Controlling a Router Device Using U-Boot

Controlling a Router Device Using U-Boot

This article is a featured article from the Kanxue Forum, author ID: Q老Q 1 Entering U-Boot Shell from UART After opening a certain router device, locate the UART interface and connect the UART pins to the computer through TTL. Power on the router and observe the startup log. Boot SPI NAND start read bootheader start … Read more

Getting Started with Router Firmware Compilation

Getting Started with Router Firmware Compilation

0×01 Environment Preparation 1. This time we will use the open-source OPENWRT source code for compilation. OpenWRT is a highly modular and automated embedded Linux system, with powerful network components and extensibility, often used in industrial control devices, telephones, small robots, smart homes, routers, and VOIP devices. It also provides over 100 pre-compiled software packages, … Read more

Sharing SoC Function Simulation Verification Technology

Sharing SoC Function Simulation Verification Technology

Introduction to the Basic Simulation Environment of SoC I have written one on the forum. http://bbs.eetop.cn/thread-442797-1-1.html “How to Build the Basic Testbench for SoC Projects (My Process)”. Here, I will mention the important and changed parts. Assuming this SoC has a CPU system, memory controller, bus topology, PAD, Clock reset, and some logic functional modules. … Read more

Solution for No Cortex-M Device Found in JTAG Chain

Solution for No Cortex-M Device Found in JTAG Chain

Today I flashed a firmware, and it ran normally. However, when I tried to flash another firmware, I encountered this issue: No Cortex-M Device found in JTAG chain.Please check the JTAG cable and the connected devices. I found the answer on Baidu, which indicated that treating the JTAG pins as I/O pins would cause the … Read more

IoT Device Firmware Security Monitoring Report

IoT Device Firmware Security Monitoring Report

1. Overview In recent years, the Internet of Things (IoT) has been deeply integrated with technologies such as 5G, artificial intelligence, blockchain, big data, and IPv6, leading to a continuous emergence of new technologies, products, and models. With the acceleration of digital transformation and intelligent upgrading of the economy and society, IoT has been widely … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Introduction to Industrial Control Security (Part 6)

Introduction to Industrial Control Security (Part 6)

In the previous article, we conducted a simple analysis of firmware. In this article, we will supplement some knowledge of Vxworks and continue our research into firmware content. As this involves operating system content, it is recommended that readers have a basic understanding of operating systems before reading this article, or refer to my article … Read more

HG533 Router Analysis Tutorial: Firmware Search

HG533 Router Analysis Tutorial: Firmware Search

In the previous section (HG533 Router Analysis Tutorial: Finding Hardware Debug Interface), we analyzed the hardware structure of the PCB and discovered a UART interface. Through this interface, we achieved a Linux shell management interface. In this section, we will use the methods proposed in the last section to access the device and further debug … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Design of a Firmware Bluetooth Protocol Vulnerability Mining Framework Based on Virtualization

Abstract:In recent years, the application of Bluetooth devices has become increasingly widespread. If there are vulnerabilities in Bluetooth devices, it may lead to information leakage, economic losses, and other consequences. However, the firmware updates for Bluetooth devices are often delayed, and some cannot even perform hot updates. Currently, there is a relative lack of tools … Read more