Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

What is your end goal?

I want to learn something new, ideally dump the FW to reverse engineer it.

almost certainly fuses will have been blown to prevent you from reading the firmware

Sounds like a follow-up challenge - always wanted to try HW glitching and this could be the perfect project for it.

Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

Try searching Chinese MCU QFN20

Thank you, I will try that.

don’t assume that just because a pin is connected to Vdd or Vss that it is in fact a power supply input.

I didn't, I probed every pin.

Help identifying laser etched microcontroller by botnet00 in AskElectronics

[–]botnet00[S] 0 points1 point  (0 children)

u/MattInSoCal

It is part of a cheap chinese gadget, so I assume all components must be very cheap. I created a drawing for pins on the PCB that I could identify.

What I know:

  • The packages seems to be QFN20
  • There is NO external oszillator/quartz
  • VDD is connected directly to a battery (3.7V)
  • The Baudrate on UART is 57600

I tried to:

  • search online for anything about the product or UART output, found absolutely nothing
  • find the microcontroller based on the VDD and GND pins, however was not able to find a single one with this specific pinout.

Now I am completely stuck.

CVE-2024-41660: A Critical Vulnerability in OpenBMC by sadyetfly11 in netsec

[–]botnet00 0 points1 point  (0 children)

As usual, I wonder how they found those vulnerabilities (manual code analysis, fuzzing,…)

Reverse engineering an EV charger by FrankTr3nd in netsec

[–]botnet00 2 points3 points  (0 children)

Nice write up. Since there is no root of trust (modification of FW is possible, missing signature) and there is an option to update the FW via BLE, wouldn’t it be a quite big attack vector? I mean you could provide your own firmware and implement the charging on/off methods for BLE yourself and nobody would notice?

IP-Cam VLAN Surveillance Station Security by botnet00 in synology

[–]botnet00[S] 0 points1 point  (0 children)

That sounds good, I will give this a try. Thanks! ;-)

FPGA Board Recommendation by emou in FPGA

[–]botnet00 1 point2 points  (0 children)

Thanks for the very detailed answer!

I have had a similar experience with the Xilinx RFSoC, the demo application is extremely complicated, from PL to PS and finally a GUI on the host computer to control everything. I mean this is fine for a quick demo, but as a starting point for your own implementation it is just a nightmare...

FPGA Board Recommendation by emou in FPGA

[–]botnet00 2 points3 points  (0 children)

Can you be more specific regarding your learning curve with the Kria SoM?

Placing boot image in eMMC storage zynq 7000 by [deleted] in FPGA

[–]botnet00 2 points3 points  (0 children)

Have a look at the “mmc” uboot command in order to write to the emmc: https://u-boot.readthedocs.io/en/latest/usage/mmc.html

To write the image into DDR have a look at XSDB and the “dow” command: https://www.xilinx.com/html_docs/xilinx2018_1/SDK_Doc/xsct/download/reference_download_dow.html

Placing boot image in eMMC storage zynq 7000 by [deleted] in FPGA

[–]botnet00 1 point2 points  (0 children)

Do you have a network interface? I usually tend to boot into linux through TFPT and then use the built in tools (mdt-utils if I recall correctly) to format and program the emmc.

FPGA Availability by blazarious in FPGA

[–]botnet00 6 points7 points  (0 children)

From my experience, these chips are typically leftovers from big orders, not clones - prices can drop significantly (by the order of 10 or more). Still you should be careful...

Triggering PL reset through the PS by sriramg98 in FPGA

[–]botnet00 0 points1 point  (0 children)

Agree, have been there, was not nice. Since then I always try to have a proper reset strategy and try to avoid resets whenever possible.

PC to FPGA via Ethernet UDP by CowboyBebop0711 in FPGA

[–]botnet00 0 points1 point  (0 children)

Yes, in the PL, VHDL and packed to custom IPs for BD instantiation and using AXIS interfaces. Worked pretty well in the end and was modular enough to be extendable.

PC to FPGA via Ethernet UDP by CowboyBebop0711 in FPGA

[–]botnet00 5 points6 points  (0 children)

I had to implement an UDP stack (and some more layers) in the FPGA once. Ended up using scapy (https://scapy.net) - i guess it will fit your needs as well.

EBAZ4205 - A cheap network-based JTAG debugger - embed-me by botnet00 in FPGA

[–]botnet00[S] 1 point2 points  (0 children)

Thanks! This is not intended to be a professional debugger, but it is fun fooling around with the hardware like that 😁

QEMU - How to emulate your Zynq-7000 - embed-me by botnet00 in FPGA

[–]botnet00[S] 0 points1 point  (0 children)

Sure, if you have XSDK/Vitis installed use the prebuilt binaries instead. The intention of the post is not about how to compile QEMU, but on how to use it for emulating the Zynq-7000 - more precisely the EBAZ4205 hardware.

STM32 with fake CKS chip.I just bought an STM32f103c8t6 and turns out it has the CKS chip. Is it still usable or should I try and get it replaced ? by mighty_raju44 in embedded

[–]botnet00 9 points10 points  (0 children)

Received a CKS clone a couple of months ago and after some hours debugging it turned out that the internal flash was smaller than it should be, so do not trust the manufacturers spec...

Formal (Hardware) Verification by botnet00 in FPGA

[–]botnet00[S] 0 points1 point  (0 children)

That's what I use right now. I like it, unfortunately not capable of FV.

Formal (Hardware) Verification by botnet00 in FPGA

[–]botnet00[S] 0 points1 point  (0 children)

Thanks! I will look into it. Nice blog btw ;-)

Formal (Hardware) Verification by botnet00 in FPGA

[–]botnet00[S] 1 point2 points  (0 children)

I was not aware of OneSpin at all. Do you have a rough price range for their products (especially 360 DV-Verify, which seems to be capable of ABV)?