Extracting Firmware from External Memory via JTAG

Описание к видео Extracting Firmware from External Memory via JTAG

Demonstration of extracting firmware from an embedded system through the JTAG interface.

The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface (http://dangerousprototypes.com/docs/B...) and UrJTAG open source software (http://urjtag.org).

It's Nerd Thunder month! Check out the folks mentioned at the end of the video:

Exploitee.rs (IoT/consumer), http://exploitee.rs
Chris Eagle (IDA/reverse engineering), https://github.com/cseagle
Azeria (ARM exploitation), https://azeria-labs.com
Craig Heffner (Routers/network), http://www.devttys0.com

Комментарии

Информация по комментариям в разработке