Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Uber eyes B2B logistics push in India through state-backed open commerce network

May 19, 2025

Trump targets ballot barcodes, long a source of misinformation

May 19, 2025

VUZ gets $12M for its immersive video experiences across emerging markets and the U.S.

May 19, 2025
Facebook X (Twitter) Instagram
Trending
  • Uber eyes B2B logistics push in India through state-backed open commerce network
  • Trump targets ballot barcodes, long a source of misinformation
  • VUZ gets $12M for its immersive video experiences across emerging markets and the U.S.
  • Qualcomm to launch data center processors that link to Nvidia chips
  • Crypto elite increasingly worried about their personal safety
  • Grok says it’s ‘skeptical’ about Holocaust death toll, then blames ‘programming error’
  • Heybike’s Alpha step-through e-bike is an affordable, all-terrain dreamboat
  • U.S. lawmakers have concerns about Apple-Alibaba deal
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Monday, May 19
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » Researcher Hacked Embedded Devices To Extract The Firmware

Researcher Hacked Embedded Devices To Extract The Firmware

GTBy GTMarch 16, 2025 Cybersecurity No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Researcher Hacked Embedded Devices To Extract The Firmware

A security researcher known as newp1ayer48 has successfully demonstrated a method to extract firmware from IoT and embedded devices using direct Flash Memory dumps, providing valuable insights for security professionals and bug bounty hunters.

The technique, while potentially risky for the hardware, offers a reliable way to obtain firmware when other methods aren’t viable.

This approach enables researchers to better understand device operations, analyze potential vulnerability vectors, and examine code for security flaws.

Firmware extraction represents a critical first step in IoT and embedded device security research.

While several methods exist, including downloading firmware from official websites, sniffing firmware update packets, and dumping firmware through debugging ports like UART or JTAG, the direct Flash Memory extraction method provides more reliable results in certain scenarios.

The researcher notes that Flash Memory is typically found in IoT devices in an 8-pin form and serves as the primary storage location for firmware.

The process involves using a tool called flashrom to interact directly with the Flash Memory chip.

However, newp1ayer48 cautions that this approach comes with significant risks, as it requires physically removing the chip using heat tools like soldering irons or heat guns, which could potentially damage the hardware.

Chip removal (Source – GitHub)

“It’s somewhat like trying to extract a golden egg by cutting open a goose’s belly, only to kill the goose in the process,” the researcher explains.

Despite these risks, the researcher provides a comprehensive workflow for those who need to pursue this method.

The process involves installing flashrom on a Raspberry Pi (64-bit), removing the Flash Memory chip from the target device, connecting the chip to the Raspberry Pi, and then executing the dump.

Raspberry Pi’s GPIO pins (Source – GitHub)

Required equipment includes a Raspberry Pi, an IC Test Hook Clip (SDK08), a heat gun, and jumper cables with a breadboard.

Technical Implementation

The flashrom installation requires several dependencies and uses meson for proper setup.

The researcher provides the exact commands needed: “sudo apt-get install -y gcc meson ninja-build pkg-config python3-sphinx libcmocka-dev libpci-dev libusb-1.0-0-dev libftdi1-dev libjaylink-dev git clone https://github.com/flashrom/flashrom” followed by meson setup and installation commands.

After installation, the next step involves carefully removing the chip from the device board. This is necessary because attempting to dump the firmware while the chip remains attached often fails due to power-related noise interference.

8-pin Flash Memory chip (Source – GitHub)

The 8-pin Flash Memory chip uses specific pin assignments that must be correctly identified and connected to the Raspberry Pi’s GPIO pins.

The connection process requires understanding each pin’s function: VCC (power supply), GND (ground reference), SCLK (serial clock for synchronization), CS (chip select), DI (data input), DO (data output), WP (write protect), and Hold (chip pause).

Once connected using the IC Test Hook Clip, the extraction begins with commands such as “sudo flashrom -p linux_spi:dev=/dev/spidev0.0,spispeed=2000 -V” to check the connection and identify the chip, followed by “sudo flashrom -p linux_spi:dev=/dev/spidev0.0 -r [filename]” to extract the firmware.

In cases where the chip isn’t supported automatically, researchers can modify the flashchips.c file with information from the chip’s datasheet to add support.

After extraction, the researcher notes that reassembling the device by carefully resoldering the Flash Memory chip can restore full functionality, allowing security professionals to maintain both the extracted firmware and a working device for continued testing.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.



Source link

GT
  • Website

Keep Reading

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure

APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

10 Best IT Asset Management Tools

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Qualcomm to launch data center processors that link to Nvidia chips

May 19, 2025

Grok’s ‘white genocide’ responses show gen AI tampered with ‘at will’

May 17, 2025

Tech IPO market is finally showing signs of life

May 16, 2025

AI travel agents planning future trip far beyond ‘assistant’ status

May 16, 2025
Latest Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

May 15, 2025

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

May 6, 2025

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

May 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.

STEAM Education

At FutureBots, we believe the future belongs to creators, thinkers, and problem-solvers. That’s why we’ve made it our mission to provide high-quality STEM products designed to inspire curiosity, spark innovation, and empower learners of all ages to shape the world through robotics and technology.