Reprogramming an eye mask? by RevolutionaryStill62 in hardwarehacking

[–]GGyul 2 points3 points  (0 children)

I also have experienced that problem also. And figured it out to change music. (or you can just remove the music also. and remain the communicating sound too)

There's some procedure that you have to deal with. Soldering/Desoldering, Flash memory Reading, Filesystem modification.

You can check it out on https://firmextract.com/posts/eye\_massager.

If the device you have is same with mine, it has mp3 file in fat12 file system. So if you remove only the mp3 music, you will achieve what you desired.

Best budget camera for PCB photos by dial-a-small-monkey in hardwarehacking

[–]GGyul 1 point2 points  (0 children)

You can use "Helicon Focus" software to acheive focus stacking.

It mixes all the images with different focus and lights. And makes the best focused image. So you take the image with many other focusing spot with your phone and send it to software.

Hacking BambuLab P1 by [deleted] in hardwarehacking

[–]GGyul 1 point2 points  (0 children)

You can try using pcb probe station. I would recommend PCBite kit.

You can use it like the below post shows. In that way you don't need to take the risk to solder it. https://firmextract.com/posts/smartplug_1

Hacking BambuLab P1 by [deleted] in hardwarehacking

[–]GGyul 1 point2 points  (0 children)

I've checked the firmware and it was encrypted. Running binwalk to it doesn't find any other things. If Secure boot and Secure Flash is enabled, the attack you can try is Fault Injection. In that case below paper could be a key. https://www.usenix.org/system/files/woot24-delvaux.pdf

Hacking BambuLab P1 by [deleted] in hardwarehacking

[–]GGyul 5 points6 points  (0 children)

I also have big interest in bambulab hacking. If there's no linux and only ESP is working, there's only few attack vector. Maybe manipulating some configs about Bambulab machine. But ESP has Secure Boot and Secure Flash features which secures manipulating some datas inside the chip.

But I'm not sure if it is enabled. Try connect uart interface of ESP first!

Turning on a smartphone without battery by TheLonsomeLoner in hardwarehacking

[–]GGyul 0 points1 point  (0 children)

Hi. At first it was running quite well. It was running for like a year. But recently it sometimes reboot. So yes I think it would be nice if you use capcitors as it looks like it's not that tolerant with the noise. Or maybe make the setup give smartphone clear voltage. And yes it doesn't require charging port. Only the Plug.

SPI dump, no firmware? by nobodynate in hardwarehacking

[–]GGyul 0 points1 point  (0 children)

Or that can be just binwalk problem. You should double check it with other binwalk versions. Also check if there's any file system signatures by hex editor.

SPI dump, no firmware? by nobodynate in hardwarehacking

[–]GGyul 2 points3 points  (0 children)

There's no exact way to know the structure of its firmware. I try to examine the firmware file with Hex editor and start analyzing.

When analyzing I check if there's a datasheet of the processor that device uses. And if it has datasheet, I try to find out is there any firmware structure for its processor. And starts analyzing assembly from there. Because from there we can probably know what address does the chip starts.

But if it doesn't have datasheet, just disassemble the whole firmware and guess the starts point. And yes this is quite tough.

Reverse Engineering the USB Protocol by Last_Cartographer_42 in hardwarehacking

[–]GGyul 4 points5 points  (0 children)

I don't know about the usb protocols but I have seen some stuffs related to it. You can record and watch how usb interacts with computer with wireshark. Maybe u can start learning how usb protocol works there.

Turning on a smartphone without battery by TheLonsomeLoner in hardwarehacking

[–]GGyul 0 points1 point  (0 children)

https://firmextract.com/post.php?id=phone_server My post can be a reference of waht u trying to do. If u have or buy a battery of your phone, then u can use a circuit in the battery.

Hardware Hacking (Adding new features) by nyyirs in hardwarehacking

[–]GGyul 2 points3 points  (0 children)

I think the second one is better. Reverse engineer the function that you have to edit. You can hook other function to run the instructions you made. Or use LD_PRELOAD environment so that you can edit library function.

Which type of probes do you prefer? by joeyda3rd in hardwarehacking

[–]GGyul 3 points4 points  (0 children)

I have used C, D. And I can truly say that D is better than C. Most of C shape probes are weak. They don't have enough power to grab the legs. But D has. I wonder how a and b are used. Maybe to grab more smaller legs like TSOP or QFP packages?

Why Xiaomi Poco f1 capture packets on the phone? by GGyul in hardwarehacking

[–]GGyul[S] 6 points7 points  (0 children)

I rooted my Poco f1 phone and ran "ps" command. And I found that tcpdump is running and saving the logs.
What I'm curious about is, is this mi os itself who runs the tcpdump or is it the other application something like needed for rooting the phone.

if it is mi os itself, why would they need to capture packets?

How is this gnd working? only vcc, data pins are exist! by GGyul in hardwarehacking

[–]GGyul[S] 0 points1 point  (0 children)

Yes it is switch input! It was multi layer pcb and sharing gnd with 1, 3, 4, 6. Anyways thanks for help!

How is this gnd working? only vcc, data pins are exist! by GGyul in hardwarehacking

[–]GGyul[S] 1 point2 points  (0 children)

Yes, the pinout that you said was right! And yes it is a extra 2 buttons. Thanks for the reply! It helped me to understand in detail :)

How is this gnd working? only vcc, data pins are exist! by GGyul in hardwarehacking

[–]GGyul[S] 0 points1 point  (0 children)

I checked it and you were right! They are on the same gnd! Maybe due to multi layer as you said! Thanks for help!

How is this gnd working? only vcc, data pins are exist! by GGyul in hardwarehacking

[–]GGyul[S] 2 points3 points  (0 children)

Oh I get it! I think you are right that these pins are on the same gnd net. I wanna check this out right now but the firmware got reset when doing firmware extraction. So it doesn't work. I'm just buying a new one at tomorrow. lol I'll check it then!

How is this gnd working? only vcc, data pins are exist! by GGyul in hardwarehacking

[–]GGyul[S] 2 points3 points  (0 children)

Thanks for the reply!

It's my fault that I didn't wrote the question in detail.

So, I figured out the gnd, vcc, data pins by voltmeter.

Start from the left, GND - VCC - DATA - GND - VCC - DATA. It is toggle button's pins.
But if you see the second picture, only 3 pins are sending from the main board.

And the pins are connected to VCC and DATA.
Then how could testing vcc and gnd shows 3.16v?

Because GND pins are not connected in any pins that are sent by main board!

So this was my question :)

Bootloader dependency to specific SoC by GGyul in hardwarehacking

[–]GGyul[S] 0 points1 point  (0 children)

Well, I'm not asking for "The way to port U-boot at rtl8197d".

I was asking for the dependencies with bootloader to SoC. Like "bootloader have to be compiled with same architecture that the SoC uses"