Matt Brown
Matt Brown
  • 71
  • 2 523 272
Persistent Root Shell via IoT Firmware Modification - Rooting a TP-Link Security Camera
Minipro repo:
gitlab.com/DavidGriffith/minipro
Need IoT pentesting or reverse engineering services?
Please consider Brown Fine Security:
brownfinesecurity.com/
IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A
🛠️ Stuff I Use 🛠️
🪛 Tools:
Raspberry PI Pico: amzn.to/3XVMS3K
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4h4G7DD
iFixit Toolkit: amzn.to/44tTjMB
🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx
🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
💻 Social:
website: brownfinesecurity.com/
twitter: nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/
#hacking #iot #cybersecurity
มุมมอง: 12 054

วีดีโอ

Glitching Linux Bootloader for Shells and Freedom - Rooting a TP-Link Security Camera
มุมมอง 32Kวันที่ผ่านมา
Hack the Planet!!! Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3Uz...
Open Source Flash Programmer Software - minipro FTW
มุมมอง 12K21 วันที่ผ่านมา
minipro repo: gitlab.com/DavidGriffith/minipro algorithm.xml archive: brownfinesecurity.com/algorithm.xml Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIh...
Hacking Time - Discussing the Bug Class that Earned Me 5-Figures
มุมมอง 8K21 วันที่ผ่านมา
ArchAngelDDay's Nahamsec Talk: th-cam.com/video/G1RHa7l1Ys4/w-d-xo.html NTP mitm Demo: github.com/nmatt0/ntp-mitm-demo Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer:...
Chip Off Firmware Extraction - Hacking the Totolink WiFi Router
มุมมอง 40Kหลายเดือนก่อน
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3UzoAZM Logic Analyzer...
Top 5 Tools for IoT Hacking Beginners
มุมมอง 16Kหลายเดือนก่อน
Check out the blog post related to this video! brownfinesecurity.com/blog/hardware-hacking-tools-beginners-guide/ Amazon Items from the Video: WiFi Router: amzn.to/3YqjjqH iFixit Toolkit: amzn.to/408Kfwr Multimeter: amzn.to/4hn6Z27 UART Adapter: amzn.to/4h4G7DD Jumper Wire: amzn.to/4eOrZgk PINECIL Soldering Iron: amzn.to/48cxNxD Solder: amzn.to/3UdhISN Wire Strippers: amzn.to/4eMUYkv Need IoT p...
Make Binwalk Fast Again - Rust Rewrite of Binwalk is in Beta
มุมมอง 13Kหลายเดือนก่อน
Check out V3 of binwalk! github.com/ReFirmLabs/binwalk/tree/binwalkv3 Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Powe...
Discovering Backdoor in Chinese Router Firmware Update Server - Hacking the Totolink WiFi Router
มุมมอง 35Kหลายเดือนก่อน
In this video, we show how I discovered a backdoor in the firmware update server for the TOTOLINK Wi-Fi router. Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.t...
UART Root Shell on Linux Router - Hacking the Totolink WiFi Router
มุมมอง 19Kหลายเดือนก่อน
In this video, we discover a hardcoded root password though the aid of OpenWRT's failsafe mode. OpenWRT Failsafe Mode Docs: openwrt.org/docs/guide-user/troubleshooting/failsafe_and_factory_reset Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Us...
Wireshark Basics for IoT Hacking
มุมมอง 15K2 หลายเดือนก่อน
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimeter: amzn.to/3YUjbQS Power Supply: amzn.to/3QBNSpb O...
