Demonstration of extracting firmware from an embedded system through the JTAG interface.
The target board is a MIPS-based Linksys WRT54G v2 router containing an Intel 28F320 4MB external Flash memory. Tools used are the Bus Blaster JTAG hardware interface ([ Ссылка ]) and UrJTAG open source software ([ Ссылка ]).
It's Nerd Thunder month! Check out the folks mentioned at the end of the video:
- Exploitee.rs (IoT/consumer), [ Ссылка ]
- Chris Eagle (IDA/reverse engineering), [ Ссылка ]
- Azeria (ARM exploitation), [ Ссылка ]
- Craig Heffner (Routers/network), [ Ссылка ]
Ещё видео!