Difference between revisions of "Hardware Reverse-Engineering"
Jump to navigation
Jump to search
m |
|||
Line 33: | Line 33: | ||
=Don't's= |
=Don't's= |
||
* https://www.reddit.com/r/funny/comments/49dayl/shortly_after_these_stock_photos_were_taken_all/ |
* https://www.reddit.com/r/funny/comments/49dayl/shortly_after_these_stock_photos_were_taken_all/ |
||
+ | |||
+ | =Shopping= |
||
+ | * http://pcbshopper.com/ |
Latest revision as of 09:21, 13 October 2016
Some resources...
JTAG
tutos/posts
- JTAG Explained (finally!): Why "IoT", Software Security Engineers, and Manufacturers Should Care
- ZooBaB page with several JTAG-related projects
projects
- Tjtag-arduino Use the arduino as a JTAG adaptor with Tjtag
- Arduiggler Arduino based JTAG cable with UrJTAG
- JTAGduino The JTAGduino project has the goal of using Arduino as a JTAG interface
- FUJI Free USB JTAG interface
- JTAGenum (Arduino-based) scans pins for basic JTAG functionality and can be used to enumerate the IR for undocumented opcodes
- JTAGulator open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device
- jtag-finder mirror
- Black Magic Probe in-application debugging tool using a JTAG or Serial Wire Debugging (SWD) port. Targets ARM Cortex-M and Cortex-A based microcontrollers.
EEPROM extraction
- Demystifying Hardware Security Part I, Part II, Part III
- Practical Reverse Engineering (Huawei HG533 router)
Firmware extraction, glitch way
- scanlime:015 / Glitchy Descriptor Firmware Grab (video) using chipwhisperer
After firmware extraction
- Reversing and Exploiting Embedded Devices: The Software Stack Part I
SCA/FI
- ChipWhisperer
- wiki & tutos