Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
drewmerc Offline

Posts: 3,901
Threads: 19
Joined: Oct 2008
Reputation: 157
******new discord chat link*******
27-07-2013, 02:18 AM
Website Find Reply
dragonlord7791 Away
Senior Member

Posts: 108
Threads: 3
Joined: Apr 2012
Reputation: 7
RE: video-blackbox-jtag-reverse-engineering
Love and dedication.... no matter if anything does not come yet .. soon the sun will rise again
29-07-2013, 02:12 PM
Find Reply
slave Offline
Haxorware Enthusiast

Posts: 48
Threads: 2
Joined: Mar 2013
Reputation: 8
RE: video-blackbox-jtag-reverse-engineering
this kind of technics i know for about 3 years ago and was tested success on hd sattelite receiver
there is a test-mode supervisor implemented on new d3 jtag host
this isnt new security and also isnt good security
firmware bootloader disable the jtag host itself after boot so by using default poke/peek commands you cannot manipulate on flash also ram
to open access you need to use services scripts which allow you to pool the modem to the test mode after you can bypass and open connection
i do not know the test-mode commands for d3 modems i just know them for sat receivers also as i say this is poor low-level old security
in new secure devices jtag is keyed.... you need to enter a password being on test mode which allow you to use jtag properly
password is generated by some algo and its addicted by cpu seriall
29-07-2013, 03:24 PM
Find Reply

Forum Jump:

Users browsing this thread: 1 Guest(s)