In Teil 1 gebe ich einen Überblick über STM32-Boards und Nucleo-Boards und erkläre, wie ihr mithilfe der Arduino IDE Sketche auf sie laden könnt. Dabei kommen verschiedene Methoden zum Einsatz. Der Beitrag STM32-Boards – Teil 1: Übersicht und Upload erschien zuerst auf Wolles Elektronikkiste.| Wolles Elektronikkiste
What is Secure Boot for STM32MP157F? Secure Boot (or Security Boot) for the STM32MP157F is a security mechanism that ensures the microcontroller only executes authorized and cryptographically signe…| olimex
In Part 1, I give an overview of STM32 boards and show you how to upload sketches to them using the Arduino IDE.| Wolles Elektronikkiste
I joined Paul and Tod on The Bootloader podcast, sharing some tech picks - Glance, and the MNT Pocket Reform.| The lost outpost
Learn step-by-step how to exploit Bootloaders using Practical attack vectors. Gain root access by loading custom kernel and filesystem using TFTP.| Attify Blog - IoT Security, Pentesting and Exploitation
A bootloader is simply the part of the system that is used at start-up to assist in the process of successfully starting the system and loading the operating system kernel. Read more.| Attify Blog - IoT Security, Pentesting and Exploitation
On the shortlist of things to try on my new laptop has been Guix. I have been using Guix on my rsnapshot-based backup server since 2018, and experimented using it on a second laptop but never on my primary daily Continue reading Guix 1.4 on NV41PZ→| Simon Josefsson's blog
Recently I was able to fix the "stuck in the bootloader" issue in| ZMK Firmware Blog
I should probably preface all of this by saying that I’m not really a security professional in the sense that I don’t actually do security stuff for a living; I reported this vulnerability in March and gave a 90 day delay on releasing specific details mostly just because that’s A Thing That Security Researchers Do. Also the vulnerability doesn’t require user interaction from coldboot so it’s a bit nasty in that regard. But also this vulnerability sat around for 7 years so it could b...| [Segmentation Fault]
In a previous post, we detailed a vulnerability in the Amlogic System-On-Chip bootROM that allows arbitrary code execution at EL3. Since the Chromecast with Google TV (CCwGTV) is one of the devices affected by this issue, it opens the possibility to run a custom OS like Ubuntu. This post describes …| fred's notes
This post describes how to dump bootROM from Amlogic S905D3 SoC using Khadas VIM3L board. Since this board doesn't use Secure Boot, we can execute custom code in Secure World (a.k.a TrustZone) without exploiting any vulnerability. In addition, the board exposes an UART connector, which is convenient for …| fred's notes
QEMU has support for the SMDKC210 machine, an ARM board based on Exynos 4210 SoC. Peripherals implemented in QEMU for this machine are UART, SDHCI, FIMD, I2C, Interrupt Combiner, GIC, Clock, PMU, RNG, MCT, PWM, RTC. Samsung Galaxy S2 phone is also based on Exynos 4210, so it should be …| fred's notes
Prequel On October 21st 2015, mobile forensics company Cellebrite published a video that demonstrates how their solution can dump eMMC of Samsung Galaxy devices : This video strongly suggests that Samsung Galaxy bootloader can be exploited to execute arbitrary code. Summary Several bugs in Samsung Galaxy bootloader allow an attacker with …| fred's notes
Der LGT8F328P ist ein zum ATmega328P weitestgehend kompatibler Mikrocontroller. Ich zeige, wie ihr auf ihm basierte Boards programmiert.| Wolles Elektronikkiste
MCU usually supports a feature to disable reading out its content of| www.gniibe.org