**Introduction** The host introduces himself and explains that he will be attempting to extract firmware from a router using a hot air gun, X gecko programmer, and other tools. **Hot Air Gun Extraction** The host begins by preparing the area around the chip on the board. He applies flux to the chip and uses a hot air gun to heat up the solder holding the chip in place. The host explains that this process is necessary to extract the firmware from the chip without damaging it. **Chip Removal** After heating up the solder, the host uses tweezers to carefully remove the chip from the board. He then cleans the chip with isopropyl alcohol and prepares it for further analysis. **X Gecko Programmer** The host connects the X gecko programmer to his computer and loads the firmware into the programmer. He explains that this tool allows him to read and write data to various types of chips, including the one on the router board. **Firmware Analysis** Once the firmware is loaded into the programmer, the host uses a terminal to analyze the contents of the firmware. He runs various tools, such as binwalk, to extract specific sections of the firmware and examine their contents. **Root File System** The host discovers that the firmware contains a root file system, which he believes may contain information about how to access the UART session on the router. He extracts the root file system using binwalk and begins to analyze its contents. **Enumeration** As the host continues to analyze the firmware, he encounters various files and directories, including shell scripts, init scripts, and configuration files. He explains that these files may contain clues about how to access the UART session or exploit vulnerabilities in the router's software. **Conclusion** The host concludes the live stream by summarizing what was accomplished during the extraction and analysis of the firmware. He notes that further analysis is needed to fully understand the contents of the firmware and identify potential vulnerabilities.
1. Introduction to the project
The host explains that they are trying to extract the firmware from a router and reverse engineer it.
2. Preparation for hot air gun extraction
The host prepares the area around the chip by applying flux and masking tape to prevent damage.
3. Hot air gun extraction
The host uses a hot air gun to heat up the solder on the chip, making it easier to remove.
4. Chip removal
The host successfully removes the chip from the board using the hot air gun and tweezers.
5. Cleaning and preparation for programming
The host cleans the chip with isopropyl alcohol and prepares it for programming using an X gecko programmer.
6. Programming the chip
The host uses Mini Pro software to program the chip, which appears to be a Wind Bond 25 Q64JV.
7. Extracting firmware
The host uses binwalk to extract the firmware from the chip, which reveals a Squash FS file system and various binaries.
8. Enumerating files and directories
The host explores the extracted firmware, looking for interesting files and directories.
- Hot air gun rework station
- X gecko programmer
- Mini Pro software
- Binwalk
- Isopropyl alcohol
- Masking tape
The host also mentions using AliExpress to purchase hardware hacking tools, including the hot air gun re
