Extract Firmware

Information of the SPI flash

Dumping the SPI flash from Linux

Dump the SPI flash by using the linux command line tool dd. Command: dd if=/dev/mtd0 of=mtd0 This will dump the SPI flash to the file mtd0.

Device tree entry for the SPI

This is what the SPI flash device tree entry looks like.

spi@7000da00 {
		status = "okay";
		spi-max-frequency = <25000000>;
		spi-flash@1 {
			compatible = "winbond,w25q32", "jedec,spi-nor";
			reg = <1>;
			spi-max-frequency = <20000000>;
		};
	};

The dump

The first 6128 bytes are the BCT, encrypted with your platform key. The loader for UEFI is located at 0x0100000.

How we can tell

To check it yourself,

To encrypt the BCT you got form nvflash use the following script, and replace <platform key> with your platform key. Example usage: ./encrypt.sh surfacert.bct surfacert-encrypted.bct

To check if it is really the same, create a hexdump of your SPI flash dump and encrypted BCT. Your encrypted BCT should match the first 6128 bytes of the SPI flash dump.

Downloads

A dump from @Leander's Surface RT. Here is the platform key of the used Surface RT: 28a5d126adf421e6a39bfc8f7ff32308

Leanders blob

4MB
Open
SPI-flash-dump
BCT-encrypted
BCT-from-nvflash

CTS blob

Last updated

Was this helpful?