Using Linux to Intercept IoT Device Traffic
มุมมอง 15K2 หลายเดือนก่อน
mitmrouter on GitHub: github.com/nmatt0/mitmrouter Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimet...
Hacking a Chinese Medical Device via Bluetooth - iHealth Nexus Pro Scale
มุมมอง 19K2 หลายเดือนก่อน
exploit code: github.com/BrownFineSecurity/ihealth-hs2spro-exploit bletools repo: github.com/nmatt0/bletools Check out the blog post related to this video! brownfinesecurity.com/blog/intercepting-mobile-traffic-with-caido-and-frida/ Watch other videos about BLE hacking: th-cam.com/play/PLuyjXiwnBIa1vj9jHyO-uB8W1nHN-xjLO.html IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcx...
Intercepting Mobile Traffic with Caido and Frida - iHealth Nexus Pro Scale
มุมมอง 14K2 หลายเดือนก่อน
Check out the blog post related to this video! brownfinesecurity.com/blog/intercepting-mobile-traffic-with-caido-and-frida/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimeter: amzn.to/3YUjbQS Power Supply: amzn.t...
Siglent SDM3045X Multimeter - with Custom OBS Overlay
มุมมอง 5K3 หลายเดือนก่อน
Siglent SDM3045X Multimeter - with Custom OBS Overlay
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
มุมมอง 18K3 หลายเดือนก่อน
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
มุมมอง 104K3 หลายเดือนก่อน
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
มุมมอง 315K3 หลายเดือนก่อน
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
มุมมอง 11K3 หลายเดือนก่อน
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
มุมมอง 154K3 หลายเดือนก่อน
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
มุมมอง 39K3 หลายเดือนก่อน
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
UFS/eMMC Firmware Extraction - UFI Box
มุมมอง 12K4 หลายเดือนก่อน
UFS/eMMC Firmware Extraction - UFI Box
Hacking a Knockoff Google Chromecast - Firmware Extraction
มุมมอง 107K4 หลายเดือนก่อน
Hacking a Knockoff Google Chromecast - Firmware Extraction
blueTag - A Raspberry PI Pico JTAGulator Alternative
มุมมอง 9K4 หลายเดือนก่อน
blueTag - A Raspberry PI Pico JTAGulator Alternative
Hacking a WiFi Fireworks Firing System - The FireFly Plus
มุมมอง 15K4 หลายเดือนก่อน
Hacking a WiFi Fireworks Firing System - The FireFly Plus
Flipper Zero Chat App - RF Signal Analysis via SDR
มุมมอง 12K4 หลายเดือนก่อน
Flipper Zero Chat App - RF Signal Analysis via SDR
4G GPS Tracker Reverse Engineering - GPS Digital Signal Decoding
มุมมอง 17K4 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - GPS Digital Signal Decoding
4G GPS Tracker Reverse Engineering - Cell Modem Interactions
มุมมอง 32K5 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - Cell Modem Interactions
4G GPS Tracker Reverse Engineering - Hardware Analysis
มุมมอง 18K5 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - Hardware Analysis
Hacking The Mojo C-75 - YT Comments Follow-Up
มุมมอง 4.4K5 หลายเดือนก่อน
Hacking The Mojo C-75 - YT Comments Follow-Up
Hacking The Mojo C-75 - Intercepting Network Traffic
มุมมอง 8K5 หลายเดือนก่อน
Hacking The Mojo C-75 - Intercepting Network Traffic

