Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
video-blackbox-jtag-reverse-engineering
#1
http://dangerousprototypes.com/2013/07/2...gineering/


interesting
__________________________________________________________________________________
******new discord chat linkĀ https://discord.gg/5BQQbsb*******
Reply
#2
yes
Reply
#3
this kind of technics i know for about 3 years ago and was tested success on hd sattelite receiver
there is a test-mode supervisor implemented on new d3 jtag host
this isnt new security and also isnt good security
firmware bootloader disable the jtag host itself after boot so by using default poke/peek commands you cannot manipulate on flash also ram
to open access you need to use services scripts which allow you to pool the modem to the test mode after you can bypass and open connection
i do not know the test-mode commands for d3 modems i just know them for sat receivers also as i say this is poor low-level old security
in new secure devices jtag is keyed.... you need to enter a password being on test mode which allow you to use jtag properly
password is generated by some algo and its addicted by cpu seriall
Reply


Forum Jump:


Users browsing this thread: 4 Guest(s)