X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2Fgoodfet.glitch;h=823b8de85c41d0223f6d923192569e7a4cee8208;hp=aee0d490bd96c46f89cc70ec5a48035c31b3a51a;hb=8ae30e6291cb4a6d67833eaa3ac23f9081f3e99a;hpb=ede679b09a09781692fe15a4b3ca76e965378d91 diff --git a/client/goodfet.glitch b/client/goodfet.glitch index aee0d49..823b8de 100755 --- a/client/goodfet.glitch +++ b/client/goodfet.glitch @@ -27,7 +27,8 @@ sequence for a new chip is as follows. On a sample chip for the same model as the target, 1) Run 'goodfet $chip learn' in order to learn the glitching voltages. -2) Run 'goodfet $chip explore' to find a time at which to glitch. +2) Run 'goodfet $chip crunch' in order to precompute glitching ranges. +3) Run 'goodfet $chip explore' to find a time at which to glitch. Then on a chip to be extracted, 3) Run 'goodfet $chip exploit' to exploit a chip and recover its firmware.""" @@ -41,6 +42,10 @@ if(sys.argv[2]=="graph"): glitcher.graph(); exit(); +if(sys.argv[2]=="crunch"): + glitcher.crunch(); + exit(); + glitcher.setup(sys.argv[1]); if(sys.argv[2]=="learn"):