveneid 4 роки тому +2

    I just started to reverse some code for STM32F2 and you just make my life easier, ty

  • @dexterdormain8062
    @dexterdormain8062 3 роки тому

    Very good information. This is the exact microcontroller we used in our embedded systems courses in university!

  • @turbotoblast4
    @turbotoblast4 4 роки тому

    Thank you sir. As a beginner in reverse engineering that's starting with a bare metal firmware, this video is very helpful. Please do more

  • @scottwilliams895
    @scottwilliams895 2 роки тому

    Outstanding! Thanks for continuing to share your dedicated work

  • @kneesnap1041
    @kneesnap1041 4 роки тому +1

    Nice explanation, I'm surprised at how fast you were able to go through that in Ghidra, it still takes me quite a while to create names and clean up decompiled output. Seems like a good goal.

  • @racim.boussa
    @racim.boussa 4 роки тому +1

    Thank you mate your videos are the greatest in this field.

  • @CBaggers
    @CBaggers 3 роки тому

    These videos are an absolute goldmine. Incredible work

  • @lorenzocuttitta9474
    @lorenzocuttitta9474 Рік тому

    Bless the day i discovered this channel

  • @sweetlilmre
    @sweetlilmre 3 роки тому

    Please do more of this, it's fantastic!

  • @bagusprabangkoro4334
    @bagusprabangkoro4334 3 роки тому +1

    Omg this video brings up memories, I used ARM to build a robot. And oh boy, it's mind consuming to read the datasheet -.-

  • @andreavergani7414
    @andreavergani7414 3 роки тому

    Great Channel man. You explain so well.
    Good Job.

  • @rashidz97100
    @rashidz97100 3 роки тому

    I watched a video and subscribed right away! Amazing content 😊

  • @rondlh20
    @rondlh20 3 роки тому

    Very impressive and educational, thanks!

  • @erenoz2910
    @erenoz2910 11 місяців тому

    Reverse engineering bare-metal code sounds difficult, but it's actually easier since you can find pretty much every address and function you need in the datasheet for the processor!

  • @dieSpinnt
    @dieSpinnt 4 роки тому +1

    Nice Video, thanks:)
    Be careful with the 5V. Not all pins are tolerant. See "FT" specification in data-sheet, Table 9 for this MCU (Depends on the series). To avoid this: There is 3.3V right next to the 5V supply pin on the NUCLEO. Up to 112 5 V-tolerant I/Os on max 114 I/O for the LQFP144 part. So the chances are good to not release the magic smoke:)
    Yours is a LQFP64, so better look that up folks. At all, don't rely on chance. It's a 3.3V part and best practice is to treat it like one. While experimenting, only use the 5V-tolerance functionality if absolutely necessary. This protects against nasty surprises

    • @stacksmashing
      @stacksmashing  4 роки тому

      If you watch closely you'll see that I used the pin NEXT to the 5V pin, which is 3.3V 😉

    • @dieSpinnt
      @dieSpinnt 4 роки тому

      @@stacksmashing Good boy;)

  • @pizzaenj0yer100
    @pizzaenj0yer100 4 роки тому +1

    This is the best tutorial of reverse engineering embedded systems with ghidra I've seen so far. Some days ago I wanted to RE an STM board but didn't know how to proceed. Could you please do something like this with the nRF51 or nRF52 processors?

    • @Kotesu
      @Kotesu 3 роки тому

      Unfortunately, most Nordic nRF-series micros are built on top of their Softdevice middleware, which, while technically not an OS, is pretty close to being one. It's also notoriously bad and can obfuscate alot of behaviours. The whole experience can be summarized as one colleague put it: "you don't own the chip, you rent it". I think it would be a huge challenge to reverse-engineer. I've done 15 years of bare metal development and that chip was one of the biggest pain-in-the-ass I ever experienced.

    • @pizzaenj0yer100
      @pizzaenj0yer100 3 роки тому

      @@Kotesu Yeah I somewhat got it to work and managed to seperate the parts of the firmware (softdevice, app, etc.), but ghidra still has some control flow detection issues on arm, which makes everything complicated. It really is a PITA

  • @ifohancroft
    @ifohancroft 3 роки тому +2

    I'm sorry but how did you figure out the SRAM lenght to that you put in the memory map? The SRAM blocks on the MCU I'm trying go from 0x20000000 to 0x40000000, also at the start of the Memory section in the datasheet says the chip has 256 kB RAM, so do I just put 0x40000 or could that be a different length since there are separate RAM and SRAM blocks and I see you are putting the SRAM's starting address

  • @kai990
    @kai990 2 роки тому

    The fact that STM calls their mode register MODER in their docs which loosely translates to mold in german, always cracks me up.

