Fujifilm Custom Firmware, USB Code Execution

Channel:
Subscribers:
547
Published on ● Video Link: https://www.youtube.com/watch?v=aIswNirEsD4



Duration: 0:20
510 views
8


Milestone for Fujihack project:
After some 50 million crashes, firmware updates, and many ARM assembly debugging sessions, I can now run whatever I want, from USB.

After finding picture related function that I coult inject custom
code into, I (via memory search) found some text that PTP get_device_info returns, and a memcpy function that seems to be used everywhere in the code.

I then hijacked the memcpy function and devised a syncing mechanism that sent memory bytes into the string I found, so I could grab it accurately via USB.

Once I got a few megabytes, I was able to locate the PTP code in RAM and hijacked it with my own code.

Source code: https://github.com/petabyt/fujifilm







Tags:
pufflegamerz
peta
petabyte
petabyte studios
brikbusters
gaming
programming
coding
kerbal
astronomy
physics
astro
beamng
drive
minecraft
roblox
software
development
daniel
code
corescript
html
html5
css
javascript
space
program
windows
95
xp
terraria
programmer
film
movie
timelapse
video
canon
rebel
cinematic
photo
photography
hacked
firmware
custom
hijack
magic lantern
hack
fuji
fujifilm
fujix
x100s
hacks
fujifilm custom firmware
fujifilm hacked firmware
fujifilm hack firmware
free
diy