Difference between revisions of "Hardware Reverse-Engineering"

From YobiWiki
Jump to navigation Jump to search
m
m
Line 17: Line 17:
 
=EEPROM extraction=
 
=EEPROM extraction=
 
* Demystifying Hardware Security [https://www.optiv.com/blog/demystifying-hardware-security-part-i Part I], [https://www.optiv.com/blog/demystifying-hardware-security-part-ii Part II], [https://www.optiv.com/blog/demystifying-hardware-security-part-iii Part III]
 
* Demystifying Hardware Security [https://www.optiv.com/blog/demystifying-hardware-security-part-i Part I], [https://www.optiv.com/blog/demystifying-hardware-security-part-ii Part II], [https://www.optiv.com/blog/demystifying-hardware-security-part-iii Part III]
  +
* Practical Reverse Engineering (Huawei HG533 router)
  +
** [http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/ Part I Hunting for Debug Ports]
  +
** [http://jcjc-dev.com/2016/04/29/reversing-huawei-router-2-scouting-firmware/ Part II Scouting the Firmware]
  +
** [http://jcjc-dev.com/2016/05/23/reversing-huawei-3-sniffing/ Part III Following the Data]
  +
** [http://jcjc-dev.com/2016/06/08/reversing-huawei-4-dumping-flash/ Part IV Dumping the Flash]
  +
 
=Firmware extraction, glitch way=
 
=Firmware extraction, glitch way=
 
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer
 
* [https://www.youtube.com/watch?v=TeCQatNcF20 scanlime:015 / Glitchy Descriptor Firmware Grab] (video) using chipwhisperer
  +
=After firmware extraction=
  +
* Reversing and Exploiting Embedded Devices: The Software Stack [https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack Part I]
 
=SCA/FI=
 
=SCA/FI=
 
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer]
 
* [https://newae.com/tools/chipwhisperer/ ChipWhisperer]

Revision as of 12:49, 5 October 2016

Some resources...

JTAG

tutos/posts

projects

EEPROM extraction

Firmware extraction, glitch way

After firmware extraction

  • Reversing and Exploiting Embedded Devices: The Software Stack Part I

SCA/FI