ความคิดเห็น

  • @noanyobiseniss7462
    @noanyobiseniss7462 ชั่วโมงที่ผ่านมา

    Cool beans! Looks like this is the only way we can actually get cameras to use on foss security setups.

  • @tisme1105
    @tisme1105 4 ชั่วโมงที่ผ่านมา

    I've done a lot of contacted IoT testing for some of the big companies. Given you had a root shell, no chip off writing of flash was needed. This device has pretty poor security: - no/poor secure boot implementation - poor uboot security - no verification of squashfs partition by previous stage - data on flash not encrypted via EFUSE keys Also fortunate not BGA chips. That said, not knocking the video - great tutorial on how to do chip off read/write.

  • @stevecamuti5746
    @stevecamuti5746 8 ชั่วโมงที่ผ่านมา

    Happy follower, and still very ADHD... cards linking to prior videos when you mention them (or a playlist or collection) would be lovely. Thank you for the work you do, and for explaining so well.

  • @dingokidneys
    @dingokidneys 10 ชั่วโมงที่ผ่านมา

    Very nice and well explained. I always enjoy your content.

  • @AIexanderJ
    @AIexanderJ 11 ชั่วโมงที่ผ่านมา

    So cool!

  • @federicogorla31
    @federicogorla31 12 ชั่วโมงที่ผ่านมา

    Great video as always. Can you tell us what the exact model is?

  • @1remski1
    @1remski1 15 ชั่วโมงที่ผ่านมา

    Try dmesg -n0 , perhaps it would stop loggin to the console..

  • @AlexeiDimitri
    @AlexeiDimitri 15 ชั่วโมงที่ผ่านมา

    So... U`ll MITM that TLS Connection to China? Or even look at those UDP packets?

  • @RogerBarraud
    @RogerBarraud 16 ชั่วโมงที่ผ่านมา

    Hi Matt, could you please add a link for the pogo pins? You mentioned that there was a link but I don't see it. Thanks 🙂

  • @SB-qm5wg
    @SB-qm5wg 17 ชั่วโมงที่ผ่านมา

    Good call on the bin compression

  • @ingulari3977
    @ingulari3977 20 ชั่วโมงที่ผ่านมา

    Your new compressed squash fs binary was few hundred bytes smaller. When you write it to firmware - what happens? Does it mean there will be few hundred bytes of the original squash fs binary remaining in the firmware? Does it remain as a dead (non accessible data)? Also, what would happen if tje new squash fs binary is larger even if by few bytes?

    • @ingulari3977
      @ingulari3977 20 ชั่วโมงที่ผ่านมา

      P.S. Would be nice to see further videos on what you managed to reverse engineer, and how would you improvevthis device. P.P.S. I guess for making further changes you would need to do absolotelly the same procedure on modifying that read only fs. Because of that, would it not make sense to add some socket onto the camera board for easy removal/reinsertion of the chip (if they exist for this 8 pin package)?

  • @ahmedshaher-k8l
    @ahmedshaher-k8l 20 ชั่วโมงที่ผ่านมา

    can you try ubiquiti devices

  • @invisghosty
    @invisghosty 20 ชั่วโมงที่ผ่านมา

    Great work! Do you think it's possible to reprogram the chips without having to take them off the board? Is it just easier to get all the pins aligned and stuff if you have it on its own?

  • @quinton3997
    @quinton3997 22 ชั่วโมงที่ผ่านมา

    Are you hacking free service or what

  • @морс-ф3д
    @морс-ф3д วันที่ผ่านมา

    Great knowledge! Brilliant explanation! Thank you Mat!!!!!!!!!!!!!!!!!!!!!

  • @DanNeb-w3e
    @DanNeb-w3e วันที่ผ่านมา

    Cool vid. Waiting on the episode of reverse Eng. Of these binaries

  • @oakitoki
    @oakitoki วันที่ผ่านมา

    Awesome video Matt! Much appreciated with your knowledge and skills. Questions, have you ever tried doing a chip off and firmware extraction from a Secure Enclave chip from an iOS device? Curious as its super robust (maybe encrypted at rest itself). Godspeed!

  • @thelogster
    @thelogster วันที่ผ่านมา

    The chip actually supports secure boot. Its such a shame that it wasn't implemented for this platform

  • @data-p6x
    @data-p6x วันที่ผ่านมา

    Please explain to me why hack your own router what's the purpose what are you gaining just asking

  • @DarkoStefok
    @DarkoStefok วันที่ผ่านมา

    Could you make a video detailing your education and how you got to your skill level? Vids are great, keep it up!

  • @sebastianholmqvist7407
    @sebastianholmqvist7407 วันที่ผ่านมา

    Very much agree with all other commenters on your format and detailed explanations! I would only encourage you to invest in slightly better cameras (resolution makes it blurry looking) and to beef up the lighting. It will make a huge difference to what the camera manages to capture.

    • @mattbrwn
      @mattbrwn วันที่ผ่านมา

      which camera specifically is blurry? or all of them?

    • @sebastianholmqvist7407
      @sebastianholmqvist7407 3 ชั่วโมงที่ผ่านมา

      Basically all of them. Can't tell if it's the compression causing it or if the camera itself that is causing it.

