After extraction, the researcher notes that reassembling the device by carefully resoldering the Flash Memory chip can restore full functionality, allowing security professionals to maintain both the extracted firmware and a working device for continued testing. A security researcher known as newp1ayer48 has successfully demonstrated a method to extract firmware from IoT and embedded devices using direct Flash Memory dumps, providing valuable insights for security professionals and bug bounty hunters. Once connected using the IC Test Hook Clip, the extraction begins with commands such as “sudo flashrom -p linux_spi:dev=/dev/spidev0.0,spispeed=2000 -V” to check the connection and identify the chip, followed by “sudo flashrom -p linux_spi:dev=/dev/spidev0.0 -r [filename]” to extract the firmware. While several methods exist, including downloading firmware from official websites, sniffing firmware update packets, and dumping firmware through debugging ports like UART or JTAG, the direct Flash Memory extraction method provides more reliable results in certain scenarios. The process involves installing flashrom on a Raspberry Pi (64-bit), removing the Flash Memory chip from the target device, connecting the chip to the Raspberry Pi, and then executing the dump. The process involves using a tool called flashrom to interact directly with the Flash Memory chip. The researcher provides the exact commands needed: “sudo apt-get install -y gcc meson ninja-build pkg-config python3-sphinx libcmocka-dev libpci-dev libusb-1.0-0-dev libftdi1-dev libjaylink-dev git clone ; followed by meson setup and installation commands. The researcher notes that Flash Memory is typically found in IoT devices in an 8-pin form and serves as the primary storage location for firmware. The 8-pin Flash Memory chip uses specific pin assignments that must be correctly identified and connected to the Raspberry Pi’s GPIO pins. However, newp1ayer48 cautions that this approach comes with significant risks, as it requires physically removing the chip using heat tools like soldering irons or heat guns, which could potentially damage the hardware. Firmware extraction represents a critical first step in IoT and embedded device security research.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 10 Mar 2025 19:20:06 +0000