Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Introduction to Industrial Control Security (Part 6)

Introduction to Industrial Control Security (Part 6)

In the previous article, we conducted a simple analysis of firmware. In this article, we will supplement some knowledge of Vxworks and continue our research into firmware content. As this involves operating system content, it is recommended that readers have a basic understanding of operating systems before reading this article, or refer to my article … Read more

HG533 Router Analysis Tutorial: Firmware Search

HG533 Router Analysis Tutorial: Firmware Search

In the previous section (HG533 Router Analysis Tutorial: Finding Hardware Debug Interface), we analyzed the hardware structure of the PCB and discovered a UART interface. Through this interface, we achieved a Linux shell management interface. In this section, we will use the methods proposed in the last section to access the device and further debug … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Abstract:In recent years, the application of Bluetooth devices has become increasingly widespread. If there are vulnerabilities in Bluetooth devices, it may lead to information leakage, economic losses, and other consequences. However, the firmware updates for Bluetooth devices are often delayed, and some cannot even perform hot updates. Currently, there is a relative lack of tools … Read more

Understanding Automotive MCUs in Depth

Understanding Automotive MCUs in Depth

A traditional fuel vehicle requires about 500 to 600 chips, a mild hybrid vehicle requires about 1000 chips, and plug-in hybrid and pure electric vehicles require at least 2000 chips. This means that with the rapid development of smart electric vehicles, the demand for advanced process chips is increasing significantly, and the demand for traditional … Read more

How to Handle Single Chip Select in STM32 SPI?

How to Handle Single Chip Select in STM32 SPI?

Previously, when using STM32’s SPI to control many external chips, there was only one chip select for a single SPI peripheral. How can we achieve independent chip selection for one master and multiple slaves? SPI Bus Topology Generally, the SPI bus is connected as shown in the figure below, with one master and multiple slaves. … Read more

Complete Guide to Microcontroller Bootloader

Complete Guide to Microcontroller Bootloader

For a complex microcontroller project, having a BootLoader (hereinafter referred to as BL) is very important. It makes maintaining and upgrading your application code much easier. This article will help you understand why to design a Bootloader and how to design it, aiming to achieve a clear understanding of both its function and purpose. Through … Read more

ESP8266 Module Firmware Local Upgrade Steps

ESP8266 Module Firmware Local Upgrade Steps

The article about the module is about to begin, and I plan to write a series of beginner and intermediate tutorials on modules and STM32 in the future. Generally speaking, manufacturers of the ESP8266 module will periodically upgrade the firmware inside the module and release it, so we must also master the method of upgrading … Read more

Basics of Embedded Systems and the Internet of Things

Basics of Embedded Systems and the Internet of Things

Embedded systems are ubiquitous. Almost every electrical device you interact with is more complex than a simple light switch; it contains a digital processor that reads input data from its environment, executes computational algorithms, and generates some output to interact with the environment. From waking up in the morning (responding to alarms from digital devices) … Read more