Archive for the ‘reversed’ Category

Reverse engineering the popular 555 timer chip (CMOS version)

Tuesday, April 12th, 2016

Ken Shirriff wrote an article on reverse engineering a 555 timer chip,  He writes: This article explains how the LMC555 timer chip works, from the tiny transistors and resistors on the silicon chip, to the functional units such as comparators and current mirrors that make it work. The popular 555 timer integrated...

Tags: , ,
Posted in reversed | No Comments »

Nevo C2 remote control – Reverse engineering, part 1

Tuesday, March 8th, 2016

Reverse engineering of a Nevo C2 remote control from Most recently I've switched to the "Nevo C2" remotes (also known as "Xsight Color" or "ARRX15G"), which have a graphical display built in. This makes it easy for me to deal with the huge array (TiVo, HTPC, plus eleven game consoles)...

Tags: ,
Posted in reversed | No Comments »

555 timer teardown: Inside the world’s most popular IC

Monday, February 22nd, 2016

Another great teardown article by Ken Shirriff, a look inside the 555 timer chip: Given the popularity of the 555 timer, I thought it would be interesting to find out what's inside the 555 timer and how it works. While the 555 timer is usually sold as a black plastic...

Tags: ,
Posted in reversed, Teardowns | No Comments »

Inside the arm1v – the ALU control logic

Tuesday, February 16th, 2016

Dave writes: This is one of a number of posts on my work on reverse engineering the armv1 processor. The first in the series, and an index of the other articles can be found here. My first post in this series described in some detail a one-bit slice of the...

Tags: ,
Posted in reversed | No Comments »

More ARM1 processor reverse engineering: the priority encoder

Saturday, January 16th, 2016

In a previous post, Ken Shirriff reverse engineered the silicon in the ARM1 processor, this time he reverse-engineer the priority encoder in the ARM1 processor: In this article, I reverse-engineer the priority encoder in the ARM1 processor. By examining the chip layout provided by the Visual ARM1 project, I have...

Tags: ,
Posted in reversed | No Comments »

Counting bits in hardware: Reverse engineering the silicon in the ARM1 processor

Wednesday, January 13th, 2016

Ken Shirriff writes: How can you count bits in hardware? In this article, I reverse-engineer the circuit used by the ARM1 processor to count the number of set bits in a 16-bit field, showing how individual transistors form multiplexers, which are combined into adders, and finally form the bit counter....

Tags: ,
Posted in ARM, reversed | No Comments »

Reverse engineering the ARM1, ancestor of the iPhone’s processor

Monday, January 4th, 2016

Another great article from Ken Shirriff, this time on reverse engineering the ARM1: Almost every smartphone uses a processor based on the ARM1 chip created in 1985. The Visual ARM1 simulator shows what happens inside the ARM1 chip as it runs; the result (below) is fascinating but mysterious.[1] In this...

Tags: ,
Posted in reversed | No Comments »

Reverse engineering the ESP8266 WIFI-to-Serial port adapter

Friday, January 1st, 2016

Here's a video from electronupdate on reverse engineering the ESP8266 WIFI-to-Serial port adapter: Another very interesting bit of technology. The combination of so much functionality into such a small part is a real touch-stone as to where things are heading. A quick look at the antenna design to see if...

Tags: ,
Posted in reversed, wireless | No Comments »

Looking inside a silicon die

Wednesday, December 16th, 2015

electronupdate writes: A very interesting branch of electrical engineering is the reverse engineering and analysis of silicon dies of semiconductors. The tools to play in this field are very specialized and I suspect very expensive. In this video I went for the spend-no-money approach to see how far I could...

Posted in reversed | No Comments »

Understanding silicon circuits: inside the ubiquitous 741 op amp

Friday, October 30th, 2015

Ken Shirriff's writes, "The 741 op amp is one of the most famous and popular ICs with hundreds of millions sold since its invention in 1968 by famous IC designer Dave Fullagar. In this article, I look at the silicon die for the 741, discuss how it works, and explain...

Tags: , ,
Posted in reversed | 1 Comment »

Schlumberger 4002 signal generator

Friday, September 25th, 2015

Mario wrote an article on reverse engineering a Schlumberger 4002 signal generator: What I got was a Schlumberger 4002 signal generator. It ranges from 0.1 to 2160 MHz with 10-20 Hz tuning accuracy, selectable output amplitude from -138.9 dBm up to +13 dBm in 0.1 dB steps, auto-sweeping and several extras like an...

