4160b firmware hack




















This isn't the first time homebrew code has been executable on the PS4. A previous console exploit released publicly in March worked on consoles running firmware up to version 7. This week's exploit release, by contrast, works up to firmware version 9. Users with a fully updated PS4 won't be able to make use of the exploit, which was already patched out in PS4 firmware version 9.

In fact, the hackers suggest on GitHub that examining the differences between those two most recent firmware versions helped them figure out how to get the full exploit working. The young age of that latest firmware patch, though, means fresh-from-retail PS4 consoles purchased today may still have the older version 9.

That could be important for homebrew fans because there's currently no known way to downgrade a PS4 to an earlier firmware version to make use of patched exploits. Alright, was just a joke about caturday. I will not assume that you have any previous experience with hardware.

The Sricam IP camera has a number of vulnerabilities that make it an ideal device for learning IoT exploitation. Note that the same steps we are about to follow would apply to almost any other device. The first step is to open the device. Then, with your shiny new screwdriver kit in hand or the one screwdriver you found in your garage open the device and examine the different chips on the board.

This is what the IP camera looks like when opened up:. Device firmware lives in flash memory chips, which often have eight pins connecting it to the board. They are also relatively small. With those clues alone, we know that the flash memory chip must be the one on the bottom side of the picture above. After some quick Googling, we determine that the chip with part number labeled MX25LF is the flash chip containing the firmware for the device. SPI is nothing more than a protocol for communications in an embedded system.

SPI allows for fast, synchronous, serial communications between different components on a board, and each pin serves a different purpose for SPI communications. You can learn a lot about SPI and how it works here. The next step is to figure out what each pin on the chip does. Since we have identified the component number for the firmware chip, we can search for the datasheet for the chip online linked above. On page 7, we see a diagram for the chip. We want to look for the following pins so that we can connect to the chip and dump the firmware:.

Alright, now the question is: how do we know which pin is which in our device? Well, see that dot on the top left corner of the chip diagram? Look for that same dot on the chip to identify pin 1. In the previous picture, you can see the dot in the top-left corner. To dump the firmware, we need a microcontroller that can communicate with SPI chips. We have a few options, including:. To make our job more comfortable, we can use a SOIC Small Outline Integrated Circuit clip to make the connections from the flash chip to our microcontroller.

A SOIC clip looks like this:. The way you use a SOIC clip is relatively simple: look for the red cable to identify the end that should make contact with pin 1 of the SPI chip. We then hook jumper cables on the other end of the SOIC clip according to the pin numbering we determined above. Each cable, in turn, is connected to our microcontroller using the following SPI configuration:. First some background information on the mul instruction itself. The result is stored over a span of two registers because it has the potential to be considerably larger than the previous value, possibly exceeding the capacity of a single register this is also how floating points are stored in some cases, as an interesting sidenote.

So, now comes the ever-important question. How can we use these attributes to our advantage when writing shellcode? Well, let's think for a second, the instruction takes only one operand, therefore, since it is a very common instruction, it will generate only two bytes in our final shellcode.

Let's put on our mathematician hats for a second, and consider this, what is the only possible result of a multiplication by 0? The answer, as you may have guessed, is 0. Using this technique we can zero out three registers in only three bytes, whereas by any other method that I know of it would have taken at least six. Again, we will require the mathematical side of our brains to figure out how we can take advantage of this instruction. Most syscalls that are used in shellcoding will return -1 on failure or a positive value of some kind, only rarely will they return 0 though it does occur.

It just so happens that the syscall that corresponds to the value 1 is exit. However, there is a catch, what if a syscall does return 0? Some people say that exit's are not important in shellcode, because your code gets executed regardless of whether or not it exits cleanly. They are right too, if you really need to save 3 bytes to fit your shellcode in somewhere, the exit isn't worth keeping.

However, when your code does finish, it will try to execute whatever was after your last instruction, which will most likely produce a SIG ILL illegal instruction which is a rather odd error, and will be logged by the system. So, an exit simply adds an extra layer of stealth to your exploit, so that even if it fails or you can't wipe all the logs, at least this part of your presence will be clear. Unlocking the power of leal The leal instruction is an often neglected instruction in shellcode, even though it is quite useful.

