|
#1
|
|||
|
|||
Reversing embedded systems
Hi, this is a little bit off topic/forum, but I didn't know exactly to post this.
Does anybody know any good reversing forums specialized in hacking/reverse engineering embedded systems. Reason for asking is that I have a controller board, containing an Atmega 1280 MCU, which is bricked. I would like to extract the firmware from the MCU flash, but the LB1 or LB2 lock-bits are set, which prevents programming/reading/verifying flash & EEPROM contents. Apparently the only way to reset the lock-bits is to completely erase the chip, which of course is not a viable option for me. Would be interesting to see if somebody managed to rest the 2 bits without erasing the flash & EEPROM Last edited by rcer; 11-08-2023 at 02:51. |
#2
|
||||
|
||||
I cannot help you on this specific situation; unfortunately!
What about the famous "chip-off" way? Is it possible for you? |
#3
|
|||
|
|||
Unfortunately that is not possible, because I don't own the million dollar equipment required to perform this type of operations
|
#4
|
||||
|
||||
I feel you bro Don't you have any debug or JTAG pins to move on?
|
#5
|
|||
|
|||
Yes the board has a 6pin SPI header & 10 pin JTAG header, and I can read the chip with SPI, but JTAG access, debugging, and verifying memory contents has been disabled, and the the LB1 and LB2 lock-bits have been set, so its not possible anymore to change any fuse settings, unless you completly erase the chip first. Reading the flash & eeprom contents with the current settings returns garbage (i.e FFFF FFFF )for the complete memory contents
|
#6
|
||||
|
||||
Introduction to Embedded Systems Security and Reverse Engineering (Chinese)
Introduction to Embedded Systems Security and Reverse Engineering (Chinese)
Quote:
|
The Following 3 Users Say Thank You to Dr.FarFar For This Useful Post: | ||
#7
|
|||
|
|||
O.K. I will check this out
|
#8
|
|||
|
|||
This is generally a very, very interesting topic!
But the page hxxps://zhuanlan.zhihu.com/p/49831082 is a bit too *Chinese" for me (purely linguistically). Can someone translate it into English? (I have problems with the translation and probably not only me) Would be worth a new entry in the "General" category of Exetools ? Example: "Reversing embedded systems" (Little hint for the admins) Would surely enrich the forum ? (Maybe we could vote on it, if the topic would be desired) |
The Following 2 Users Say Thank You to Trit0n For This Useful Post: | ||
ahmadmansoor (11-10-2023), binarylaw (11-14-2023) |
#9
|
|||
|
|||
Quote:
I know that exetools is the lead forum for software hacking/reversing, and in general not geared towards hardware hacking/reversing, but it would be nice if this could be added/implemented, because there are a lot of very knowledgeable members on this forum who could assist/help less skilled members |
The Following User Says Thank You to rcer For This Useful Post: | ||
binarylaw (11-14-2023) |
#10
|
||||
|
||||
Quote:
__________________
Ur Best Friend Ahmadmansoor Always My Best Friend: Aaron & JMI & ZeNiX |
#11
|
|||
|
|||
Quote:
What's odd is how he ignores the very ones who have cracked it. I suspect this motivation may be financial: if they can do it, surely others out there can do it too ...and for cheaper cost. |
#12
|
|||
|
|||
Quote:
Hope this helps. P.S. Apologies if you weren't meaning you need a translated page.
__________________
Want to learn unpacking ... but I'm too stupid |
The Following 5 Users Say Thank You to tonyweb For This Useful Post: | ||
ahmadmansoor (11-12-2023), Antonio (11-12-2023), binarylaw (11-14-2023), chants (11-12-2023), Trit0n (11-15-2023) |
#13
|
|||
|
|||
pdf converted in case...
__________________
I like this forum! |
The Following 4 Users Say Thank You to bolo2002 For This Useful Post: | ||
ahmadmansoor (11-12-2023), chants (11-12-2023), tonyweb (11-12-2023), Trit0n (11-15-2023) |
#14
|
|||
|
|||
Interesting article on a real world example:
Quote:
Quote:
|
The Following 3 Users Say Thank You to chants For This Useful Post: | ||
Thread Tools | |
Display Modes | |
|
|