Advertisement
Zy0d0x

Untitled

Aug 20th, 2018
277
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.95 KB | None | 0 0
  1. Put Device In DFU Mode (Power Up with DFU Button Down) in a VM may show as a NXP
  2.  
  3. root@kali:~# lsusb
  4. Bus 001 Device 005: ID 1fc9:000c NXP Semiconductors
  5. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  6. Bus 002 Device 002: ID 80ee:0021 VirtualBox USB Tablet
  7. Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  8. root@kali:~#
  9.  
  10. Download Unzip Firmware
  11.  
  12. root@kali:~# wget https://github.com/mossmann/hackrf/releases/download/v2018.01.1/hackrf-2018.01.1.zip
  13. --2018-08-20 13:58:31-- https://github.com/mossmann/hackrf/releases/download/v2018.01.1/hackrf-2018.01.1.zip
  14. Resolving github.com (github.com)... 192.30.253.113, 192.30.253.112
  15. Connecting to github.com (github.com)|192.30.253.113|:443... connected.
  16. HTTP request sent, awaiting response... 302 Found
  17. Location: https://github-production-release-asset-2e65be.s3.amazonaws.com/3681392/504e2a36-0463-11e8-8a81-92c1bfab3bcc?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20180820%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20180820T125832Z&X-Amz-Expires=300&X-Amz-Signature=98ec0abad85c823b48241cd40472a24ba4d4830573a829d15a73773fd459ff69&X-Amz-SignedHeaders=host&actor_id=0&response-content-disposition=attachment%3B%20filename%3Dhackrf-2018.01.1.zip&response-content-type=application%2Foctet-stream [following]
  18. --2018-08-20 13:58:31-- https://github-production-release-asset-2e65be.s3.amazonaws.com/3681392/504e2a36-0463-11e8-8a81-92c1bfab3bcc?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIWNJYAX4CSVEH53A%2F20180820%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20180820T125832Z&X-Amz-Expires=300&X-Amz-Signature=98ec0abad85c823b48241cd40472a24ba4d4830573a829d15a73773fd459ff69&X-Amz-SignedHeaders=host&actor_id=0&response-content-disposition=attachment%3B%20filename%3Dhackrf-2018.01.1.zip&response-content-type=application%2Foctet-stream
  19. Resolving github-production-release-asset-2e65be.s3.amazonaws.com (github-production-release-asset-2e65be.s3.amazonaws.com)... 52.216.104.251
  20. Connecting to github-production-release-asset-2e65be.s3.amazonaws.com (github-production-release-asset-2e65be.s3.amazonaws.com)|52.216.104.251|:443... connected.
  21. HTTP request sent, awaiting response... 200 OK
  22. Length: 17207133 (16M) [application/octet-stream]
  23. Saving to: ‘hackrf-2018.01.1.zip’
  24.  
  25. hackrf-2018.01.1.zip 100%[=====================================================================================================================>] 16.41M 2.37MB/s in 10s
  26.  
  27. 2018-08-20 13:58:42 (1.60 MB/s) - ‘hackrf-2018.01.1.zip’ saved [17207133/17207133]
  28.  
  29.  
  30. root@kali:~# unzip hackrf-2018.01.1.zip
  31. Archive: hackrf-2018.01.1.zip
  32. creating: hackrf-2018.01.1/
  33. creating: hackrf-2018.01.1/firmware-bin/
  34. inflating: hackrf-2018.01.1/firmware-bin/hackrf_cpld_default.xsvf
  35. inflating: hackrf-2018.01.1/firmware-bin/hackrf_jawbreaker_usb.bin
  36. inflating: hackrf-2018.01.1/firmware-bin/hackrf_jawbreaker_usb.dfu
  37. {SNIP}
  38. inflating: hackrf-2018.01.1/Readme.md
  39. inflating: hackrf-2018.01.1/COPYING
  40.  
  41. cd to the location and run DFU flasher
  42.  
  43. root@kali:~/hackrf-2018.01.1# cd firmware-bin/
  44. root@kali:~/hackrf-2018.01.1/firmware-bin# ls
  45. hackrf_cpld_default.xsvf hackrf_jawbreaker_usb.bin hackrf_jawbreaker_usb.dfu hackrf_one_usb.bin hackrf_one_usb.dfu
  46. root@kali:~/hackrf-2018.01.1/firmware-bin# dfu-util --device 1fc9:000c --alt 0 --download hackrf_one_usb.dfu
  47. dfu-util 0.9
  48.  
  49. Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc.
  50. Copyright 2010-2016 Tormod Volden and Stefan Schmidt
  51. This program is Free Software and has ABSOLUTELY NO WARRANTY
  52. Please report bugs to http://sourceforge.net/p/dfu-util/tickets/
  53.  
  54. dfu-util: DFU suffix CRC does not match
  55. dfu-util: A valid DFU suffix will be required in a future dfu-util release!!!
  56. Opening DFU capable USB device...
  57. ID 1fc9:000c
  58. Run-time device DFU version 0100
  59. Claiming USB DFU Interface...
  60. Setting Alternate Setting #0 ...
  61. Determining device status: state = dfuIDLE, status = 0
  62. dfuIDLE, continuing
  63. DFU mode device DFU version 0100
  64. Device returned transfer size 2048
  65. Copying data from PC to DFU device
  66. Download [=========================] 100% 22056 bytes
  67. Download done.
  68. dfu-util: unable to read DFU status after completion
  69.  
  70. Device Will Auto Restart and Should Show in lsusb and OpenMoko
  71.  
  72. root@kali:~/hackrf-2018.01.1/firmware-bin# lsusb
  73. Bus 001 Device 006: ID 1d50:6089 OpenMoko, Inc.
  74. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  75. Bus 002 Device 002: ID 80ee:0021 VirtualBox USB Tablet
  76. Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  77.  
  78.  
  79. If that worked then hackrf_info should work as shown below
  80.  
  81.  
  82. root@kali:~/hackrf-2018.01.1/firmware-bin# hackrf_info
  83. hackrf_info version: unknown
  84. libhackrf version: unknown (0.5)
  85. Found HackRF
  86. Index: 0
  87. Serial number: 0000000000000000909864c8397b6acf
  88. Board ID Number: 2 (HackRF One)
  89. Firmware Version: 2018.01.1 (API:1.02)
  90. Part ID Number: 0xa000cb3c 0x00564f5a
  91. root@kali:~/hackrf-2018.01.1/firmware-bin#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement