Prodigiously commented linker script by Thea Flowers.
Original file: https://github.com/theacodes/Winterbloom_Castor_and_Pollux/blob/master/firmware/scripts/samd21g18a.ld
I got problems installing Matlab R2022a on Arch. Running the installer throws the following error: | |
``` | |
terminate called after throwing an instance of 'std::runtime_error' | |
what(): Failed to launch web window with error: Unable to launch the MATLABWindow application. The exit code was: 127 | |
fish: Job 1, 'sudo ./install' terminated by signal SIGABRT (Abort) | |
``` | |
I fixed it by running the following commands. |
Prodigiously commented linker script by Thea Flowers.
Original file: https://github.com/theacodes/Winterbloom_Castor_and_Pollux/blob/master/firmware/scripts/samd21g18a.ld
The badge of the Syscan 2015 conference included an ARM-based STM32F030R8 processor running some challenges. Although SWD pins are accessible on the badge, some have noted that the STM32 is readout-protected, meaning that it will refuse to dump its flash memory.
Fortunately, two researchers (Johannes Obermaier and Stefan Tatschner) recently published a paper at the WOOT '17 conference, in which they reveal a vulnerability allowing to bypass the readout protection. Their technique allows to dump the flash one DWORD at a time, rebooting the CPU between each access.
I implemented this attack using a BusPirate and the PySWD module. Here is a quick'n dirty PoC to
! Molokai theme | |
*xterm*background: #101010 | |
*xterm*foreground: #d0d0d0 | |
*xterm*cursorColor: #d0d0d0 | |
*xterm*color0: #101010 | |
*xterm*color1: #960050 | |
*xterm*color2: #66aa11 | |
*xterm*color3: #c47f2c | |
*xterm*color4: #30309b | |
*xterm*color5: #7e40a5 |