#01 - Identifying Components - Hardware Hacking Tutorial

Make Me Hack
10 Mar 202016:53

Summary

TLDRLa première épisode de la série 'Rocking Tutorial' se concentre sur la collecte d'informations pour comprendre le dispositif, l'identité du fabricant et le concepteur original. Le présentateur, Volatilité, partage des techniques pour ouvrir l'appareil et identifier les composants clés, notamment le système sur puce et la mémoire flash. Il explore les ressources en ligne, y compris les manuels, les sites de la communauté et les documents du FCC, pour extraire des informations précieuses sur le matériel. Ce tutoriel vise à aider les utilisateurs de niveaux débutant et avancé à démystifier le processus d'exploitation et de modification des firmwares.

Takeaways

  • 😀 La série 'Rocking Tutorial' est destinée aux débutants et aux utilisateurs avancés intéressés par le reverse engineering des dispositifs.
  • 🔍 L'objectif est d'analyser les composants d'un dispositif, de construire un environnement d'émulation, de rétro-ingénier les binaires et de modifier le firmware.
  • 🏁 Le premier épisode se concentre sur la phase d'information, qui comprend la compréhension de la fabrication et de l'architecture du dispositif.
  • 🔧 L'exploration commence par l'identification du fabricant, la recherche d'informations sur le matériel et du firmware, et la localisation des interfaces de programmation.
  • 🌐 La recherche en ligne est un outil essentiel pour recueillir des informations sur le dispositif, notamment via les manuels, les sites de la communauté et les bases de données de matériel.
  • 🔑 L'identification du fabricant original et la compréhension des différentes versions ou modèles du dispositif sont cruciales pour la suite du processus.
  • 🛠️ L'ouverture physique du dispositif peut être nécessaire pour identifier les composants internes, bien que cela puisse être difficile ou nécessiter des outils spécifiques.
  • 🔎 Les photos et les schémas internes fournis par des sources en ligne peuvent aider à comprendre la structure et la composition du dispositif.
  • 💾 L'identification des composants clés tels que le système sur puce (SoC), la RAM et les dispositifs de stockage est essentielle pour la suite du reverse engineering.
  • 🔗 Les ressources en ligne telles que les projets GitHub, les sites de la communauté et les bases de données de matériel peuvent fournir des informations précieuses sur le matériel et le firmware.
  • 📝 La prise de notes et la documentation des informations recueillies sont importantes pour planifier les étapes suivantes du processus de rétro-ingénierie.

Q & A

  • Quel est l'objet principal de la série 'Rocking Tutorial'?

    -La série 'Rocking Tutorial' est dédiée à tout ce qui concerne le hacking de dispositifs, offrant des informations pour les débutants et les utilisateurs avancés.

  • Quelle est la première étape de la phase de collecte d'informations?

    -La première étape de la phase de collecte d'informations consiste à comprendre qui fabrique l'appareil et s'il existe un fabricant de conception d'origine.

  • Pourquoi est-il important de déterminer s'il existe un fabricant de conception d'origine (ODM)?

    -Il est important de déterminer s'il existe un fabricant de conception d'origine car parfois une entreprise ne fabrique pas l'appareil mais seulement le commercialise avec sa marque.

  • Quels sont les composants clés que l'on cherche à identifier dans un appareil lors de la phase de collecte d'informations?

    -Les composants clés à identifier sont le système sur puce (SoC), son architecture, la quantité de RAM, la mémoire flash EEPROM, ainsi que d'autres dispositifs intéressants comme les interfaces JTAG et SPI.

  • Quelle est la signification de l'identifiant FCC ID?

    -L'identifiant FCC ID est attribué à chaque appareil vendu aux États-Unis par la Federal Communication Commission (FCC), qui certifie que l'appareil est conforme aux réglementations sur les émissions radio.

  • Quels sont les avantages de consulter le site Tech Info Depot pour la collecte d'informations sur un appareil?

    -Le site Tech Info Depot est un projet communautaire qui fournit de nombreuses informations sur de nombreux appareils, y compris des photos internes et externes, des rapports de tests et des informations sur les composants.

  • Pourquoi est-il préférable d'ouvrir physiquement l'appareil après avoir collecté des informations en ligne?

    -Ouvrir physiquement l'appareil permet de vérifier par soi-même les composants internes et de confirmer ou d'invalider les informations trouvées en ligne, car il se peut que le fabricant ait modifié des éléments internes.

