Degate reverse engineering tool

Degate is a graphical reverse engineering tool for Ubuntu and OS X. Degates’ purpose is to aid reverse engineering of digital electronics in integrated circuits (ICs). Degate helps you to explore images from ICs. It matches logic gates on the imagery given by graphical templates and it assists you in tracing circuit paths. Degate is […]

Reverse engineering the HRD remote serial protocol

Sivan Toledo likes to use Ham Radio Deluxe (HRD), a free program that serves as a user interface to radio transceivers. Modern transceivers can be controlled either from their front panel controls (if they have a front panel), or from a computer through a serial or USB connection. He writes: One cool and useful feature […]

27C3: Building Custom Disassemblers

FX of Phenoelit recently presented a talk at the 27C3 CCC in Berlin, Germany on the topic of instruction set reverse engineering. Topics include obtaining byte code, analyzing it for basic properties, finding addressing modes, and implementing an IDA Pro processor module. The primary focus is on the transformation of byte code back into mnemonic […]

27C3: File – Print – Electronics

In this presentation from the 27C3 conference held recently in Berlin, Germany, Jeff Gough demonstrates the next step in hardware development, the circuit board printer. As an alternative to dependence on prefab dev boards and kits, Jeff outlines his efforts in reverse engineering an Epson inkjet printer to build a rapid prototyping machine for circuit […]

27C3: Embedded Reverse Engineering Tools and Techniques

Nathan Fain and Vadik presented at the 27C3 Chaos Communications Congress held recently in Berlin, Germany, on a topic of interest to us all: JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques. Check out their webpage for full documentation and analysis.

Running your own GSM stack on a phone

Harald Welte and Steve Markgraf presented at 27C3 CCC in Berlin, Germany, on the OsmocomBB project, a Free Software implementation of the GSM protocol stack running on a mobile phone. This provides the security researcher a tool equivalent to an Ethernet card in the TCP/IP protocol world: a simple transceiver that will send arbitrary protocol […]

Reverse engineering a real-world RFID payment system

Harald Welte presented at the 27C3 CCC in Berlin, Germany, demonstrating his efforts at reverse engineering the data format of a real-world RFID based debit card system. His efforts focused on the EasyCard system, which is a popular method of cashless payment in Asia. Slides of the presentation are also available.

27C3: Chip and Pin is broken

Smart cards have gradually replaced magnetic strip cards for point-of-sale and ATM transactions in many countries. Customers authorize a credit or debit card transaction by inserting their card and entering a PIN into a point-of-sale terminal; the PIN is typically verified by the smart card chip, which is in turn authenticated to the terminal by […]

27C3: Reverse engineering the MOS 6502

The MOS 6502 CPU, which was designed in 1975 and powered systems like the Apple II, the Atari 2600, the Nintendo NES and the Commodore 64 for two decades, has always been subject to intense reverse engineering of its inner workings. This talk by Michael Steil presents the way from a chip package to a […]

Breaking SSL on embedded devices

Developers use embedded devices all the time, often without implementing security measures. When they do, they often rely on SSL. As revealed by the LittleBlackBox project there exists a collection of thousands of private SSL keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their […]

Roadmap to reversing the Xbox 360

Bunnie Huang (Bunnie’s Blog) reverse engineered the Xbox 360 and had been called as an expert witness in a case (USA v Crippen) charging violations of the criminal provisions of the Digital Millennium Copyright Act (DMCA). The case was dismissed after the first witness testified, so in order to publicly summarize the technical facts on […]

Hacking RGB Christmas lights

Deep Darc has successfully reverse engineered the operation of a 50-light set of GE multicolor Christmas lights. His work involved snooping the protocol used on the LEDs data bus line and exploration of the remote control unit, resulting in source code allowing control of the display of colors and patterns by an Attiny13A. Via Wonderhowto.