Today I got a CH341A Pro chip programmer. For getting used to it, I extracted the content of a winbond flash chip. It is used for a drones optical flow sensor.
To see whats in the extraced binary file, I used binwalk.
This is the output:
I tried to extract the contents with
binwalk -e winbond.Bin -C but that didn’t extract anything.
So I went with dd. This command should extract third item. The first items seems to be exif data? The second some tif image and the 4th and 5th should also be some jpegs.
dd if=winbond.Bin skip=298973 of=image3.jpg bs=1 count=132792
This is what the 3rd jpeg looks like. Nothing much to see.
Some nice videos about that the topic of binwalking binaries is the Engineering Mans take of “Simple Firmware Reverse Engineering”.