- General
- [Attacking Routers and their Firmware)(#routers)
- Cable Modem Hacking
- Credit Cards
- esp2866 Related
- Flash Memory
- Firmware(nonspecific)
- IoT/IoS
- JTAG
- Medical Devices
- Miscellaneous Devices
- Lightning/Thunderbolt
- PCI
- Printers
- Smart TVs
- Serial Peripheral Interface(SPI)
- SD Cards
- PCB Related
- Point-of-Sale
- Secure Tokens
- USB
- SIM Cards
- SmartCards
- Voting Machines
- Specific Attacks
- To-Do
- Fingeprint readers
- SIMs
- USB
- Lightning
- Voting machines
- Tokens
- SD Cards
- TPM
- ArduPilot
- Knocking my neighbors kids cruddy drone offline - DefCon 23 Robinson and Mitchell
- Game of Drones - Brown,Latimer - Defcon25
- We’ve taken a MythBusters-style approach to testing the effectiveness of a variety of drone defense solutions, pitting them against our DangerDrone. Videos demonstrating the results should be almost as fun for you to watch as they were for us to produce. Expect to witness epic aerial battles against an assortment of drone defense types
- DUMLRacer
- Root Exploit for DJI Drones and Controllers (up to and including v01.04.0100)
- 101
- Articles/Papers/Talks/Writeups
- Circuit Boards
- Educational/Informative
- OWASP Embedded Application Security
- Hardware Hacking - Nicolas Collins
- Reversing and Exploiting Embedded Devices: The Software Stack (Part 1)
- Common methods of H/W hacking
- Hardware Hacking Videos
- Hardware Hacking the Easyware Way
- Interested in hardware hacking but not quite sure where to start? Does the thought of soldering thrill you (or scare you)? Come check out this talk to see just how easy it is to jump into this exciting field of research! Many people and companies use similar models of hardware. Unlike software, these devices rarely receive security updates. Sometimes, used devices are sold without clearing the configurations and important data is left behind. After this talk, you will know how to find hidden interfaces on these devices, start searching for vulnerabilities and sensitive information, and have irresistible urges to go home and tear apart all your old networking equipment. Did we mention...live demo?
- Methodologies for Hacking Embedded Security Appliances
- Hardware Backdooring is Practical -Jonathan Brossard
- Infecting the Embedded Supply Chain - Somerset Recon
- Resources/Reference
- FCC ID Lookup
- Lookup devices according to FCC ID
- FCC ID Lookup
- Tools
- Logic Pirate
- The Logic Pirate is an inexpensive, yet capable open source logic analyzer. It is designed to support the SUMP logic analyzer protocol. Costs $30. Recommended to me by those who use it.
- Blog Post about it
- Debug Probes - J-Link and J-Trace
- Hardware reverse engineering tools (Olivier Thomas) - REcon 2013
- Metasploit Hardware Brdige
- NSA Playset
- In the coming months and beyond, we will release a series of dead simple, easy to use tools to enable the next generation of security researchers. We, the security community have learned a lot in the past couple decades, yet the general public is still ill equipped to deal with real threats that face them every day, and ill informed as to what is possible. Inspired by the NSA ANT catalog, we hope the NSA Playset will make cutting edge security tools more accessible, easier to understand, and harder to forget. Now you can play along with the NSA!
- Anti-Evil Maid
- Logic Pirate
- Miscellaneous
* NFC - See wireless section
- Project bdp
- This is a project to modify the Sony Blu-ray BDP firmware. It started out with only the BDP-S390, but has branched out to include other players and a variety of goals, including removing Cinavia and obtaining Region-Free.
- Learn how to send an SMS text message in Python by pushing a button on your Arduino!
- U-Boot -- the Universal Boot Loader
- Very popular on embedded devices open source bootloader for linux
- Manual/Documentation
- Probe comparison - sigrok.org
- Project bdp
- 101
- Articles/Papers/Talks/Writeups
- Hacking the D-Link DIR-890L
- Multiple Vulnerabilities in BHU WiFi “uRouter”
- From Zero to ZeroDay Journey: Router Hacking (WRT54GL Linksys Case)
- Rooting the MikroTik routers (SHA2017)
- In this talk I describe my journey into reverse engineering parts of MikroTik system to gain access to hardware features and the shell behind the RouterOS that has no “ls”.
