Skip to content
Menu
Capotexl
  • Blog
  • All Projects
Capotexl
winbond flash chip content extraction

Extracted winbond chip content

Posted on May 5, 2021May 5, 2021 by Ianmcmill

Today I got a CH341A Pro chip programmer. For getting used to it, I extracted the content of a winbond flash chip. It is used for a drones optical flow sensor.

To see whats in the extraced binary file, I used binwalk.
This is the output:
f

I tried to extract the contents with binwalk -e winbond.Bin -C but that didn’t extract anything.

So I went with dd. This command should extract third item. The first items seems to be exif data? The second some tif image and the 4th and 5th should also be some jpegs.

dd if=winbond.Bin skip=298973 of=image3.jpg bs=1 count=132792

This is what the 3rd jpeg looks like. Nothing much to see.

Some nice videos about that the topic of binwalking binaries is the Engineering Mans take of “Simple Firmware Reverse Engineering”.

Do it! :

  • Reddit
  • Twitter
  • Tumblr
  • Print

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
©2023 Capotexl | Powered by WordPress & Superb Themes

 
Loading Comments...
Comment
    ×