Posts Tagged ‘hardware hacking’

Video: Hack All The Things – 20 Devices in 45 Minutes

Monday, October 20th, 2014

The GTVHacker group gave this presentation at DEFCON 22. The group is famous for Hacking the Google TV a few years back, and in this talk they add plenty of devices to their credit. "We’ve taken all of our previous experience exploiting embedded devices and used it to bring you...

Tags: ,
Posted in hacks, reversed, Videos | 1 Comment »

Video: JTAGulator introduction and demonstration

Thursday, September 11th, 2014

Hardware hacking guru Joe Grand of GrandIdeastudio has posted this new, detailed introduction/demonstration of the JTAGulator, an open source hardware tool te hat assists in identifying on-chip debug (OCD) and/or programming connections from test points, vias, or component pads on a target device. (We note the Bus Pirate usage at...

Tags: , ,
Posted in Bus Pirate, JTAG, open source, reversed, tools, Videos | 1 Comment »

Video: Using superpowers for hardware reverse engineering

Sunday, August 10th, 2014

Prior to delivering a presentation at today's DEFCON, hardware hacking guru Joe Grand gave this talk at BSidesLV held August 5-6, 2014 in Las Vegas. Joe describes, "[s]uperpowers, normally used by superheroes in the battle of good versus evil, are also accessible to engineers and hackers in equipment used for...

Tags: , ,
Posted in conferences, reversed, Videos | No Comments »

DEFCON 20: tools for GPS hacking

Saturday, December 1st, 2012

At DEFCON 20, Fergus Noble and Colin Beighley discussed the basics of GPS operation and how hackers can access and use its data. They have developed and released a new set of tools which they hope will make GPS accessible to hackers and experimenters. These resources include a library, libswiftnav,...

Tags: ,
Posted in library, RF, Videos | 3 Comments »

Nicolas Collins’ original hardware hacking manual

Saturday, December 10th, 2011

If you want to read an irreverent and unorthodox hardware hacking manual check out Nicolas Collins' Original Hacking Manual. Weighing in at 128 PDF pages, this book is geared toward motivating beginning electronics experimenters to explore uses and abuses for common electronic components. Topics include basic electronics through integrated circuits...

Tags: ,
Posted in documentation, hacks, tutorials | No Comments »

MCU-in-the-middle attack on Diebold voting machine

Thursday, September 29th, 2011

Computerized voting machine vulnerabilities are nothing new, but this video demonstrating a man-in-the-middle wireless attack on a Diebold voting machine takes a different tact than most others. A vulnerability assessment team at Argonne National Laboratories was able to compromise the security of the Diebold machine, rendering it vulnerable by using...

Tags: , ,
Posted in hacks, Prototypes, techniques | 1 Comment »

Video: Hardware hacking for software guys

Wednesday, July 20th, 2011

As the time for Defcon 19 nears we got to looking over last years videos and found this intro to Arduino for software guys. Dave King's presentation is one of the better tutorials for programmers who want to learn the basics of the Arduino. An introduction for newbies, a refresher...

Tags: ,
Posted in Arduino, code, talks | No Comments »

Get basic hardware info using FCC ID number

Saturday, March 26th, 2011

When reverse engineering RF related hardware, you may notice an FCC ID number on a placard near the device's model and serial numbers. The first three letters of the ID represents the "Grantee Code", and the remaining letters and numbers are the "Product Code". By entering these two values in...

Tags: , ,
Posted in RF, site | No Comments »

Recent Comments

  • Max: Hey, good job quoting as an abstract something the author writes about someone else's project... For the record, I do appreciate the proper attention to...
  • imqqmi: Also interesting to note that arduino's use the DTR signal to reset the device. I found this out because repetier was able to do this...
  • Kevin: A bit sad that you are using a knock off Saleae device unless you are not using Saleae software.
  • Max: For the Haxxor Edition he could add a Morse-to-scan-code translator to the code in the PIC (where the L337 Haxxor Special also accepts Unicode code...
  • KH: Someone with a PIC16F1459 project, well you don't see these every day. Methinks he repeats the USB 2.0 thing too much; this might mislead people...