Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

34C3 - eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

Автор: media.ccc.de

Загружено: 2018-01-09

Просмотров: 19468

Описание:

https://media.ccc.de/v/34c3-8784-emmc...

A journey on how to fix broken proprietary hardware by gaining code execution on it

How I hacked Sasmung eMMC chips: from an indication that they have a firmware - up until code execution ability on the chip itself, relevant to a countless number of devices. It all started when Samsung Galaxy S3 devices started dying due to a bug in their eMMC firmware. I will cover how I figured out there's a firmware inside the chip, how I obtained it, and my journey to gaining code execution on the chip itself — up until the point in which I could grab a bricked Galaxy S3, and fix it by software-only means.

Few years ago Samsung Galaxy S3 devices started dying all around the world (a phenomenon known as "Galaxy S3 Sudden Death"). The faulty hardware was pinpointed to its eMMC chip (made by Samsung). eMMC are basically SD cards in BGA form soldered to the PCB, but as it apperas - they hide a CPU and a firmware inside.
Samsung eMMC chips support some vendor-specific, undocumented eMMC commands. By doing some guesswork and finding the right sequence of commands I was able to dump the entire RAM (and firmware) of the eMMC chip, which appears to sport an ARM Cortex-M3 chip inside. But how can we know what causes the device to fail?
Samsung has written a Linux patch which patches the eMMC's RAM in order to fix the problem. However, investigating the patch itself reveals that it does nothing more than jumping to an infinite loop when something goes wrong. We needed a more inherent fix. By utilizing Samsung's own vendor-specific commands, we can write the eMMC's RAM in order to achieve code execution, or even write to the eMMC's NAND flash memory directly. We can update its firmware and fix the problem altogether.
However, when a device is bricked, how do we even get to send commands to its soldered eMMC chip by software-only means? I will show a working exploit against Samsung's boot-loader to be able to send commands to the eMMC chip.
Nevertheless, this is not enough. A bricked device usually means that the eMMC is now in an infinite loop and won't accept and eMMC commands. Although it appears to be a dead-end, there's a way: by triggering a power reset on the eMMC chip, there's a time window in which the chip boots itself. There's a way to stop the eMMC chip from loading its own firmware, instead putting itself in some "recovery mode". I was finally able to execute my own code on the faulty chip.
The research not only applies to Galaxy S3 devices (which are obviously old), as it appears to be relevant for new Samsung eMMC chips, even though they have a slightly different firmware, which will be briefly overviewed.

oranav

https://fahrplan.events.ccc.de/congre...

34C3 -  eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Console Hacking

Console Hacking

34C3 -  Are all BSDs created equally?

34C3 - Are all BSDs created equally?

BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or: How I Fixed Long-Dead Galaxy S3 Phones

BlueHat IL 2018 – Oran Avraham - eMMC Hacking, Or: How I Fixed Long-Dead Galaxy S3 Phones

Срочное распоряжение покинуть территорию / Вывод войск

Срочное распоряжение покинуть территорию / Вывод войск

34C3 -  Console Security - Switch

34C3 - Console Security - Switch

Как вытащить разделы из дампа с помощью UFPI

Как вытащить разделы из дампа с помощью UFPI

Контрнаступление ВСУ? Иран отрежет интернет, Кто шпионит в Латвии. Морозов, Шейтельман, Смагин

Контрнаступление ВСУ? Иран отрежет интернет, Кто шпионит в Латвии. Морозов, Шейтельман, Смагин

34C3 -  library operating systems

34C3 - library operating systems

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction

34C3 -  Intel ME: Myths and reality

34C3 - Intel ME: Myths and reality

⚡️ ВСУ внезапно обратились к Путину || Разведка РФ прорвалась в тыл

⚡️ ВСУ внезапно обратились к Путину || Разведка РФ прорвалась в тыл

Прошивка emmc, прошивка телевизора.

Прошивка emmc, прошивка телевизора.

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Reading Silicon: How to Reverse Engineer Integrated Circuits

Reading Silicon: How to Reverse Engineer Integrated Circuits

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

34C3 -  Microarchitectural Attacks on Trusted Execution Environments

34C3 - Microarchitectural Attacks on Trusted Execution Environments

Hack All The Things: 20 Devices in 45 Minutes

Hack All The Things: 20 Devices in 45 Minutes

34C3 -  Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

34C3 - Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com