  • @Alssdkdf-Afwefjsdkjf
    @Alssdkdf-Afwefjsdkjf วันที่ผ่านมา

    Excellent video, I love these hacks, I learn a lot from them. If I may give you one point of feedback: for me the flow of information is a little too slow in the videos. I find myself reaching for the playback speed setting and skipping bits. Not to say I want you to turn it into some kind of awful TikTok channel, it's just that the information density could be higher imo.

  • @VSteam81
    @VSteam81 วันที่ผ่านมา

    1:32 "yOU Can see..." lol edit: while watching this, something came to mind. i want to explore this in a chroot now. what architecture is this cpu? can you maybe release the stock rootfs? would love to tinker around with it!

  • @jpphoton
    @jpphoton วันที่ผ่านมา

    you are covered. Love your videos.

  • @skewty
    @skewty วันที่ผ่านมา

    If new squashroot is different size does newfw.bin not have either leftover data or truncated data? Would a more complete newfw.bin not require two calls to dd with new count for the 1st and offset for 2nd?

  • @theowenmccarthy
    @theowenmccarthy วันที่ผ่านมา

    This is a really awesome video, I would definitely love to see more of the process, like how you go about reversing the binaries you found or analyzing traffic as the device is being used

  • @Nexxxeh
    @Nexxxeh วันที่ผ่านมา

    Really interesting stuff, brilliantly presented. Thanks!

  • @josesosa1017
    @josesosa1017 วันที่ผ่านมา

    yoooo droppin str8 heat!!

  • @AxelC2020
    @AxelC2020 วันที่ผ่านมา

    There's a "PEM private key" file. Is it encrypted and does it correspond to any of those PEM Certificates?

  • @thinkright
    @thinkright วันที่ผ่านมา

    I love this channel! I've been into computers since DOS (that ages me), never attempted firmware mods like this but was heavily into decompiling and programming software as a hobby. I appreciate your simple explaining of not only procedures but why you are doing them. Keep it up and your channel will skyrocket!

  • @randallsalyer
    @randallsalyer วันที่ผ่านมา

    As always great video

  • @zapjunkie
    @zapjunkie วันที่ผ่านมา

    This was awesome. I love learning how to manipulate binary files. That's something I never got that deep into. Seeing these tools in action and having a reference to go back to is making me want to do more experimenting. Thank you!

  • @GetfitStoreOfficial
    @GetfitStoreOfficial วันที่ผ่านมา

    can you do a firmware modification on a mikrotik device. they have a custom openwrt somehow look and work more stable

  • @goldmanjoe
    @goldmanjoe วันที่ผ่านมา

    Been watching your vids since you started and they've all been very informational but the quality and format have become excellent. Thank you !

  • @MrZeblood
    @MrZeblood วันที่ผ่านมา

    Nice video ! Quick question, in case you don't have a chip reader (or the ability to unsolder the memory chip), if you can anyway get a shell easily at boot, how would you extract files from that UART connection ? In this example /bin/cloud-iot. Thx

    • @mattbrwn
      @mattbrwn วันที่ผ่านมา

      Ohh that's a good question! If there are any utilities that can transfer files (curl, netcat, etc) you can use them to exfil files off the running device. This is a good video idea

    • @MrZeblood
      @MrZeblood วันที่ผ่านมา

      ​@@mattbrwn Yup, I suppose sometimes you even need to transfer such utilities from your host to the target device. AFAIC, file transfer over netcat is always syntactically painful

  • @firex5250
    @firex5250 วันที่ผ่านมา

    FYI: it looks like binwalk v3 has already been pushed to the arch repos, so unless you need your special fork you should be able to use the rust version with the main binary. It looks like you incidentally used v3 in the new binary without noticing when you ran the extract. Wonderful video as always.

    • @mattbrwn
      @mattbrwn วันที่ผ่านมา

      Yep! I just have the old one installed also so I can compare findings. I already made one commit to the rust version and needed to see the delta with the old tool.

