From 5794c43e6a31b17756a7af64a93bcbc717c517f9 Mon Sep 17 00:00:00 2001 From: l_zenina Date: Fri, 20 Sep 2024 19:14:30 +0200 Subject: [PATCH] little fix --- README.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 20983fb..1e528e2 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,10 @@ # balccon_txt +Welcome to the Hardware quest! There are three levels of difficulty in it, but foe all of the tasks the main idea is to fine a password that unlocks the board. To do it, you need to dump the firmware from the board and than reverse engineer it. + ## Dump firmware -You can use `OpenOCD` to dump firmware from STM32F103 mcu: +You can use `OpenOCD` to dump the firmware from STM32F103 mcu: ```bash openocd -f interface/stlink.cfg -f target/stm32f1x.cfg -c init -c "reset halt" -c "flash read_bank 0 firmware_gold.bin 0 0x10000" -c "reset" -c shutdown @@ -10,7 +12,7 @@ openocd -f interface/stlink.cfg -f target/stm32f1x.cfg -c init -c "reset halt" - ## Ghidra -1. You need to load bynary file to ghidra systems: +1. The following command may be used to dump the firmware from the board with the Ghidra software: - Press `I` and add `firmware_gold.bin` - Choose `ARM-Cortex-32-little` @@ -18,4 +20,5 @@ openocd -f interface/stlink.cfg -f target/stm32f1x.cfg -c init -c "reset halt" - ![](2024-09-20_15-52.png) -- Analyze -> YES, select ALL options, press Apply and finaly press Analyze. \ No newline at end of file +- Analyze -> YES, select ALL options, press Apply and finaly press Analyze. +