  • Quels sont les défis potentiels lors de l'ouverture d'un appareil?

    -Les défis peuvent inclure l'utilisation de vis spéciales, la présence de scellants, des blindages métalliques difficiles à retirer sans endommager l'appareil, ou même des mesures anti-tampering dans les appareils militaires.

  • Comment peut-on améliorer la lisibilité des numéros de composants sur les circuits intégrés?

    -On peut utiliser de la gomme et de l'alcool pour nettoyer la surface, attendre que la gomme sèche, puis utiliser du craie pour souligner les numéros, et enfin enlever la craie avec de la gomme sans alcool pour rendre les numéros plus lisibles.

  • Quelle est la valeur ajoutée de consulter des moteurs de recherche chinois pour la recherche d'informations sur des composants?

    -Les moteurs de recherche chinois comme Baidu peuvent fournir des informations supplémentaires sur des composants chinois non trouvés sur les moteurs de recherche occidentaux, et Google Translate peut aider à comprendre le contenu en chinois.

Outlines

00:00

🔍 Début de la série : Introduction à l'exploration des appareils

Le script introduit la première émission d'une série consacrée à l'exploration des appareils, offrant des informations utiles aux utilisateurs débutants et avancés. L'épisode se concentre sur la phase d'information initiale, qui comprend la compréhension de l'identité du fabricant de l'appareil, la recherche d'un fabricant de conception d'origine, et l'identification des composants clés du système sur puce (SoC), de la RAM et des mémoires flash EEPROM. L'objectif est d'extraire le firmware et le système de fichiers racines de l'appareil. Le présentateur se présente comme un passionné d'électronique numérique et de technologies de l'information, prêt à partager ses outils et techniques.

05:00

🔎 Recherche d'informations sur l'appareil et analyse des résultats

Le script décrit les étapes de recherche d'informations sur l'appareil via Internet, y compris la consultation du manuel de l'utilisateur et la découverte du fabricant original. Les résultats de recherche incluent la consultation du site Web de la Commission fédérale des communications (FCC) pour obtenir des informations sur le système sur puce, les composants flash et EEPROM. Le script mentionne également l'utilisation de ressources telles que le site OpenWRT et le projet GitHub personnel du présentateur pour trouver des informations détaillées sur l'appareil. L'importance de la recherche d'informations sur les appareils est soulignée pour faciliter le processus d'exploration.

10:02

🛠 Ouverture de l'appareil et identification des composants internes

Le script explique comment ouvrir physiquement l'appareil pour examiner et identifier les composants internes, y compris le système sur puce, la RAM et les mémoires flash. Il aborde les défis liés à l'ouverture des appareils, tels que l'utilisation de vis spéciales ou de glue, et les mesures de sécurité telles que les circuits anti-tampering. Les techniques pour améliorer la lisibilité des numéros de composants et l'utilisation d'outils tels que des loupes et des lampes poussent également être discutées. Le script met en évidence l'importance de la visualisation directe des composants pour confirmer les informations trouvées en ligne et pour avancer dans le processus d'exploration de l'appareil.

15:03

📡 Identification des composants et conclusion de la première émission

Le script conclut en identifiant les composants clés de la carte mère, tels que le système sur puce MT76x180 basé sur un CPU MIPS dual-core, la RAM de 128 mégaoctets et un composant logique discret inhabituel. Il souligne la différence entre les informations trouvées en ligne et celles observées sur la carte mère physique, ce qui peut indiquer des changements dans la conception de l'appareil. Le script invite les spectateurs à s'abonner, à partager la vidéo et à donner leur avis, soulignant l'importance des suggestions pour améliorer la série.

Mindmap

Keywords

💡Information Gathering

Information gathering est le premier pas dans le processus de reverse-ingénierie décrit dans la vidéo. Il consiste à collecter des données sur l'appareil, comme le fabricant, le modèle et les composants clés. Dans le script, cela est illustré par la recherche en ligne et l'examen du matériel pour identifier le système sur puce et d'autres composants, ce qui est crucial pour comprendre la structure et le fonctionnement de l'appareil.

💡Hardware

Le matériel fait référence aux composants physiques d'un appareil, comme les circuits intégrés et les interfaces. Dans le script, l'identification du matériel est une étape clé de la collecte d'informations, où l'on cherche à déterminer les composants internes comme le système sur puce et la mémoire flash, qui sont essentiels pour la suite du processus de reverse-ingénierie.