  • @biguelferdinand8569
    @biguelferdinand8569 วันที่ผ่านมา

    You explain the whole process of working with hardware in a very understandable way, its not too caught up in details. The way you walk people through it makes it so easy to understand the basics of working with hardware which for me atleast was the most intimidating part. Since watching the channel I've been able to do a chip off firmware extraction, get a uart shell with my flipperzero as a bridge and locate a vulnerability in a router. It might not sound like a lot if you're watching this guy's videos but this is from someone with zero hardware experience or formal education. Big ups to Matt for being an excellent teacher🙏

    • @mattbrwn
      @mattbrwn วันที่ผ่านมา

      This is awesome to hear!! 🫶

  • @Gwaboo
    @Gwaboo วันที่ผ่านมา

    really enjoyed the video, live that you explained every step of the way there great job! would love a vid where you explain a more general approach or one where you just explain where you find out what works and what wont work for certain chips or where you find you information

  • @thehoff9230
    @thehoff9230 วันที่ผ่านมา

    Nice video, Noob question, is it necessary to desolder the chip for reading / flashing? I've seen these clip-on soic cables.

    • @Spudz76
      @Spudz76 วันที่ผ่านมา

      I prefer to try that first, "usually" it works fine, however sometimes injecting power to the flash chip pins will make the CPU or other chips "wake up" and then that can get in the way because then multiple things will be barking commands at the flash chip. Sometimes you can get the CPU to hang using tactics similar to the bootloader glitch like ground some of its address lines so it hangs trying to hit RAM or such (or some SoC chips have a reset pin which will hold the CPU in reset, which is better than glitching it), and then it will leave the flash DI/DO pins alone (floating) so the programmer (CH341 or similar) can use them without interference.

  • @xephael3485
    @xephael3485 วันที่ผ่านมา

    IOT = idiotic obtuse trash

  • @danielkukua1708
    @danielkukua1708 2 วันที่ผ่านมา

    Why are you not connecting the tx and rx to the test points on the pcb that are nearby the chip (4 round ones) ??

    • @Spudz76
      @Spudz76 วันที่ผ่านมา

      Some devices don't have those, and showing how to do this regardless of specific device or board layout is more useful. Of course hunting around for test pads that end up at the SoC pins is always an "extra credit" option.

  • @curtchauvin5303
    @curtchauvin5303 2 วันที่ผ่านมา

    TY well done video! I'd be interested in seeing where those custom binaries call out /bin/cloud-iot etc... what , if any, data is shared out with the tplink servers .

  • @danpedersen55
    @danpedersen55 2 วันที่ผ่านมา

    Great video, as always 👍 You could have used the break out Pads instead of the pins, not as fiddly😉

  • @Jeff-ss6qt
    @Jeff-ss6qt 2 วันที่ผ่านมา

    Are your start and stop bits for UART set correctly?

  • @troedsangberg
    @troedsangberg 2 วันที่ผ่านมา

    Isn't that a 3V flash chip? Minipro claims it's using 5V. Usually not something that'll kill the chip right away though, and maybe just a beta version artefact. (I ran 3.3V myself to a 1.8V flash recently and it survived so ..)

  • @foobar9761
    @foobar9761 2 วันที่ผ่านมา

    yay for open source! good vid too ;-)

  • @krisiasty
    @krisiasty 2 วันที่ผ่านมา

    I saw telnet daemon listening on loopback interface (127.0.0.1), so you could also run it on all interfaces and access shell remotely instead of using UART. I wonder if there is any form of ssh server available there which could be used instead of telnet.

    • @Spudz76
      @Spudz76 วันที่ผ่านมา

      Many times there is no space, even for something light like dropbear. Gotta have room for their custom bloatware cloud apps. :)

  • @richleyden6839
    @richleyden6839 2 วันที่ผ่านมา

    PCbite probes are new to me. Thanks for mentioning them. I previously tried a pogo pin array which I got to work but the pin spacing was never quite right.

  • @g-root
    @g-root 2 วันที่ผ่านมา

    good informative content , thank you !

  • @coolirc
    @coolirc 2 วันที่ผ่านมา

    Awesome job thanks for the tips shared in the video nice job