In reply to
vicash
@vicash@fosstodon.org
Aerospace Engineer, # Perl # Cplusplus # C # x86 , compilers, # cryptography lover, vi, # HPC with MPI, # VR , reverse engineer, internet enthusiast, software-defined radio # SDR , # cars . GPG Fingerprint: 5A37 4516 7680 C169 E294 73B9 4FB1 8EBE CE2F 852B
fosstodon.org
vicash
@vicash@fosstodon.org
Aerospace Engineer, # Perl # Cplusplus # C # x86 , compilers, # cryptography lover, vi, # HPC with MPI, # VR , reverse engineer, internet enthusiast, software-defined radio # SDR , # cars . GPG Fingerprint: 5A37 4516 7680 C169 E294 73B9 4FB1 8EBE CE2F 852B
fosstodon.org
@vicash@fosstodon.org
·
1d ago
@codemonkeymike is there a way in your experience to extract the hash of the firmware password from the chip via SPI bus or similar ? Then run hashcat on it. It’s excessive for sure, but maybe a solution can be devised somehow. Extract some hash or firmware and find an exploit or something and find a working solution eventually. In the end the chip is an oracle and something is verifying the firmware password which has to be stored in memory.
View full thread on fosstodon.org
0
0
0
Loading comments...