Dangerous Prototypes

Dangerous Prototypes => Bus Blaster JTAG debugger => Topic started by: CheezeWiz on April 06, 2011, 07:01:36 pm

Title: Jtag Unknown targets
Post by: CheezeWiz on April 06, 2011, 07:01:36 pm
SO I'm going to go out on a limb here I want to know what the feasibility is of JTAG'ing a device after finding the correct pins and attempting to pull a firmware off it.

When really a lack of any documentation exists.. Lets say... no documentation exists although since the device is apart I can identify the chip.. so Having the bus blaster and also the bus pirate and a logic sniffer.

I'm trying to use the bus blaster to pull firmware off a known device such as the wrt54g once I find instructions for this , I'm hoping I can apply this to something of unknown origin. Personally I don't care about the wrt54g I'm just pointing this out as an example.

Where do I start?


I thought I'd make this a new thread since the other thread I started kinda went all over the place.

( ! ) Fatal error: Uncaught exception 'Elk_Exception' with message 'Please try again. If you come back to this error screen, report the error to an administrator.' in /var/www/dangerousprototypes/forum/sources/database/Db-mysql.class.php on line 696
( ! ) Elk_Exception: Please try again. If you come back to this error screen, report the error to an administrator. in /var/www/dangerousprototypes/forum/sources/database/Db-mysql.class.php on line 696
Call Stack
#TimeMemoryFunctionLocation
10.00882033848session_write_close ( )...(null):0
20.00912165424ElkArte\sources\subs\SessionHandler\DatabaseHandler->write( )...(null):0
30.00912166200Database_MySQL->query( ).../DatabaseHandler.php:119
40.05302304920Database_MySQL->error( ).../Db-mysql.class.php:273