Table of contents HardBreak - Hardware Hacking Wiki Introduction How to start Methodology Case Study (Led to a CVE Update) General Case Study Hardware Hacking Introduction Basics Tools Hardware Tools Essential Tools Soldering Tools Logic Analyzer Saleae Logic Analyzer Open-Source Tools Bus Pirate GoodFET Multimeters & Oscilloscopes JTAG and SWD Debuggers Segger JLink TI CC-Debugger UART-to-TTL adapter Chip readers and programmers Xgecu T56 Software Tools Binwalk Firmwalker flashrom Ghidra OpenOCD Mitmrouter Common Hardware Components Firmware Extraction Methods Reconnaissance Closed device OSINT (search the web) USB Ports / SD-card Opened device Board Analysis Interface Interaction UART Identify UART Connect to UART Extract Firmware using UART I2C SPI Extract Firmware using SPI JTAG/SWD JTAG Identify JTAG SWD Extract Firmware using JTAG/SWD VE.Direct Bypassing Security Voltage Glitching Example: LPC1768 Electromagnetic Fault Injection Analyze Firmware Network Analysis Introduction Reconnaissance Protocols WIFI WEP Deauthentication Attacks Application Layer Proprietary Protocols Parrot Anafi Drone Reverse Engineering MQTT CoAP Web Sockets Radio Hacking Introduction Reconnaissance Protocols NFC RFID Tools RF Signal Analyzers RTL-SDR HackRF Flipper Zero NFC Sub-GHz Contribute How to contribute Gitbook - Basics Markdown Images & media Interactive blocks About Impressum – Legal Notice Privacy Policy Datenschutzerklärung License