wrongbaud Profile picture
Aug 13 17 tweets 5 min read Read on X
Looking to get started with hardware hacking after DefCon? Here are a few blogs to get you started! 🧵
The first question I get is: "What tools to we need to build a hardware hacking lab?" - we've got you covered here with a wiki outlining common tools and their use cases:

voidstarsec.wiki
If you have a @Raspberry_Pi 4/5 handy - we've written a guide on how to configure it for common hardware hacking needs:

voidstarsec.com/blog/pifex-con…
@Raspberry_Pi Here is an example of how to use a Raspberry Pi to interface with an undocumented JTAG TAP:

voidstarsec.com/blog/jtag-pifex
If you want to learn more about JTAG, check out this other blog that I wrote covering how JTAG works at a low level:

wrongbaud.github.io/posts/jtag-hdd/
If you want a more interractive guide to how to use JTAG and SWD as a reverse engineer, check out this hack chat that I did in 2020:

If you're looking to learn more about UART, UBoot and how to use both of these to extract firmware, check out this blog post where we extract the firmware from an arcade cabinet:

voidstarsec.com/blog/uart-uboo…
If you want to learn more about fault injection - check out our blog post here:

voidstarsec.com/blog/replicant…
Taking fault injection a step further - here are some resources to learn about electromagnetic fault injection ⚡️⚡️⚡️

voidstarsec.com/csw-2024/
Another common question I get is - "Where do I find devices to learn more about this?"

Start by looking for anything with a screen in the toy aisle! Here is an old post about extracting SPI flash from an arcade cabinet:

wrongbaud.github.io/posts/BasicFUN…
Now that we have the flash extracted, what do we do with it? Here is a follow up post talking about patterns to look for in bare-metal firmware dumps and working with esoteric processors:

wrongbaud.github.io/posts/BasicFUN…
Maybe your firmware image is more complex, or you're interested in reverse engineering more standard target binaries - we've got a free Ghidra course here to get you started!

wrongbaud.github.io/posts/ghidra-t…
Dang ... my processor isn't currently supported in Ghidra, or maybe it does not have a proper loader! Not to fear, adding memory maps and processor specific peripherals can be done pretty easily:

wrongbaud.github.io/posts/writing-…
Next, perhaps you're looking at a complex function and you'd like to debug it or step through it - Ghidra's PCode emulation is a great place to start when learning how your target binaries work:

wrongbaud.github.io/posts/kong-vs-…
Looking for a group of folks who love hardware hacking? Check out the @voidstarsec Discord server:

discord.gg/dmJKSctYkb
@voidstarsec Stay up to date with our latest research and blog posts by signing up for our mailing list here:

eepurl.com/hSl31f
Finally, if you or your organization is interested in a formal onsite training about hardware hacking and reverse engineering, check out our course here:

voidstarsec.com/training

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with wrongbaud

wrongbaud Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @wrongbaud

Jul 8, 2022
Happy Friday! Looking to learn a little more about #ghidra or software RE? Here is a quick thread with some resources that I've put together over the years (1/6) 🐉
First, here is a free four-session that I put together with @hackaday, there are lectures on YouTube, and all of the materials are available on GitHub.

Blog Post: wrongbaud.github.io/posts/ghidra-t…

(2/6)
Setting up a Development Environment:

In this post, we review how to set up Ghidra for development, including eclipse integration and building Ghidra from scratch:

voidstarsec.com/blog//2021/12/…

(3/6)
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(