Reverse engineering: Arturia minilab 3 firmware

Описание к видео Reverse engineering: Arturia minilab 3 firmware

I poke around a firmware update file for a USB MIDI controller, the Arturia Minilab 3. The goal of this video is to show some tools and methods I use when first looking at a firmware image.

Some segments have horrible audio for some unknown reason, and the volume is all over the place. My brain can barely handle analyzing firmware while trying to explain, let alone speaking clearly and coherently...

Some chapter markers :

00:00 intro
00:27 firmware update file contents
06:37 identifying instruction set / CPU
07:50 failing at USB-DFU
08:51 ghidra
30:10 teardown
30:30 mcu datasheet
32:23 interrupt / exception vectors
38:17 MIDI and USART
44:27 mem loading address
49:03 Flash surprise code
52:02 MIDI and sysex
52:52 More loading address
1:07:34 file header

Комментарии

Информация по комментариям в разработке