3/31/2024 0 Comments Xtractor tool![]() ![]() An open-source bootloader was used to program the device via USB. “Version 1.31 comes with improvements like a boot button and additional labels three years after the initial hardware version. ![]() ![]() SEC Xtractor was developed in C, the JTAG brute forcing component was based on the project JTAGenum and the Xmega Bootloader was used. This means that different tools for different flash chips are needed and that every new part must be implemented.” reads the post published by the company. The problem remains that they cannot read every chip. Only commercial tools (that are expensive) can read memory in that way. This can be frustrating for those who do not want to solder SMD. “Most projects concluded without any solution since the chips couldn’t be inserted without soldering. SEC Xtractor could be used to dump the content of NAND, NOR, SPI and I2C flash memory without the need for soldering chip. The experts decided to develop the tool for the test of embedded devices (hardware and firmware) because many other tools available on the market did not completely respond to their needs. The SEC Xtractor tool was initially used as a memory extraction and UART (Universal Asynchronous Receiver/Transmitter) interface project. Both, the firmware and hardware of the tools are completely open-source, this means that researchers can extend their functionalities according to their needs. The tool relies on an easy to use and configurable memory reading concept that supports multiple ways to read flash chips (e.g. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |