Video: Hack All The Things – 20 Devices in 45 Minutes

The GTVHacker group gave this presentation at DEFCON 22. The group is famous for Hacking the Google TV a few years back, and in this talk they add plenty of devices to their credit. “We’ve taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more […]

Video: JTAGulator introduction and demonstration

Hardware hacking guru Joe Grand of GrandIdeastudio has posted this new, detailed introduction/demonstration of the JTAGulator, an open source hardware tool te hat assists in identifying on-chip debug (OCD) and/or programming connections from test points, vias, or component pads on a target device. (We note the Bus Pirate usage at 5:40.)

Video: Using superpowers for hardware reverse engineering

Prior to delivering a presentation at today’s DEFCON, hardware hacking guru Joe Grand gave this talk at BSidesLV held August 5-6, 2014 in Las Vegas. Joe describes, “[s]uperpowers, normally used by superheroes in the battle of good versus evil, are also accessible to engineers and hackers in equipment used for failure analysis and verification of […]

DEFCON 20: tools for GPS hacking

At DEFCON 20, Fergus Noble and Colin Beighley discussed the basics of GPS operation and how hackers can access and use its data. They have developed and released a new set of tools which they hope will make GPS accessible to hackers and experimenters. These resources include a library, libswiftnav, which contains a complete toolset […]

Nicolas Collins’ original hardware hacking manual

If you want to read an irreverent and unorthodox hardware hacking manual check out Nicolas Collins’ Original Hacking Manual. Weighing in at 128 PDF pages, this book is geared toward motivating beginning electronics experimenters to explore uses and abuses for common electronic components. Topics include basic electronics through integrated circuits and circuit bending of all […]

MCU-in-the-middle attack on Diebold voting machine

Computerized voting machine vulnerabilities are nothing new, but this video demonstrating a man-in-the-middle wireless attack on a Diebold voting machine takes a different tact than most others. A vulnerability assessment team at Argonne National Laboratories was able to compromise the security of the Diebold machine, rendering it vulnerable by using a homemade MCU board at […]

Video: Hardware hacking for software guys

As the time for Defcon 19 nears we got to looking over last years videos and found this intro to Arduino for software guys. Dave King’s presentation is one of the better tutorials for programmers who want to learn the basics of the Arduino. An introduction for newbies, a refresher for the rest of us. […]

Get basic hardware info using FCC ID number

When reverse engineering RF related hardware, you may notice an FCC ID number on a placard near the device’s model and serial numbers. The first three letters of the ID represents the “Grantee Code”, and the remaining letters and numbers are the “Product Code”. By entering these two values in the FCC ID Search Form […]