int3.cc

This is a simple terminal trace to show how simple it is to flash the FaceDancer.  First plug the Facedancer into your computer connecting it to the "HOST" side of the FaceDancer21. COMMENTS ARE IN RED.

 

s7s-MacBook-Pro:$ dmesg   //RUN DMESG TO BE SURE THE FTDI DRIVER DETECTED THE DEVICE.

FTDIUSBSerialDriver:        0  4036001 start - ok        // I'D ALREADY INSTALLED THE FTDI DRIVER, YOU MIGHT NEED TO DO THIS FIRST

s7s-MacBook-Pro:$ svn co https://goodfet.svn.sourceforge.net/svnroot/goodfet    //DOWNLOAD THE SOURCE

s7s-MacBook-Pro:$ cd goodfet/trunk/client

s7s-MacBook-Pro:client s7$ sudo make link
Password:
rm -f /usr/local/bin/goodfet.* /usr/local/bin/goodfet
rm -rf *~
mkdir -p /usr/local/bin
ln -s `pwd`/goodfet `pwd`/goodfet.* /usr/local/bin/
s7s-MacBook-Pro:client s7$ board=facedancer21 goodfet.bsl --dumpinfo > info.txt  //RUN THE BSL TOOL WITH "board" ENV VAR SET
MSP430 Bootstrap Loader Version: 1.39-goodfet-8
Use -h for help
Use --fromweb to upgrade a GoodFET.
Transmit default password ...
s7s-MacBook-Pro:client s7$ cat info.txt 
@1000
aa 55 ff 3f cd ab aa 55 34 12 ff ff aa 55 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 8e 85 fe 16 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 08 10 00 80 01 00 6f 80 bc 0b f0 0d 50 80 0b 07 5f 08 fe 08 ff ff ff ff ff ff ff ff 01 08 87 8f 8e 8e 7e 8d d5 86 
q

s7s-MacBook-Pro:client s7$ board=facedancer21 goodfet.bsl --fromweb      //DOWNLOAD THE FIRMWARE IMAGE VIA THE BSL TOOL

MSP430 Bootstrap Loader Version: 1.39-goodfet-8
Use -h for help
Use --fromweb to upgrade a GoodFET.
Mass Erase...
Transmit default password ...
Invoking BSL...
Transmit default password ...
Current bootstrap loader version: 2.13 (Device ID: f26f)

The --fromweb feature is temporarily disabled, pending a rewrite.    
Please grab a copy of the appropriate .hex from
http://goodfet.sf.net/dist/ and flash it like so:

goodfet.bsl -e -p foo.hex     

s7s-MacBook-Pro:client s7$ curl -O http://goodfet.sourceforge.net/dist/facedancer21.hex  //MANUALLY DOWNLOAD OUR FIRMWARE IMAGE 
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 13915 100 13915 0 0 26144 0 --:--:-- --:--:-- --:--:-- 143k
s7s-MacBook-Pro:client s7$ board=facedancer21 goodfet.bsl -e -p facedancer21.hex //FLASH THE FACEDANCER
MSP430 Bootstrap Loader Version: 1.39-goodfet-8
Mass Erase...
Transmit default password ...
Invoking BSL...
Transmit default password ...
Current bootstrap loader version: 2.13 (Device ID: f26f)
Program ...
4932 bytes programmed.
s7s-MacBook-Pro:client s7$ board=facedancer21 goodfet.monitor test     //RUN THE SELF TEST

See the GoodFET FAQ about missing info flash.
Performing monitor self-test.

Self-test complete.         //THIS WILL RUN FOR SEVERAL MINUTES. YOU SHOULD SEE A YELLOW LIGHT FLASHING ON THE DEVICE

s7s-MacBook-Pro:client$   

 

And that's it. During and after the monitor self-test your FaceDancer21 is ready to work and will probably look like this with a solid yellow light:

 

Written by Stephen Ridley — June 26, 2013

Why pricing things is hard...

Many people skip the INT3 "About" page and formulate opinions without understanding what is going on here. Please read that to understand why just because a project is "Open Source hardware" doesn't mean...

Learn to reverse engineer and exploit mobiles, IoT, and Embedded systems. (Public Trainings Announced)

We've announced our public EU and US trainings for 2015. Sign up today!  

Using the Shikra to Attack Embedded Systems: Getting Started

The blog system on this e-commerce platform is awful. This blogpost has been prettified and moved to Xipiter's main blog here:  http://www.xipiter.com/musings/using-the-shikra-to-attack-embedded-systems-getting-started