Tags: ,
Posted in reversed | No Comments »

Examining the core memory module inside a vintage IBM 1401 mainframe

Tuesday, September 1st, 2015

Ken Shirriff writes: The IBM 1401 mainframe computer was announced in 1959 and by the mid-1960s had become the best-selling computer, extremely popular with medium and large businesses because of its low cost. A key component of the 1401's success was its 4,000 character core memory, which stored data on...

Tags: ,
Posted in reversed | No Comments »

Sniffing Crazyflie’s radio with HackRF blue

Friday, June 12th, 2015

arnaud acquired a HackRF Blue and has been busy coding up a GNURadio project for analyzing Crazyflie radio transmissions. Crazyflie is a nano quadcopter/drone controlled over a wireless link. The Crazyradio is the official radio dongle for the Crazyflie Nano Quadcopter. It is a 2.4GHz USB radio dongle based on...

Tags: , , ,
Posted in code, reversed, RF, wireless | No Comments »

Reverse engineering a Beseler PM2L Color Analyzer

Tuesday, January 6th, 2015

Kerry Wong wrote an article on reverse engineering a Beseler PM2L Color Analyzer: I recently acquired an old Beseler PM2L color analyzer. This kind of color analyzer was designed to analyze the color or exposure of film negatives at a certain location by comparing the intensity of the filtered light of each...

Tags: , ,
Posted in reversed | No Comments »

Reverse engineering the Panasonic AC infrared protocol

Sunday, December 28th, 2014

The AnalysIR Team hailing from Dublin, Ireland has just published a new article called. "Reverse engineering the Panasonic AC Infrared protocol". If you're into IR hacking with the USB IR Toy, check this out. "AnalysIR is an advanced IR analyzer & decoder that works with Arduinos, Raspberry Pi, USB IR...

Tags: ,
Posted in infrared, reversed, USB IR Toy, wireless | 4 Comments »

Reverse engineering a Verisure wireless alarm

Tuesday, December 9th, 2014

Here's an informative two-part series of posts over at FunOverIP detailing how to reverse engineer a Verisure wireless alarm. Part 1 details the beginning steps such as finding the modules radio frequency and modulation type, analyzing the chipset datasheet and using GNU Radio.

Tags: , ,
Posted in reversed, RF, SDR, security, sensors, wireless | 2 Comments »

Reversing D-Link’s WPS Pin Algorithm

Thursday, November 27th, 2014

Craig of /dev/ttyS0 wrote an article on reversing D-Link’s WPS Pin Algorithm: While perusing the latest firmware for D-Link’s DIR-810L 80211ac router, I found an interesting bit of code in sbin/ncc, a binary which provides back-end services used by many other processes on the device, including the HTTP and UPnP servers I first...

Tags: , ,
Posted in reversed | No Comments »

Video: Hack All The Things – 20 Devices in 45 Minutes

Monday, October 20th, 2014

The GTVHacker group gave this presentation at DEFCON 22. The group is famous for Hacking the Google TV a few years back, and in this talk they add plenty of devices to their credit. "We’ve taken all of our previous experience exploiting embedded devices and used it to bring you...

Tags: ,
Posted in hacks, reversed, Videos | 1 Comment »

Derbycon video: Making BadUSB Work For You

Thursday, October 2nd, 2014

Adam Caudill and Brandon Wilson gave this presentation at the recent Derbycon 2014 conference in Louisville, KY, covering their hack of the Phison 2251-03 USB controller firmware to add new "features" and functionality. They focus on the Patriot Supersonic Xpress 8GB USB drive allowing it to be repurposed for non-standard...

Tags: ,
Posted in hacks, reversed, security, USB, Videos | No Comments »

Reverse engineering wireless pro studio lighting

Wednesday, October 1st, 2014

Richard Webb just finished an article on reverse engineering the wireless protocol used to communicate with some pro studio lighting. His approach involves sniffing the SPI bus into the lighting controller's RF module using the Open Bench Logic Sniffer to obtain preliminary addressing information, then used an nRF24L01+ module in...

Tags: ,
Posted in Arduino, code, Logic Sniffer, reversed, wireless | No Comments »

Next Page »

Recent Comments