Difference between revisions of "Hardware Reverse-Engineering"

From YobiWiki
Jump to navigation Jump to search
m
Line 13: Line 13:
 
* [http://www.grandideastudio.com/jtagulator/ JTAGulator] open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
 
* [http://www.grandideastudio.com/jtagulator/ JTAGulator] open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
 
* [http://www.zoobab.com/jtag-finder jtag-finder] mirror
 
* [http://www.zoobab.com/jtag-finder jtag-finder] mirror
  +
* [https://github.com/blacksphere/blackmagic/wiki Black Magic Probe] in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
 
=Firmware extraction=
 
=Firmware extraction=
 
=Firmware extraction, glitch way=
 
=Firmware extraction, glitch way=

Revision as of 13:38, 5 October 2016

Some resources...

JTAG

tutos/posts

projects

  • Tjtag-arduino Use the arduino as a JTAG adaptor with Tjtag
  • Arduiggler Arduino based JTAG cable with UrJTAG
  • JTAGduino The JTAGduino project has the goal of using Arduino as a JTAG interface
  • FUJI Free USB JTAG interface
  • JTAGenum (Arduino-based) scans pins for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes
  • JTAGulator open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
  • jtag-finder mirror
  • Black Magic Probe in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.

Firmware extraction

Firmware extraction, glitch way

SCA/FI