I use the same programmer in my work. It is more reliable to solder the chip. Using a socket is less reliable. I also had such failures. Thanks for your videos.
Thanks for your efforts Matt! Your chip extraction of the echo device has helped me hack an unnamed device's emmc and find user names, emails, and photos. I was really only interested in getting at its operating system but found it kept user data unencrypted. Would also love to see a video where you hacked and read the emmc of a device noninvasively by finding the "hidden" pins on the board itself, ie CLK, CMD, Data, etc. Even if it was an already reported device it would be very educational to see how you do that. I tried to figure that out on my device with an oscillascope and even trace the pins to other pads on the board once i removed the emmc, but only managed to find 3. I know there is an article on how to do it with the OG tall echo device but seems to leave out some critical steps (for my level of experience) as I was reviewing it.
Have you explored any glitch type attacks yet, Matt? Be good to see some content on that if you have. keep up the good work and thanks for your content!
Hey mate im glad i found your channel! I have a question, I can get into my ROUTER's SHELL directly through telnet but i dont get the "root" access cuz i wanna make some changes.. so what do you recommended what should i do about it ? Thanks!
I run xgpro/XGecu using wine. So first step is following wine install instructions for whatever distro you are using. e.g. arch linux wine install: wiki.archlinux.org/title/Wine#Installation Then, you run the XGecu software using the wine or wine64 program. FYI someone has been archiving all the XGecu software on github here: github.com/Kreeblah/XGecu_Software After running the installer, everything will work EXCEPT the usb communication with the T48/T56 device. To get the USB driver working, some people have written an open source windows usb driver for these devices that can be found here: github.com/radiomanV/TL866/tree/master/wine Follow the instructions in that readme file to setup the udev rules and download the setupapi.dll file into the tl866 install folder under wine. I briefly mention this setup in this video: th-cam.com/video/yI7LdGyXsns/w-d-xo.html but I think I'll try to make a complete video on the XGecu setup sometime.
Congrats on the win!
I use the same programmer in my work. It is more reliable to solder the chip. Using a socket is less reliable. I also had such failures. Thanks for your videos.
❤ I am happy to have you back as a follower from Saudi Arabia
Congrats my dude, always nice to see your content!
Failures are just as important to show as success. Especially if you can walk through you thought process of turning a L into a W!
Thanks for your efforts Matt! Your chip extraction of the echo device has helped me hack an unnamed device's emmc and find user names, emails, and photos. I was really only interested in getting at its operating system but found it kept user data unencrypted. Would also love to see a video where you hacked and read the emmc of a device noninvasively by finding the "hidden" pins on the board itself, ie CLK, CMD, Data, etc. Even if it was an already reported device it would be very educational to see how you do that. I tried to figure that out on my device with an oscillascope and even trace the pins to other pads on the board once i removed the emmc, but only managed to find 3. I know there is an article on how to do it with the OG tall echo device but seems to leave out some critical steps (for my level of experience) as I was reviewing it.
I like the video formats where you show the struggles you encounter.
Congrats dude! Glad to have you back!
Welcome back and congrats.
welcome back Matt, nice new space and loved the hack! Crazy about the firmware being overwritten but nice you got the dump first.
Congrats and good to see you back!
glad to see you back! you should consider making a discord in the future, love your content!
Have you explored any glitch type attacks yet, Matt? Be good to see some content on that if you have. keep up the good work and thanks for your content!
Congratulations dude on ur victory
Can you make a Video with the Tools able to get the Firmware dumped?
Hey mate im glad i found your channel! I have a question, I can get into my ROUTER's SHELL directly through telnet but i dont get the "root" access cuz i wanna make some changes.. so what do you recommended what should i do about it ? Thanks!
we love it dawg!
wrt the uboot thing, I believe `printenv` will sometimes show you how those commands are defined; that may help with avoiding that `test`function did
Good idea
Can you please explain how to extract firmware from an ARM cortex m4 ic?😊
Hello Matt i have one Questions hows install xgpro in Linux?
I run xgpro/XGecu using wine. So first step is following wine install instructions for whatever distro you are using.
e.g. arch linux wine install: wiki.archlinux.org/title/Wine#Installation
Then, you run the XGecu software using the wine or wine64 program. FYI someone has been archiving all the XGecu software on github here: github.com/Kreeblah/XGecu_Software
After running the installer, everything will work EXCEPT the usb communication with the T48/T56 device. To get the USB driver working, some people have written an open source windows usb driver for these devices that can be found here: github.com/radiomanV/TL866/tree/master/wine
Follow the instructions in that readme file to setup the udev rules and download the setupapi.dll file into the tl866 install folder under wine.
I briefly mention this setup in this video: th-cam.com/video/yI7LdGyXsns/w-d-xo.html
but I think I'll try to make a complete video on the XGecu setup sometime.
@@mattbrwn Thank you, I was just looking for how to install it. I appreciate it very much. Regards.
I need the contents of a motor controller chip read and I'm willing to pay. Can anyone help me?
Recommend me a course I really want to learn
Yes
I missed you :)
Where is your 🧢
Can you help me with a Huawei modem to extract firmware friend?
Congrats on the win!