💡Software

Le logiciel fait référence aux programmes et aux instructions qui permettent à un appareil de fonctionner. Dans le contexte de la vidéo, le logiciel est un élément important à examiner pendant la phase de collecte d'informations, car il peut inclure des informations sur le firmware et les interfaces utilisateur qui sont nécessaires pour comprendre et modifier le comportement de l'appareil.

💡Emulation Environment

Un environnement d'émulation est un système qui simule le comportement d'un autre système. Dans le script, la création d'un environnement d'émulation est mentionnée comme une étape pour exécuter des binaires et analyser comment l'appareil fonctionne, ce qui est essentiel pour la reverse-ingénierie sans risquer de endommager l'appareil réel.

💡Reverse-Engineering

La reverse-ingénierie est le processus d'analyse d'un système existant pour comprendre son fonctionnement et potentiellement le modifier. Le script décrit la reverse-ingénierie comme un objectif final de la série, où l'on utilise les informations collectées pour comprendre et éventuellement modifier le firmware de l'appareil.

💡Firmware

Le firmware est un type de logiciel qui est écrit de manière permanente dans la mémoire d'un appareil. Dans le script, l'extraction du firmware est une étape importante, car il contient des informations sur le fonctionnement de l'appareil et peut être modifié pour changer son comportement.

💡Root Filesystem

Le système de fichiers racine est l'ensemble des fichiers de base d'un système d'exploitation. Dans le contexte de la vidéo, l'extraction du système de fichiers racine est une étape clé pour accéder aux fichiers et aux configurations de base de l'appareil, ce qui permet une analyse approfondie et des modifications.

💡JTAG Interface

L'interface JTAG est utilisée pour le test et la programmation de circuits intégrés. Dans le script, la recherche de l'interface JTAG est mentionnée comme une étape importante pour accéder aux composants internes de l'appareil, ce qui peut être utile pour la modification du firmware ou la réalisation de mesures électriques.

💡Serial Number

Le numéro de série est un identifiant unique attribué à chaque appareil. Dans le script, l'analyse du numéro de série est utilisée pour déterminer des informations sur la production de l'appareil, ce qui peut être utile pour la recherche de données supplémentaires ou la génération de mots de passe par défaut.

💡FCC ID

L'ID FCC est un identifiant attribué par la Federal Communications Commission aux appareils qui sont conformes aux régulations sur les émissions radio. Dans le script, l'identification de l'ID FCC est utilisée pour trouver des informations sur le fabricant et les spécifications techniques de l'appareil, ce qui aide dans la collecte d'informations.

Highlights

Introduction to the series dedicated to hacking tutorials for both beginners and advanced users.

Explanation of the hard working process based on information gathering, emulation environment building, and reverse-engineering.

Emphasis on understanding the manufacturer and the original design manufacturer of the device.

The importance of identifying the system on a chip, RAM, and flash EEPROM of the device.

Locating word interfaces such as JTAG for further device analysis.

The goal of extracting firmware and the root filesystem from the device.

Introduction of the presenter's background and expertise in digital electronics and IT infrastructure.

The methodology of starting with the easiest path first in the information gathering phase.

The process of searching for device information on the internet, including user manuals and FCC IDs.

Utilizing community-driven projects like techinfo.de for device information.

The value of FCC documentation for understanding device components and compliance.

Identifying the system-on-a-chip and other components from FCC reports.

Exploring openwrt.org for hardware information and router firmware.

The necessity of opening the device to verify components, despite potential challenges.

Techniques for improving the readability of integrated circuit part numbers.

The discovery of a MIPS CPU-based system-on-a-chip and other components on the motherboard.

The use of a 74HC164 logic component as a reference point for voltage measurements.

Confirmation of NAND flash device size and other findings from internet research.

Encouragement for viewers to subscribe, share, and give feedback for the tutorial series.

