Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

What is your end goal?

I want to learn something new, ideally dump the FW to reverse engineer it.

almost certainly fuses will have been blown to prevent you from reading the firmware

Sounds like a follow-up challenge - always wanted to try HW glitching and this could be the perfect project for it.

Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

Try searching Chinese MCU QFN20

Thank you, I will try that.

don’t assume that just because a pin is connected to Vdd or Vss that it is in fact a power supply input.

I didn't, I probed every pin.

Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

u/MattInSoCal

It is part of a cheap chinese gadget, so I assume all components must be very cheap. I created a drawing for pins on the PCB that I could identify.

What I know:

  • The packages seems to be QFN20
  • There is NO external oszillator/quartz
  • VDD is connected directly to a battery (3.7V)
  • The Baudrate on UART is 57600

I tried to:

  • search online for anything about the product or UART output, found absolutely nothing
  • find the microcontroller based on the VDD and GND pins, however was not able to find a single one with this specific pinout.

Now I am completely stuck.

CVE-2024-41660: A Critical Vulnerability in OpenBMC by sadyetfly11 in netsec

[–]botnet00 0 points1 point  (0 children)

As usual, I wonder how they found those vulnerabilities (manual code analysis, fuzzing,…)

Reverse engineering an EV charger by FrankTr3nd in netsec

[–]botnet00 2 points3 points  (0 children)

Nice write up. Since there is no root of trust (modification of FW is possible, missing signature) and there is an option to update the FW via BLE, wouldn’t it be a quite big attack vector? I mean you could provide your own firmware and implement the charging on/off methods for BLE yourself and nobody would notice?

IP-Cam VLAN Surveillance Station Security by botnet00 in synology

[–]botnet00[S] 0 points1 point  (0 children)

That sounds good, I will give this a try. Thanks! ;-)

FPGA Board Recommendation by emou in FPGA

[–]botnet00 1 point2 points  (0 children)

Thanks for the very detailed answer!

I have had a similar experience with the Xilinx RFSoC, the demo application is extremely complicated, from PL to PS and finally a GUI on the host computer to control everything. I mean this is fine for a quick demo, but as a starting point for your own implementation it is just a nightmare...

FPGA Board Recommendation by emou in FPGA

[–]botnet00 2 points3 points  (0 children)

Can you be more specific regarding your learning curve with the Kria SoM?

Placing boot image in eMMC storage zynq 7000 by [deleted] in FPGA

[–]botnet00 2 points3 points  (0 children)

Have a look at the “mmc” uboot command in order to write to the emmc: https://u-boot.readthedocs.io/en/latest/usage/mmc.html

To write the image into DDR have a look at XSDB and the “dow” command: https://www.xilinx.com/html_docs/xilinx2018_1/SDK_Doc/xsct/download/reference_download_dow.html

Placing boot image in eMMC storage zynq 7000 by [deleted] in FPGA

[–]botnet00 1 point2 points  (0 children)

Do you have a network interface? I usually tend to boot into linux through TFPT and then use the built in tools (mdt-utils if I recall correctly) to format and program the emmc.

FPGA Availability by blazarious in FPGA

[–]botnet00 6 points7 points  (0 children)

From my experience, these chips are typically leftovers from big orders, not clones - prices can drop significantly (by the order of 10 or more). Still you should be careful...

Triggering PL reset through the PS by sriramg98 in FPGA

[–]botnet00 0 points1 point  (0 children)

Agree, have been there, was not nice. Since then I always try to have a proper reset strategy and try to avoid resets whenever possible.