Talk:NAND Memory Layout: Difference between revisions

From Hackspire
Jump to navigation Jump to search
(New page: I'm quite sure that the NOR flash contains the bootloader and the unknown part of NAND flash contains the kernel image, ie, the operating system itself. I have to find a way to dump memory...)
 
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
I'm quite sure that the NOR flash contains the bootloader and the unknown part of NAND flash contains the kernel image, ie, the operating system itself. I have to find a way to dump memory contents. --[[User:Squalyl|squalyl]] 11:43, 7 August 2007 (CEST)
I'm quite sure that the NOR flash contains the bootloader and the unknown part of NAND flash contains the kernel image, ie, the operating system itself. I have to find a way to dump memory contents. Silly thought, but some CPus have the ability to run encrypted software, using a decryption key to get real opcodes in real time. It's not impossible that the encrypted rom image, then decrypted and re-encrypted with a random key, different for each device. In this case, the key may be stored in the NOR flash. I'm now concentrating on how to get an image of this mem. --[[User:Squalyl|squalyl]] 11:43, 7 August 2007 (CEST)

Latest revision as of 09:03, 26 January 2014

I'm quite sure that the NOR flash contains the bootloader and the unknown part of NAND flash contains the kernel image, ie, the operating system itself. I have to find a way to dump memory contents. Silly thought, but some CPus have the ability to run encrypted software, using a decryption key to get real opcodes in real time. It's not impossible that the encrypted rom image, then decrypted and re-encrypted with a random key, different for each device. In this case, the key may be stored in the NOR flash. I'm now concentrating on how to get an image of this mem. --squalyl 11:43, 7 August 2007 (CEST)