arhi wrote a mini-datasheet for a large 7-segment display he plans to use in a clock: I ordered bunch of 7seg modules from Sure and I noticed on the product page lot of ppl complained about lack on info on how to drive them. As I plan to use them I spent few moments to […]
Degate is a graphical reverse engineering tool for Ubuntu and OS X. Degates’ purpose is to aid reverse engineering of digital electronics in integrated circuits (ICs). Degate helps you to explore images from ICs. It matches logic gates on the imagery given by graphical templates and it assists you in tracing circuit paths. Degate is […]
Sivan Toledo likes to use Ham Radio Deluxe (HRD), a free program that serves as a user interface to radio transceivers. Modern transceivers can be controlled either from their front panel controls (if they have a front panel), or from a computer through a serial or USB connection. He writes: One cool and useful feature […]
Here are some examples by manekinen of what can happen when an apparently high reverse voltage is applied to several AVRs. Via Hack a Day.
In his article, Discrete Cosine presents some basic information on reverse engineering hex files. A quick primer highlighting simple concepts about file analysis. If you’ve hacked hardware and wondered where to start with software, check this out.
FX of Phenoelit recently presented a talk at the 27C3 CCC in Berlin, Germany on the topic of instruction set reverse engineering. Topics include obtaining byte code, analyzing it for basic properties, finding addressing modes, and implementing an IDA Pro processor module. The primary focus is on the transformation of byte code back into mnemonic […]
In this presentation from the 27C3 conference held recently in Berlin, Germany, Jeff Gough demonstrates the next step in hardware development, the circuit board printer. As an alternative to dependence on prefab dev boards and kits, Jeff outlines his efforts in reverse engineering an Epson inkjet printer to build a rapid prototyping machine for circuit […]
Nathan Fain and Vadik presented at the 27C3 Chaos Communications Congress held recently in Berlin, Germany, on a topic of interest to us all: JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques. Check out their webpage for full documentation and analysis.
Harald Welte and Steve Markgraf presented at 27C3 CCC in Berlin, Germany, on the OsmocomBB project, a Free Software implementation of the GSM protocol stack running on a mobile phone. This provides the security researcher a tool equivalent to an Ethernet card in the TCP/IP protocol world: a simple transceiver that will send arbitrary protocol […]
Harald Welte presented at the 27C3 CCC in Berlin, Germany, demonstrating his efforts at reverse engineering the data format of a real-world RFID based debit card system. His efforts focused on the EasyCard system, which is a popular method of cashless payment in Asia. Slides of the presentation are also available.
What if you got a game console for Christmas but don’t like playing games? You hack it to make it run your own code of course! This talk presented by bushing at the recent Chaos Communications Congress in Berlin, Germany, talks about the various hacks that you can use to gain control of your hardware […]
Smart cards have gradually replaced magnetic strip cards for point-of-sale and ATM transactions in many countries. Customers authorize a credit or debit card transaction by inserting their card and entering a PIN into a point-of-sale terminal; the PIN is typically verified by the smart card chip, which is in turn authenticated to the terminal by […]
The MOS 6502 CPU, which was designed in 1975 and powered systems like the Apple II, the Atari 2600, the Nintendo NES and the Commodore 64 for two decades, has always been subject to intense reverse engineering of its inner workings. This talk by Michael Steil presents the way from a chip package to a […]
Developers use embedded devices all the time, often without implementing security measures. When they do, they often rely on SSL. As revealed by the LittleBlackBox project there exists a collection of thousands of private SSL keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their […]
Hack a Day successfully reprogrammed the ATMEGA controller in a commercial LED light bulb. See the reverse engineering in part 1.
Ladyada explores the Kinect protocol using a USB analyzer. While we know the Kinect has already been cracked, this is a good example of how USB analyzers can be a helpful (though costly) addition to a workbench.
Bunnie Huang (Bunnie’s Blog) reverse engineered the Xbox 360 and had been called as an expert witness in a case (USA v Crippen) charging violations of the criminal provisions of the Digital Millennium Copyright Act (DMCA). The case was dismissed after the first witness testified, so in order to publicly summarize the technical facts on […]
Deep Darc has successfully reverse engineered the operation of a 50-light set of GE multicolor Christmas lights. His work involved snooping the protocol used on the LEDs data bus line and exploration of the remote control unit, resulting in source code allowing control of the display of colors and patterns by an Attiny13A. Via Wonderhowto.
Here’s another cool tech video by Jeri Ellsworth, this time illustrating how speed radar works using parts from a toy radar gun. Also refers to similarly using a satellite TV LNB module.
rossum guides us through reverse engineering several LCD displays. Via Hack a Day.