Transcripts

play00:00

this is the first episode of the series

play00:01

are rocking tutorial that is dedicated

play00:05

to everything about our rocking kisses

play00:07

for beginners but also advanced users

play00:09

will find something useful on this

play00:12

series the hard working process is

play00:14

described based on information gathering

play00:18

of hardware and software building an

play00:21

emulation environment where to run

play00:23

interesting binaries of our device and

play00:25

eventually reverse-engineer them then

play00:28

analyzing how the device works and then

play00:32

at the end acting the device and

play00:34

eventually modifying is firmer it is the

play00:38

first episode we will talk about the

play00:40

first steps of information gathering the

play00:42

information gathering phase is based on

play00:46

understanding who makes the device if

play00:48

there is an original design manufacturer

play00:51

because sometimes a company brands a

play00:53

device or manufacturing device but

play00:56

another company have designed the device

play00:59

and development is firmer then we start

play01:03

opening the device and trying to

play01:05

identify is main device components we

play01:08

are mainly interested in the system on a

play01:10

chip and is architecture on amount of

play01:13

RAM and the flash EEPROM but also to

play01:16

understand if there are some other

play01:18

interesting devices then we won't locate

play01:21

the word interface in the JTAG interface

play01:24

and ezra step information gathering

play01:27

phase we want to get the firmer out of

play01:30

the device and extract is the root

play01:33

filesystem in this first episode we will

play01:35

talk about the first steps of

play01:37

information gathering up to identifying

play01:40

device components I am a volatility on

play01:44

petrol I have a background in digital

play01:46

electronics and information technology

play01:48

infrastructure and I wish to be your

play01:50

friendly Italian acha neighbor willing

play01:52

to share with you tools and techniques

play01:54

but about our tracking that I learned by

play01:58

myself acting many devices so let's

play02:01

start

play02:06

this router is the main device that we

play02:08

will use during it is a tutorial series

play02:11

the first step in information gathering

play02:14

phase is to understand what kind of

play02:16

device we have and is manufacture and

play02:20

also to understand if there is an

play02:22

original design manufacturer because

play02:23

sometimes a company manufacturing device

play02:27

but another company ever designed it and

play02:30

develop it is firmer this router is

play02:33

distributed in Italy by Lincoln Lincoln

play02:35

is the biggest Italian internet service

play02:39

provider because the wireless internet

play02:41

service provider according to this label

play02:46

it seems that this router has been

play02:48

manufactured by Lincoln but Lincoln is

play02:50

the name of the SP so this means that it

play02:53

is only branded it not manufactured it

play02:57

the manufacturer is someone else looking

play03:00

at the label this device we are not able

play03:02

to understand who is the original design

play03:04

manufacturer of the device anyway we can

play03:07

see that on the label do we have the

play03:08

model name of the device the SSID of the

play03:12

router the Wi-Fi default password the

play03:16

LAN

play03:16

MAC address or Ethernet MAC address and

play03:19

the serial number of the device looking

play03:22

at the manual we can understand that the

play03:25

serial number starts with the string gmk

play03:28

and then we have six digit for the data

play03:31

of production 2g digits for the year two

play03:34

digits for the month and two digits for

play03:37

today of production then we have a 6

play03:40

digit sequential number later we will

play03:43

see that knowing this information is

play03:45

very important to up the device and to

play03:50

be able to generate the default Wi-Fi

play03:53

password of the device in T's acting

play03:57

tutorial we are we will always follow

play03:59

the easiest part first

play04:02

methodology this means that every time

play04:04

we will always start with the easiest

play04:07

path first so to get more information

play04:10

about this device the first step the

play04:13

easiest step is to search information on

play04:16

Internet

play04:17

so we will search information on

play04:19

internet aunties device and we will

play04:22

understand that this device has been

play04:25

manufactured by Assad a suit Korean

play04:27

company called gemtech they chased many

play04:30

production site in Asian countries the

play04:35

first step in the information gathering

play04:36

phase is to look for our device on

play04:39

Google because we are interested to know

play04:42

as much as possible about our device we

play04:45

can see that one of the first result is

play04:48

the user manual and we also know that

play04:50

the company that has produced our device

play04:53

is Gentek we look at the user manual but

play04:56

maybe there isn't there is the

play04:58

information that we are looking for

play05:00

because we are mainly interested in the

play05:01

system monetary pressure from a flash

play05:03

rom that is on our device so we return

play05:08

back and we look at other search results

play05:11

on Google one of these search results is

play05:15

very interesting it is the search result

play05:18

that the website tech info deport gives

play05:21

us this is a website really interesting