  • @munwwarhussainshelia
    @munwwarhussainshelia 4 роки тому +1

    Great thanks for creating the video

  • @MalekLamari
    @MalekLamari 4 роки тому +1

    Great video, keep them coming, thnx!

  • @mrfincher
    @mrfincher 4 роки тому +1

    interesting topic and really well made video!

  • @MikeJans
    @MikeJans 3 роки тому

    This is an absolute amazing video!!!!

  • @xxMrPHDxx
    @xxMrPHDxx 4 роки тому +1

    I can't wait for next wannacry inverse engineering

  • @TheDankTiel
    @TheDankTiel 4 роки тому +4

    Im subscribed to this channel cz the dragon looks cool

  • @jacopobracaloni3121
    @jacopobracaloni3121 8 місяців тому

    Thank you for sharing this❤

  • @damny0utoobe
    @damny0utoobe 4 місяці тому

    Excellent tutorial

  • @robinbuster1323
    @robinbuster1323 4 роки тому +1

    Top quality explanation and skills

  • @nrdesign1991
    @nrdesign1991 3 роки тому +1

    Coming from the Bare-Metal world, I often wonder how OSes actually do their thing on microcontrollers, and how to develop for them.

  • @Paavo1991
    @Paavo1991 2 роки тому

    omg man.. please do tutorial series and teach us how to use Ghidra :)

  • @kaionayon8678
    @kaionayon8678 4 роки тому

    Please keep sharing RE videos
    Ill be back for this stuff..

  • @saberlaadhari8765
    @saberlaadhari8765 4 роки тому

    top quality. i was wondering about custom ARM ASIC without datasheet. how to guess base adress ? Now days they are everywhere they enable to reduce PCB size & cost & make reverse-engenring harder. ARM ASIC includes custom IP modules inside the SOC.

  • @ciaobello1261
    @ciaobello1261 4 роки тому +2

    super video.. danke dir

  • @vevasam
    @vevasam 2 роки тому

    Thank you for this very informative video. Would it also be possible with Ghidra to sniff out the binary that has already been loaded into the flash? We only know the MCU part number and are hooked into the JTAG/SWD port and nothing else. If you get time could you also please make a video on it. Thank you.

  • @guilhemrioux2275
    @guilhemrioux2275 3 роки тому

    Hi thanks for this awesome video, do you know any other device on which we can improve our knowledges, like a device where you need to extract the firmware with jtag ?
    Really enjoy your videos :D

  • @elaydahan8872
    @elaydahan8872 4 роки тому +1

    Quality content, as always.

  • @fathnakbar
    @fathnakbar 4 роки тому

    Love this explanation vid!

  • @RixtronixLAB
    @RixtronixLAB 3 роки тому

    Nice info, thanks :)

  • @MATx48
    @MATx48 4 роки тому +1

    Thank you :)

  • @womacko
    @womacko Рік тому

    Hey, in 5:22 you mentioned a video about determining whether an binary image is big/little endian... Can you link it? Couldn't find it on your channel..

  • @twobob
    @twobob 3 роки тому

    nice. good talk.

  • @preethikarunakaran9795
    @preethikarunakaran9795 7 місяців тому +1

    The flash memory region is " 0x08000000 - 0x081FFFFF". The length of flash while loading the binary is specified as "0x2e0". Can you specify how the length is calculated?

    • @stacksmashing
      @stacksmashing  7 місяців тому

      The loaded binary is that small, as it's just the compiled object, not the entire flash-region.

  • @nomen_omen
    @nomen_omen 4 роки тому +1

    GREAT JOB!!!

  • @JunaidSaeedUppal
    @JunaidSaeedUppal 4 роки тому +1

    thank you!

  • @polyhydrolide
    @polyhydrolide 3 роки тому

    Thanks for the video! Curious, but how did you get the baremetal firmware (example.bin)?

  • @ECX0x100h
    @ECX0x100h 2 роки тому

    Much more comfortable watching this at 0.75 speed lol

  • @wg724
    @wg724 3 роки тому

    as a beginner in RE, where should I start if I want to learn? I have a cyber security background, just not an RE background

  • @OE8ZZZ
    @OE8ZZZ Рік тому

    Good video! Is there a way to identify the microcontroller without opening a device? I have a device with an ARM v7 but I would like to know the exact version

    • @stacksmashing
      @stacksmashing  Рік тому +1

      I actually wrote a script to identify microcontrollers: github.com/nezza/chipfinder :)

    • @OE8ZZZ
      @OE8ZZZ Рік тому

      @@stacksmashing I get three errors when running it against my .bin file: line 87, in
      for line in f.readlines(): second error: line 23, in decode
      return codecs.charmap_decode(input,self.errors,decoding_table)[0] and third: UnicodeDecodeError: 'charmap' codec can't decode byte 0x8f in position 13: character maps to Any suggestions?