Consider this short piece of shellcode. This occurs because the leal instruction loads a variable of the type long into it's desitination operand. In it's normal usage, this would load the address of a variable into a register, thus creating a pointer of sorts. However, in a real shellcode you may already have to 0 out a register like ecx or any other register , so the xorl instruction in the leal shellcode isn't counted.

Conclusion I hope you all learned something, and will go out and apply your knowledge to create smaller and better shellcodes. Since the introduction of double layer DVD writers, the interest has been quite overwhelming and is why we keep bringing you reviews of these highly popular drives.

The anticipation has now turned into down right obsession and it has become a key component in any current or new system build, thanks to the declining prices and continued media hype.

Manufacturers are quite aware of the fascination and is why they have each been releasing their own products which excel in at least one area of the testing methodology used in most reviews. This has led to some confusion as to which drive is best suited for the individuals needs.

Today, we compare four 16x double layer drives and highlight both the strong and weak points in order to give you a better idea of which drive is best suited for you. We will cover everything from design and features to performance and price.

Let's begin with a quick look at each of these drives. However, for those who are looking for a headphone jack, the Lite-On drive is the only DL writer offering a headphone jack, as well as volume control.

The Pioneer and NEC drives, in my opinion, are the ugliest drives, with a very plain look that just wants to make you hide the drive period. Although we only obtained the B in black, all these drives are offered with both white and black bezels.

If you opt for the more expensive Pioneer "XL" model, it has the most impressive looks of any drive in the market. However, this will come at a very hefty price tag, considering they contain different firmware as well that offer a few extra features.

So, we have determined which is the sexiest-looking drive, but what about performance? I've done some extensive testing on each model to determine which is indeed the most impressive of the bunch. But before we show you performance results, let's briefly look at the features and what they have to offer.

Features Each one of these drives has there disappointments when it comes to features. Let's compare each to see what they really offer. So if you are one who only prefers this format, the NEC or Pioneer would be the best choice. All of these drives support writing to DVD re-writable media at 4x. Pioneer and NEC seem to be the only manufacturers to jump in and release second generation double layer drives supporting much faster 4x writing.

In fact, the jump from 2. In fact, it is what has made these drives the most popular DVD writers on the market. I personally don't see the point in offering only read capabilities, but it's at least one extra feature added to distinguish it from the rest. With their support for 48x writing, they make a great all-in-one drive for many users. The only drive lacking in this lineup is the Pioneer DVR Why they opted for only 32x writing is still quite puzzling and is actually why I have found that many are choosing the NEC over the Pioneer.

We will show you later that the difference in write times between 40x and 48x is not much to brag about. Bitsetting Support One feature I've found that is most important for many users is bitsetting support.

Let's compare these drives and see what they offer. However, it is very likely that you will be able to obtain support through an excellent third-party tool called DVDInfo Pro.

Right now, they only support the GSAB, but I'm confident with the author that support for this drive will be likely. LG firmware is very hard to hack, however some select few have been able to do so. Additional Features As far as other features go, all these drives have a 2MB buffer but offer some sort of buffer under-run protection, which all work exceptionally well.

This is especially useful if you will be burning discs at 16x, which I personally don't recommend just yet. As our individual tests of these drives revealed, burning at this speed is quite unstable, with the exception of the Lite-On SOHWs.

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats. Windows Me, , and XP users can configure automatic updates.

Click on the Automatic Updates tab in the System control panel and choose the appropriate options. Install a personal firewall. Both SyGate and ZoneAlarm offer free versions. Install a free spyware blocker. SpyBot is also paranoid and ruthless in hunting out tracking cookies. Block pop-up spam messages in Windows NT, , or XP by disabling the Windows Messenger service this is unrelated to the instant messaging program.

Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol.

A decent example would be f8izKro l. This will make it much harder for anyone to gain access to your accounts. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities. Buy antivirus software and keep it up to date. And doublecheck your AV with the free, online-only scanners available at Panda Software and Trendmicro.

For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue. Join a respectable e-mail security list, such as the one found at Security Supersite , so that you learn about emerging threats quickly and can take proper precautions.

Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support.

If you do this you will lose any unsaved information in all open applications. Anyone who uses Mcft Windows will be familiar with this.



0コメント

  • 1000 / 1000