Hacking Hardware Picofly - a HWFLY switch modchip

Rozetkin

New Member
Newbie
Joined
Feb 16, 2023
Messages
2
Trophies
0
Age
19
XP
12
Country
Russia
Will try to modify flash_send_cmd function then, but yeah you are right since this function is referenced in another function aswell
Good luck! I'm willing to help with this.


I also found the crc8 initialization, and that scares me. In this firmware it is 256 bytes at address 0x200217B0. This table is definitely used for decryption, but frankly I'm too lazy to figure out how exactly it decrypts payload.

I also really need to understand what function on offset 0x10015CF4 does, because it affects decryption and is called three times for every 16 bytes of payload. Also, there is an interesting nested function at offset 0x10015C5C. Only from it you can probably get to the remaining unknown code.
 

hippy dave

BBMB
Member
Joined
Apr 30, 2012
Messages
9,143
Trophies
2
XP
20,164
Country
United Kingdom
I've messed up my account... @IgraBIT1 can you message me again please on this account.
Who can I contact to fix my original account (renoob)? I dont have privilages there to read or post or do anything
Staff should be able to help you with your account - I've reported your post asking them to help 🤞
 

IgraBIT1

Member
Newcomer
Joined
Jan 27, 2023
Messages
15
Trophies
0
Age
23
XP
83
Country
Russia
Инъекция работает на 100%

Итак, я заразился этим:
https://forums.raspberrypi.com/viewtopic.php?t=336409
Парень сделал файл uf2, когда вы его прошиваете, вы получаете результат «Это программное обеспечение для этой платы». Да нормально все работает
Потом сбрасываете эту прошивку, прошиваете на разных пико и бесплатно "программа не для этой платы". Все работает так, как написано здесь, когда я сделал это и прошил свой второй пико, я получил вывод:
[КОД]Добро пожаловать в minicom 2.8

ВАРИАНТЫ: I18n
Порт /dev/ttyACM0, 13:35:20

Нажмите CTRL-A Z, чтобы получить помощь по поручению клавишников.

======= ЭТО ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ БЫЛО УКРАДЕНО =======
Это программное обеспечение не будет работать на этой плате

======= ЭТО ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ БЫЛО УКРАДЕНО =======
Это программное обеспечение не будет работать на этой плате

-------------------------------------------------- -------[/КОД]
Затем я сделал эту инъекцию на этой дампе, так как первый uf2 блокирует прошивку выше по уникальному идентификатору первого пика, я просто ввел идентификатор первого пика в дампе, который выдал ошибку на втором пико... и:

[КОД]Добро пожаловать в minicom 2.8

ВАРИАНТЫ: I18n
Порт /dev/ttyACM0, 13:51:11

Нажмите CTRL-A Z, чтобы получить помощь по поручению клавишников.

Это программное обеспечение для этой платы
Это программное обеспечение для этой платы
Это программное обеспечение для этой платы
[/КОД]
Он успешно работает и не выдает ошибок на втором большем пико. Таким образом, мой вывод таков, что инъекция работает на 100%, так как unique_board из выводов пико-примеры модифицировали одну, и этот вышепример был заблокирован, а теперь разблокирован после инъекции.
....
Так что, возможно, идентификатор, предоставленный пользователем с прошивкой, не подтвержден ИЛИ что-то еще

Большое спасибо, я отправил сообщение супервайзеру. Нашла информацию в разделе персонала.
solved with an account? do you need more files?
 

renoob2

Member
Newcomer
Joined
Feb 16, 2023
Messages
5
Trophies
0
Age
50
XP
7
Country
France
solved with an account? do you need more files?
Not yet solved still waiting. Can you check is the ID you gave correct (E6_61_1C_B7_1F_32_68_29)? That is from your pico?
Also it would be great if you can take a better picture of wiring just we are sure that its properly connected (you cant see much on picture you already posted).
Thank you very much
 
Last edited by renoob2,

IgraBIT1

Member
Newcomer
Joined
Jan 27, 2023
Messages
15
Trophies
0
Age
23
XP
83
Country
Russia
Not yet solved still waiting. Can you check is the ID you gave correct (E6_61_1C_B7_1F_32_68_29)? That is from your pico?
Also it would be great if you can take a better picture of wiring just we are sure that its properly connected (you cant see much on picture you already posted).
Thank you very much
my working pico works fine, in the LAN I will send you additional files and old ones with those that you worked with
Id correct
 

renoob2

Member
Newcomer
Joined
Feb 16, 2023
Messages
5
Trophies
0
Age
50
XP
7
Country
France
Ok thank you!
Post automatically merged:

inspecting agan and there is no other call for flash_cmd_send anywhere, only get_unique_id is referenced 2 times so no need to patch flash_cmd_send function
 
Last edited by renoob2,

Adran_Marit

Walküre's Hacker
Member
Joined
Oct 3, 2015
Messages
3,659
Trophies
1
Location
42*South
XP
4,251
Country
Australia
Good luck! I'm willing to help with this.


I also found the crc8 initialization, and that scares me. In this firmware it is 256 bytes at address 0x200217B0. This table is definitely used for decryption, but frankly I'm too lazy to figure out how exactly it decrypts payload.

I also really need to understand what function on offset 0x10015CF4 does, because it affects decryption and is called three times for every 16 bytes of payload. Also, there is an interesting nested function at offset 0x10015C5C. Only from it you can probably get to the remaining unknown code.
Curious
 

Mansi

Well-Known Member
Newcomer
Joined
Jan 14, 2023
Messages
69
Trophies
0
Age
29
XP
210
Country
Belarus
Wait has anyone tried using the semi unlocked firmware to boot hekate then booted the regular hekate via payload to try to boot HOS
This will not help, because boot0 is patched during glitching. And after rebooting the hekate, nothing will change)
The system will not boot either. Tatfy, if I'm not mistaken, I tried to change boot0 from hwfly and the system did not boot.
Right?
 
  • Like
Reactions: Tafty

Adran_Marit

Walküre's Hacker
Member
Joined
Oct 3, 2015
Messages
3,659
Trophies
1
Location
42*South
XP
4,251
Country
Australia
This will not help, because boot0 is patched during glitching. And after rebooting the hekate, nothing will change)
The system will not boot either. Tatfy, if I'm not mistaken, I tried to change boot0 from hwfly and the system did not boot.
Right?
My understanding is the current fw is clearing the keyslots when it boots into hekate so rebooting into hekate after its already glitched once might work no? And has anyone tried to test that theory of rebooting back to hekate?
 
General chit-chat
Help Users
  • No one is chatting at the moment.
    Skelletonike @ Skelletonike: 1H left, such a slow week.