hydrabus / hydrafw

HydraBus HydraFW official firmware for open source multi-tool for anyone interested in learning/developping/debugging/hacking/Penetration Testing for basic or advanced embedded hardware
https://hydrabus.com/hydrabus-1-0-specifications
Apache License 2.0
365 stars 92 forks source link

HydraFW jtag brute scan reboot target device #98

Closed ghecko closed 5 years ago

ghecko commented 5 years ago

With the latest firmware compiled from the Master Branch, the brute bypass & idcode scan reboot the target device.

bvernoux commented 5 years ago

Could you explain why do you closed this issue (I suspect it was not an issue with HydraFW but it will be better to add an explanation) ?

ghecko commented 5 years ago

Yes, when I used brute command on Hydrabus the target device reboot on each try. I can not reproduce this specific issue on another target device; this is why I close the issue.

bvernoux commented 5 years ago

Thanks for the details if you could provide details on the target it could be interesting for other users ...

ghecko commented 5 years ago

Yes, the target is a 4G modem Huawei B525s-23a (processor Hi6932M2GFCV100). If someone find the datasheet I want it !

bvernoux commented 5 years ago

Thanks for the feedback but unfortunately no public doc exist (today) on this CPU/4G Modem especially related to JTAG This issue is closed and you can reopen it if you have a datasheet or you have found a bug in JTAG brute scan