  • @CT7ALW
    @CT7ALW Рік тому

    When I do it with a firmware I'm trying to RE, the disassemble of the reset vector says "/* WARNING: Control flow encountered bad instruction data */" and calls the function "void UndefinedFunction_08032ad6(undefined4 param_1,undefined4 param_2,undefined2 param_3)"... Any pointers?

  • @purpl3x3d97
    @purpl3x3d97 Рік тому

    What's happen between 6:59 and 7:00? The disassembled has been changed but dont understand how...

  • @gryzman
    @gryzman 3 місяці тому

    it's a shame the mentioned blog entry is gone, and looks like SVD loader is no longer being maintained

  • @riccardobramati2387
    @riccardobramati2387 Рік тому

    Hi, sorry for my English, isn't my first language. This video is a tutorial about STM32. The same process could be abblied for a bin file writed for GD32F305 chip?

    • @stacksmashing
      @stacksmashing  Рік тому +1

      Your english is great!
      A similar process can be applied to the GD32F305! You can find a GD32F3x0.svd file online

    • @riccardobramati2387
      @riccardobramati2387 Рік тому

      @@stacksmashing Thank you for quickly answer, and obivesly for your kindness

    • @gagipro92
      @gagipro92 Рік тому

      @@stacksmashing Hello we are working together with Riccardo in trying to make some custom stm32 firmware to work with gd32, but it's a GD32F3xx and not GD32F3x0, do you think it's ok ? thanks in advance

    • @riccardobramati2387
      @riccardobramati2387 Рік тому

      ​@@stacksmashingI understand it's a bit of a risky question....but wouldn't you be kind enough to give us a hand if we pass you the.bin file?

  • @evandrix
    @evandrix 4 роки тому

    how did you get the display out that prints the crackme messages? the cable connected is a usb cable to power the microcontroller, right?

    • @stacksmashing
      @stacksmashing  4 роки тому

      It's a serial terminal, the USB cable provides power and also a virtual serial port (and also access to the integrated ST-Link programmer)

  • @amitparmar5742
    @amitparmar5742 4 роки тому

    Pls show how to include SVD scripts in ghidra environment I tried hard but can't find SVD scripts in script manager pls help

  • @devinperez7547
    @devinperez7547 4 роки тому

    Would a reasonable way to be able to tell the endianness just be trial and error?

  • @chulote8
    @chulote8 3 роки тому

    And how do you get the binary from a flashed device?

  • @superdepressif6047
    @superdepressif6047 4 роки тому

    I've always thought that a computer was defined by both hardware AND an operating system. For a bare metal, does the application assume the role of operating system, how does the hardware "communicate" with the app ? Thanks

    • @rowifi
      @rowifi 3 роки тому

      The app has to do everything an OS does, just that you don't write code for what you don't need. The app can do everything an os does, if you write it, but most bare metal code tends to be simpler.

  • @deltakid0
    @deltakid0 4 роки тому +3

    Please, do a similar video but now with the most popular MCU: atmega328 (Arduino UNO)

    • @stacksmashing
      @stacksmashing  4 роки тому +3

      LiveOverflow did a couple on them: ua-cam.com/video/D0VKuZuuvW8/v-deo.html

  • @ДмитрийГусев-з6х
    @ДмитрийГусев-з6х 3 місяці тому

    Hi. I can't download files for stm, 404 - page not found

  • @AndyShevchenko
    @AndyShevchenko 3 роки тому

    Thanks! Any hints from you how to reverse engineer BOSH BHI160 sensor firmware? www.bosch-sensortec.com/products/smart-sensors/bhi160-firmware/ I believe they may use Zephyr. In any case `binwalk` kept silent, Ghidra doesn't help much seems...

  • @divaharsoor6771
    @divaharsoor6771 3 роки тому

    I'm having trouble finding the link to download example.bin. Can anyone help me out?

  • @scriptisle9529
    @scriptisle9529 4 роки тому

    is it possible to flash a customized board firmware?

  • @k7iq
    @k7iq 4 роки тому

    Not sure where to find the ghidra python module ? Python reports that I am missing this. Any idea where to find that ?

    • @stacksmashing
      @stacksmashing  4 роки тому +1

      You need to run the script from within Ghidra, then it should be fine

    • @k7iq
      @k7iq 4 роки тому

      Thank you ! I didn't understand how it all went together at first. Found Ghidra at ghidra-sre.org and also downloaded the SDK from aws.amazon.com/corretto/ and things are up and running ! The biggie for me was understanding what ghidra itself was. I am using this same STM32F446 except for it being 100 pin so may be helpful to me ! Also fun to play with the other processors. Now if there is a .elf import too, I might be able to include source code comments ? Not sure if it does that or not

  • @renakunisaki
    @renakunisaki 4 роки тому

    Tip: leave the address on the end of an unknown name. Eg usart_fn08000752. Then you don't have to worry about having a dozen different functions named usart_fn3 scattered around.