play05:24

with the lot of information on many many

play05:26

devices it is a community driving

play05:29

project so we don't have official

play05:30

information and on some device we have

play05:32

more information some other device we

play05:34

have a less information in this case we

play05:36

have a link to a product page but this

play05:39

is an empty link pointing to an internet

play05:42

service provider that is no more

play05:44

information about this product that

play05:47

maybe it is shipping in the past but we

play05:50

have some other very useful information

play05:52

like the FSS CC ID this is the ID given

play05:56

to each device that is sold in the

play06:01

United States FCC stands for Federal

play06:04

Communication Commission and gives

play06:07

approval to each device that they it is

play06:10

compliant with radio emission regular

play06:14

regulations so in this case we can click

play06:18

on related link and we go to the FCC

play06:21

website where the manufacturer has

play06:24

provided some information about

play06:29

device if we look at the information

play06:32

available we can find some interesting

play06:35

information for example we can see the

play06:39

external photos of the device the ID

play06:42

label of the device in this case this is

play06:45

not our ID label it is a device

play06:49

manufactured for another internet

play06:51

service provider and we can see that in

play06:53

this label there is the FCC ID and we

play06:58

also have other information the FSC see

play07:02

ID you can see that is not available on

play07:04

my own device because my own device is

play07:07

sold in Italy where there is no

play07:10

obligation for the FSC see radio

play07:13

emission compliance we can see that we

play07:18

also have other information like for

play07:20

example internal photos that can be very

play07:22

useful to understand how the device is

play07:26

manufactured what kind of component it

play07:29

has onboard and so on but maybe pictures

play07:31

are not big enough to read the marking

play07:34

of each device component we also have

play07:36

some other documentation like test

play07:39

reports of radio emission tests and so

play07:43

on but if we look at a detect tech

play07:47

report website we can find some other

play07:49

interesting information like for example

play07:51

the name of the system-on-a-chip

play07:54

in this case it is a magnetic chip we

play07:57

can also see the name and amount on all

play08:02

the flesh EPROM chip and the name and

play08:06

amount on of of the ROM chip this is

play08:10

really interesting information in our

play08:14

initial stage of information gathering

play08:17

in the links of interest we can also see

play08:20

a pointer to a github project but this

play08:24

is my own github project where I did a

play08:27

reverse engineering of T's router so it

play08:30

was not available when I started

play08:33

searching for this device anyway in this

play08:36

case there is a lot of information that

play08:39

I put on my github repository

play08:42

about this device another source of

play08:46

information is open wrt website which is

play08:49

a site dedicated to open source router

play08:53

firmer open wrt but there is a database

play08:56

of many many router with information on

play08:59

hardware available to the router in this

play09:01

case there is no information on our

play09:04

device but anyway it is it is one other

play09:09

side to search for at the beginning for

play09:12

example if we search for another router

play09:14

that an old router that I am it is DG 8

play09:19

3 4G before we can see that we are able

play09:24

to find a lot a lot of information the

play09:27

system on a chip how to install the open

play09:30

wrt software on this device and also

play09:33

many other information including the

play09:36

position layout of the fresh Abram the

play09:39

position of the word interface and the

play09:42

position of the JTAG interface and

play09:44

including also pictures of the route of

play09:47

the router pictures of is mainboard

play09:51

and exact position of word interface and

play09:53

the JTAG interface so this website

play09:58

especially if we are doing some are

play10:02

tracking on a router this is for sure a

play10:04

website to track we got a lot of

play10:08

information about this router on the

play10:10

internet but the information that we got

play10:13

was related to the same part number but

play10:16

distributed but by different internet

play10:18

service provider with a different label

play10:20

format so probably it is a different

play10:24

fair more and it is also possible that

play10:27

the manufacturer have changed something

play10:29

inside the router likely

play10:31

system-on-a-chip their arm or the their

play10:34

prompt so it is better to open the

play10:36

device and to check by ourselves the

play10:38

components that are inside device so we

play10:44

open the device usually it is easy to

play10:47

open device of these sides sometimes

play10:50

this kind of device can air

play10:52

some special screw so we can need some

play10:54

special screwdriver but in different

play10:58

devices like for example smartphones

play11:00

smartwatches digital cameras and other

play11:04

very small device it can be very very

play11:07

difficult to open them sometimes we are

play11:10

able to find tutorials on internet on

play11:12

how to open a specific device and other

play11:15

times we have to find the solution by

play11:18

ourselves and can be really difficult on

play11:21

