Loading...
「ツール」は右上に移動しました。
利用したサーバー: wtserver3
2764いいね 112364回再生

Extracting Firmware from External Memory via JTAG

Demonstration of extracting firmware from an embedded system through the JTAG interface.

The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface (dangerousprototypes.com/docs/Bus_Blaster) and UrJTAG open source software (urjtag.org/).

It's Nerd Thunder month! Check out the folks mentioned at the end of the video:

Exploitee.rs (IoT/consumer), exploitee.rs/
Chris Eagle (IDA/reverse engineering), github.com/cseagle
Azeria (ARM exploitation), azeria-labs.com/
Craig Heffner (Routers/network), www.devttys0.com/

コメント