Switch to full style
In-depth technology research: finding new ways to recover data, accessing firmware, writing programs, reading bits off the platter, recovering data from dust.

Forum rules

Please do not post questions about data recovery cases here (use this forum instead). This forum is for topics on finding new ways to recover data. Accessing firmware, writing programs, reading bits off the platter, recovering data from dust...
Post a reply

Re: SSD firmware hacking.

February 27th, 2018, 11:50

You have to either sign the firmware correctly and then send it into the SSD with hdparm or Samsung Magician. Or you can upload it with JTAG.

Re: SSD firmware hacking.

February 27th, 2018, 19:05

here I have a samsung firmware update software , the modle almost same,but it for a fixed DELL model number(s) MZ7LM120HCFD00D3, who can modifiy it for all MZ7LM120HCFD00XX SSD?
software Download link is https://downloads.dell.com/FOLDER037232 ... 38_A00.EXE

Re: SSD firmware hacking.

February 28th, 2018, 4:17

ISTM that the firmware payload file is "RI_PM863_GA38.fwh". This file appears to be a 1MiB firmware image preceded by an 0x200 byte header. I would guess that you could strip the header and then download the 1MiB image with hdparm. The results may be catastrophic, though. Your choice ...

Re: SSD firmware hacking.

February 28th, 2018, 5:52

yes ,the file has a header, maybe not 0x200 byte ,only 0x1B0 byte for header

Re: SSD firmware hacking.

February 28th, 2018, 9:32

The whole 1MiB file has to be decrypted and sent to the SSD (the Samsung tools are doing both decryption and sending). If you only send the rest, not the first 200 bytes, the signature check on the firmware inside the SSD will prevent loading broken firmware.
The Samsung tools also check whether the firmware actually fits the SSD. If you use hdparm instead of the Samsung tools, this check is circumvented and you have to make sure that it is compatible yourself.

Re: SSD firmware hacking.

February 28th, 2018, 14:29

sourcerer wrote:The whole 1MiB file has to be decrypted and sent to the SSD (the Samsung tools are doing both decryption and sending). If you only send the rest, not the first 200 bytes, the signature check on the firmware inside the SSD will prevent loading broken firmware.

The file does not appear to be encrypted, nor are they Samsung's tools, AFAICT.

Re: SSD firmware hacking.

September 23rd, 2018, 13:28

Spildit wrote:Thanks for sharing !
Nice !

I am created a account in hdd oracle with the name gautam.dotcom. But it not accepting password. Please help.

Re: SSD firmware hacking.

September 30th, 2018, 10:18

gautam.dotcom wrote:
Spildit wrote:Thanks for sharing !
Nice !

I am created a account in hdd oracle with the name gautam.dotcom. But it not accepting password. Please help.


Off topic. This thread is about SSD firmware hacking ....

At any rate i can't see any user on my forum with the mentioned name. Please do register again.

1.jpg

Re: SSD firmware hacking.

October 12th, 2018, 2:41

Hi

and what about the SandForce nightmare? :?
Post a reply