  • @mohamededrees979
    @mohamededrees979 3 роки тому

    Brilliant I have a challenge I know some brilliant mind like you Will solve it I need help with a Korean nintendo wii Locked on error 003 after update there is way to fix it but it's a painful and I can't find a modchip if there any way through software please and a lot of thanks to you for your time and work

  • @minhajsixbyte
    @minhajsixbyte 3 роки тому

    Can someone give me a list of prior knowledge do i need to do these things, roughly

  • @rebarius
    @rebarius 3 роки тому

    Which DevOps Engineers also thought this would be a bare metal tutorial for Kubernetes 😆

  • @bunmilajide589
    @bunmilajide589 4 роки тому

    Please on your previous video on creating back door to a camera. I am having issue using the mkimage. It is not working for me. Is it not part of tools in Kali? Do I need to install it. I am not getting direct link on how to go about it. Can you help please?

    • @stacksmashing
      @stacksmashing  4 роки тому

      I don't know if it's part of Kali, but on Ubuntu it's part of the "u-boot-tools" package

    • @rakeshchowdhury202
      @rakeshchowdhury202 4 роки тому +1

      Just use firmware mod toolkit. It's easier that way. Btw. @GhidraNinja, you might wanna try firmware-mod-toolkit too. It's got sources for all versions of squash fs (even industrial versions).
      Edit: I mean squash fs tools.

    • @bunmilajide589
      @bunmilajide589 4 роки тому

      @resync cyberwatch. Thank you
      I will search for it and try it. Many thanks

  • @M.emrezz
    @M.emrezz 10 місяців тому

    Hi, pic18f series code protect Hack?

  • @e-grasp
    @e-grasp 3 роки тому

    Bro which IDE is that

  • @amitparmar5742
    @amitparmar5742 4 роки тому

    yes i have refreshed but dont work

  • @astroboytechranger8231
    @astroboytechranger8231 3 роки тому

    I didn't find decompiler for stm32f103c4 elf file to c code error

    • @astroboytechranger8231
      @astroboytechranger8231 3 роки тому

      With ghidra tool

    • @stacksmashing
      @stacksmashing  3 роки тому +1

      Not sure what you mean?

    • @astroboytechranger8231
      @astroboytechranger8231 3 роки тому +1

      @@stacksmashing I used elf file of microcontroller STM 32f103c4 and I installed ghidra on Ubuntu 18 running of Jetson nano Nvidia board (GPU micro pc) and iam getting error as "decompiler missing__could not find decompiler excutable decompile"

    • @astroboytechranger8231
      @astroboytechranger8231 3 роки тому

      When I try to do analysis and c code is not generated 😭I tryed on virtual box with Ubuntu 20 now I got c code generated 😀👍✌️👌

  • @matisekl233
    @matisekl233 3 роки тому

    The main reason why I clicked on this video was that I was hoping to learn how to export binary from mcu :(

  • @saeedmahmoodi7211
    @saeedmahmoodi7211 4 роки тому

    brain.exe has stopped working

  • @mikolajkozakiewicz1070
    @mikolajkozakiewicz1070 3 роки тому

  • @briancreech9990
    @briancreech9990 Рік тому

    Hmm. Just made something in messing with a bit easier.

  • @chizukichan
    @chizukichan 4 роки тому +1

    Notification squad. Lol, I'm a nerd.

  • @begga9682
    @begga9682 4 роки тому +1

    yeet

  • @rakeshchowdhury202
    @rakeshchowdhury202 4 роки тому

    So... Yikes... Looks like I'm too 👂ly here.

  • @amitparmar5742
    @amitparmar5742 4 роки тому

    Add script folder to script directories in script manager but dont show scripts in script list

    • @stacksmashing
      @stacksmashing  4 роки тому

      Have you clicked the refresh button? Otherwise something else is wrong, the SVD-Loader.py script will get detected by Ghidra once it's in the search path.

  • @amitparmar5742
    @amitparmar5742 4 роки тому

    Pls reply fast because I have a project to complete

    • @stacksmashing
      @stacksmashing  4 роки тому

      You have to add the script folder to the paths Ghidra searches for scripts in

    • @amitparmar5742
      @amitparmar5742 4 роки тому

      Add folder script folder to script directories in script manager but no effect and don't show in script list

  • @canlelola
    @canlelola 3 роки тому

    Sorry, but way too much base and I can hardy make out what you are saying.

  • @perrykivolowitz7323
    @perrykivolowitz7323 3 роки тому

    I'm sorry - I cannot get past you referring to 0x20000000 as hex two thousand etc. A hard pass on what could potentially have been an interesting video.