Hardware Reverse-Engineering: Difference between revisions

From YobiWiki
Jump to navigation Jump to search
Content deleted Content added
mNo edit summary
mNo edit summary
 
(4 intermediate revisions by the same user not shown)
Line 15: Line 15:
* [https://github.com/blacksphere/blackmagic/wiki Black Magic Probe] in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
* [https://github.com/blacksphere/blackmagic/wiki Black Magic Probe] in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
** [http://hydrabus.com/2016/04/19/hydrabus-jtagswd-native-debugger-supported-officially-in-blackmagic-github/ HydraBus JTAG/SWD native debugger supported officially in blackmagic github]
** [http://hydrabus.com/2016/04/19/hydrabus-jtagswd-native-debugger-supported-officially-in-blackmagic-github/ HydraBus JTAG/SWD native debugger supported officially in blackmagic github]
=Firmware extraction=
=EEPROM extraction=
* Demystifying Hardware Security [https://www.optiv.com/blog/demystifying-hardware-security-part-i Part I], [https://www.optiv.com/blog/demystifying-hardware-security-part-ii Part II], [https://www.optiv.com/blog/demystifying-hardware-security-part-iii Part III]
* Practical Reverse Engineering (Huawei HG533 router)
** [http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/ Part I Hunting for Debug Ports]
** [http://jcjc-dev.com/2016/04/29/reversing-huawei-router-2-scouting-firmware/ Part II Scouting the Firmware]
** [http://jcjc-dev.com/2016/05/23/reversing-huawei-3-sniffing/ Part III Following the Data]
** [http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/ Part IV Dumping the Flash]

=Firmware extraction, glitch way=
=Firmware extraction, glitch way=
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer
=After firmware extraction=
* Reversing and Exploiting Embedded Devices: The Software Stack [https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack Part I]
=SCA/FI=
=SCA/FI=
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer]
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer]
** [https://wiki.newae.com/Main_Page wiki] & tutos
** [https://wiki.newae.com/Main_Page wiki] & tutos

=Don't's=
* https://www.reddit.com/r/funny/comments/49dayl/shortly_after_these_stock_photos_were_taken_all/

=Shopping=
* http://pcbshopper.com/

Latest revision as of 08:21, 13 October 2016

Some resources...

JTAG

tutos/posts

projects

EEPROM extraction

Firmware extraction, glitch way

After firmware extraction

  • Reversing and Exploiting Embedded Devices: The Software Stack Part I

SCA/FI

Don't's

Shopping