Difference between revisions of "Hardware Reverse-Engineering"

From YobiWiki
Jump to navigation Jump to search
m
m
Line 15: Line 15:
 
* [https://github.com/blacksphere/blackmagic/wiki Black Magic Probe] in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
 
* [https://github.com/blacksphere/blackmagic/wiki Black Magic Probe] in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
 
** [http://hydrabus.com/2016/04/19/hydrabus-jtagswd-native-debugger-supported-officially-in-blackmagic-github/ HydraBus JTAG/SWD native debugger supported officially in blackmagic github]
 
** [http://hydrabus.com/2016/04/19/hydrabus-jtagswd-native-debugger-supported-officially-in-blackmagic-github/ HydraBus JTAG/SWD native debugger supported officially in blackmagic github]
=Firmware extraction=
+
=EEPROM extraction=
  +
* Demystifying Hardware Security [https://www.optiv.com/blog/demystifying-hardware-security-part-i Part I], [https://www.optiv.com/blog/demystifying-hardware-security-part-ii Part II], [https://www.optiv.com/blog/demystifying-hardware-security-part-iii Part III]
 
=Firmware extraction, glitch way=
 
=Firmware extraction, glitch way=
 
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer
 
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer

Revision as of 12:42, 5 October 2016

Some resources...

JTAG

tutos/posts

projects

EEPROM extraction

Firmware extraction, glitch way

SCA/FI