TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reverse Engineering a Furby

103 pointsby Moral_over 11 years ago

10 comments

shabbleover 11 years ago
Whilst some impressive hacks (and especially convincing university staff to lend you their Expensive Toys), my understanding is that the really tricky bit is going from die scans to netlist&#x2F;circuit diagram, and thence simulation&#x2F;code extraction.<p>The Visual6502[1] folks are probably the best example of how well it can be done (assuming you can&#x27;t afford to pay ChipWorks or FlyLogic to do it for you), but if you&#x27;re working with a standardish MCU core and some masked ROM, a lower tech solution like the Dangerous Prototypes &quot;rompar&quot;[2] might work.<p>Probably requires quite a few dies, or plenty of experience in extracting them before you succeed though.<p>For actually reverse engineering the flash contents, I think it&#x27;d be easier to sniff the bus traffic as you probe it, or make a read&#x2F;write capable emulator that logs what&#x27;s going on. With the hacked phone-side control library, you could probably build a mostly automated harness to exercise the various settings and see what gets stored in flash.<p>[1] <a href="http://visual6502.org/" rel="nofollow">http:&#x2F;&#x2F;visual6502.org&#x2F;</a><p>[2] <a href="http://adamsblog.aperturelabs.com/2013/01/fun-with-masked-roms.html" rel="nofollow">http:&#x2F;&#x2F;adamsblog.aperturelabs.com&#x2F;2013&#x2F;01&#x2F;fun-with-masked-ro...</a>
评论 #6932919 未加载
drpancakeover 11 years ago
From the Wikipedia article: &quot;Furbies were banned from the National Security Agency of the United States due to concerns that they may be used to record and repeat classified information.&quot;<p><a href="http://en.wikipedia.org/wiki/Furby" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Furby</a>
voltagex_over 11 years ago
I knew I remembered the GeneralPlus name from somewhere -<p>&quot;Many Tamagotchis Were Harmed in the Making of This Presentation&quot;<p>PDF: <a href="http://recon.cx/2013/slides/Recon2013-Natalie%20Silvanovich-Many%20More%20Tamagotchis%20Were%20Harmed%20in%20the%20Making%20of%20this%20Presentation.pdf" rel="nofollow">http:&#x2F;&#x2F;recon.cx&#x2F;2013&#x2F;slides&#x2F;Recon2013-Natalie%20Silvanovich-...</a><p>Video (original? talk): <a href="https://www.youtube.com/watch?v=WOJfUcCOhJ0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=WOJfUcCOhJ0</a><p>Video (newer talk at ReCon): <a href="http://recon.cx/2013/video/Recon2013-Natalie%20Silvanovich-%20Many%20More%20Tamagotchis%20Were%20Harmed%20in%20the%20Making%20of%20this%20Presentation.mp4" rel="nofollow">http:&#x2F;&#x2F;recon.cx&#x2F;2013&#x2F;video&#x2F;Recon2013-Natalie%20Silvanovich-%...</a><p>Natalie Silvanovich did this kind of reversing on a few Tamagotchi products with great success.
tumesover 11 years ago
&quot;A Furby is an evil robotic children’s toy wrapped in colored fur.&quot;<p>If only all technical reviews started this honestly...
rhgraysoniiover 11 years ago
It&#x27;s projects like this that spark me to always go out and try to learn new things. I forget how much of our surrounded world is hackable sometimes, and it really is sad to think I get so caught up I don&#x27;t think of these projects near as often as I used to. Hopefully this guy gets somewhere :) these writeups are inspiring, interesting, and educational all wrapped into one nice little package.
mschuster91over 11 years ago
Are there maybe some JTAG lines exposed on the board?<p>Maybe these could be used for finding out the contents of the mem chip and the CPU used.
评论 #6930102 未加载
agoandanonover 11 years ago
So, remember that virus that communicates using high-pitched sound? If no, here&#x27;s an article:<p><a href="http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;10&#x2F;meet-badbios-the-mys...</a><p>This article says that the Furby communicates in the same way. It would be interesting if the Furby was a vector for spreading messages via this virus. Very, very interesting.
评论 #6930890 未加载
pbhjpbhjover 11 years ago
I&#x27;ve seen something along this line before - but this article is dated for Yesterday.<p><a href="https://github.com/iafan/Hacksby" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;iafan&#x2F;Hacksby</a> found via hnsearch.com but I don&#x27;t think that&#x27;s where I saw the details last time.<p>There&#x27;s this <a href="http://news.ycombinator.com/item?id=4984100" rel="nofollow">http:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=4984100</a> too - about open-source furby-like projects.
zdwover 11 years ago
It would probably be easier to read the chip in-situ with a Bus Pirate and flashrom :<p><a href="http://dangerousprototypes.com/docs/Bus_Pirate" rel="nofollow">http:&#x2F;&#x2F;dangerousprototypes.com&#x2F;docs&#x2F;Bus_Pirate</a><p><a href="http://flashrom.org" rel="nofollow">http:&#x2F;&#x2F;flashrom.org</a><p>I used one of these to reflash the BIOS on a logic board after the utility provided died, without removing the BIOS from the board.
glifchitsover 11 years ago
Just funny to think that its possible that a dev who hacked on that Furby firmware is reading this and said &quot;hey, I wrote that routine!&quot;