some industrial-grade there isis it is

play11:25

also possible that we have some

play11:28

countermeasure to prevent the opening of

play11:30

the device like for example using glue

play11:33

instead of screw using glue but to keep

play11:36

the shells together and inside the

play11:39

device on some military-grade device we

play11:43

can also have anti tampering circuitry

play11:46

that will wipe out the content of the

play11:48

air from if we open the device anyway i

play11:51

have put a link below that will better

play11:55

explain how to deal with this kind of

play11:57

devices now that we open the device we

play12:01

need to unscrew the motherboard from the

play12:05

device and we can see that sometimes we

play12:08

have it sinks that we able to remove to

play12:11

look below them and to understand what

play12:13

kind of components we have below

play12:15

sometime it's easy sometimes can be more

play12:18

difficult we can also have metal shield

play12:22

use it to shield the radio frequencies

play12:24

in this case often it is more difficult

play12:27

to remove sometimes it is impossible to

play12:30

remove without damaging the port if we

play12:33

have multiple boards there are no

play12:35

problem we can destroy one board at once

play12:37

and what's below the metal shield and it

play12:40

sings otherwise if we have only one

play12:43

board we can not destroy it so in this

play12:46

case we will move forward without

play12:49

identifying the device because our

play12:51

principle is always to follow this path

play12:54

first so if an information is difficult

play12:57

to get anyway we will move forward and

play13:00

we will return back only if absolutely

play13:03

needed

play13:04

we can look at the values integrated

play13:07

circuits on this motherboard but we can

play13:10

see that often it is difficult to read

play13:12

the part number on top of these

play13:15

integrated circuits in this case we can

play13:18

try to improve the readability of the

play13:20

part number using a cotton and Howell to

play13:24

clean up the surface of this part number

play13:26

then wait for the article to dry out and

play13:30

then use a chalk over these integrated

play13:33

circuits then use a cotton again without

play13:36

our code to remove the chalk and then

play13:40

after not too strongly and then after

play13:42

this it is usually easier to read the

play13:45

part number we can also use a magnifying

play13:48

glass or a magnifying lamp with the LED

play13:51

light to read the part number on top of

play13:56

these integrated circuits now that we

play13:59

have been able to read the part number

play14:02

on top of the integrated circuits we can

play14:04

search on the internet and usually we

play14:06

are able to find a lot of information

play14:08

including the datasheet of this part of

play14:11

these part numbers but in some cases

play14:14

especially on some unusual Chinese

play14:16

devices it is possible that we will find

play14:19

nothing on the Internet in this case can

play14:21

be useful to search on a Chinese search

play14:25

engine light for example Baidu and maybe

play14:28

only the search engine we will find

play14:30

something in Chinese obviously but we

play14:32

can use Google Translate to understand

play14:34

at least what kind of device we have but

play14:37

in our case on our motherboard there is

play14:39

a normal device that we are able to find

play14:43

a lot of information on the Internet the

play14:45

system-on-a-chip

play14:46

is a magnetic mt7 six to 180 chip it is

play14:53

a chip based on a MIPS CPU dual-core cpu

play14:58

running at eight hundred eight megahertz

play15:02

the RAM is a Wimble chip it is a 128

play15:07

megabyte Ram chip it is different of it

play15:12

is different compared to what we found

play15:15

on the tech deport website but then

play15:18

it is the same science we also have an

play15:21

unusual discrete logic component it is a

play15:23

74 hc1 64 usual we don't have this

play15:27

handle component on this motherboard but

play15:30

in this case it can be useful for us

play15:32

because it easy on to the chip to

play15:35

identify VCC a ground and this can be

play15:37

used as a reference point when we need

play15:40

to take some voltage measurements on the

play15:43

motherboard

play15:44

we also are able to identify the NAND

play15:48

flash device that it is a 128 megabytes

play15:52

NAND flash device and tis confirm what

play15:55

we found on the tech deport web beside

play15:58

when when we searched this information

play16:00

on the internet if you found this video

play16:03

interesting please subscribe help this

play16:06

channel grow share this video with your

play16:08

friends interested in hard watching and

play16:11

don't forget to click the subscribe

play16:14

button below and the notification Bay to

play16:17

be notified when new episodes will be

play16:19

released and not forget to click the

play16:22

apps the thumbs up icon and please give

play16:27

me feedback on the comments below but

play16:30

positive and negative I will appreciate

play16:32

any type of feedback or feedback

play16:35

especially suggestions and also if you

play16:39

have enjoyed this video or also if you

play16:42

don't don't like it this video but

play16:45

especially suggestions are really really

play16:47

welcome thank you for watching see you

play16:50

again on this channel

Rate This

5.0 / 5 (0 votes)

Related Tags
Rétro-ingénierieTutorielsSécuritéMatérielLogicielsEmulationAnalyseModificationTechnologieSécurité informatique
Do you need a summary in English?