- From 0-day to exploit – Buffer overflow in Belkin N750 (CVE-2014-1635)
- Firmware Exploitation with JEB: Part 1
- Tools
- Router Post-Exploitation Framework
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers.
- Router Post-Exploitation Framework
- 101
- Articles/Papers/Talks/Writeups
- Docsis hacking
- Hacking Docsis for fun and profit
- Hacking DOCSIS: Or how to get free internet - Chaosmaster - Easterhegg 2017
- In German
- Modem Cloning for Fun (but NOT for profit!) - Yifan Lu
- Hacking cable modems the later years - Bernardo Rodrigues - NullByte 2016
- Beyond your cable modem: How not to do DOCSIS networks - Alexander Graf
- Tools
- Keykeriki v2.0
- Hardware to attack wireless keyboards and other such things
- Keykeriki v2.0
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- Tools
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Miscellaneous
- 101
- Check the BIOS/UEFI page as well.
- Check out the RE page too.
- Reverse Engineering Firmware Primer - SecurityWeekly
- Articles/Papers/Talks/Writeups
- General
- Damn Vulnerable Router Firmware (DVRF) v0.5
- The goal of this project is to simulate a real world environment to help people learn about other CPU architectures outside of the x86_64 space. This project is also for those who are curious about embedded research, but don't want to invest a lot of money.
- Damn Vulnerable Router Firmware (DVRF) v0.5
- Tools
- Firmware Analysis Toolkit
- FAT is a toolkit built in order to help security researchers analyze and identify vulnerabilities in IoT and embedded device firmware.
- dfu-programmer
- dfu-programmer is an implementation of the Device Firmware Upgrade class USB driver that enables firmware upgrades for various USB enabled (with the correct bootloader) Atmel chips. This program was created because the Atmel "FLIP" program for flashing devices does not support flashing via USB on Linux, and because standard DFU loaders do not work for Atmel's chips.
- Firmware Analysis Toolkit
- Miscellaneous
- Firmware Forensics: Diffs, Timelines, ELFs and Backdoors
- Firmwalker
- A simple bash script for searching the extracted or mounted firmware file system. It will search through the extracted or mounted firmware file system for things of interest
- Disk Genie - SpritesMods
- 101
- Articles, Blogposts & Writeups
- Smart Parking Meters
- Security through obscurity is unfortunately much more common than people think: many interfaces are built on the premise that since they are a "closed system" they can ignore standard security practices. This paper will demonstrate how parking meter smart cards implement their protocol and will point out some weaknesses in their design that open the doors to the system. It will also present schematics and code that you can use to perform these basic techniques for auditing almost any type of blackblox secure memory card.
- Smart Nest Thermostat A Smart Spy in Your Home
- A Survey of Various Methods for Analyzing the Amazon Echo
- Hacking the Dropcam series
- When IoT Attacks: Hacking A Linux-Powered Rifle
- Smart Parking Meters
- Talks & Presentations
- When IoT Research Matters - Mark Loveless - Derbycon2017
- Most IoT research involves low hanging fruit and kitchen appliances. But what happens when the tech you are researching is changing a niche industry, or creating one? This involves a little deeper dive. This talk illustrates some basic concepts and includes some tips on how to make that dive slightly deeper, with examples of hacking tool usage, going above and beyond with a vendor during disclosure, and creating realistic attack scenarios without coming across as mere stunt hacking.
- IoT Security: Executing an Effective Security Testing Process - Deral Heiland - Derbycon2017
- With IoT expected to top 20 billion connected devices by the end of the decade. A focused effort is critical if we plan to be successfully securing our new IoT driven world. One of the primary necessities to meet this goal is to develop sound methods for identification, and mitigation of security vulnerabilities within IoT products. As an IoT security researcher and consultant, I regularly conduct IoT security testing. Within my testing methodologies I leverage a holistic approach that focuses on the entire ecosystem of an IoT solution, including: hardware, mobile, and cloud environments allowing for a more through evaluation of a solutions security issues. During this presentation attendees will learn about the ecosystem structure of IoT and security implication of the interconnected components as I guide the audience through several research projects focused on security testing of an IoT technology. Using live demonstration I will show real-world security vulnerability examples identified within each segment of an IoT ecosystem
- Backdooring the Frontdoor - Jmaxxz - DEF CON 24
- As our homes become smarter and more connected we come up with new ways of reasoning about our privacy and security. Vendors promise security, but provide little technical information to back up their claims. Further complicating the matter, many of these devices are closed systems which can be difficult to assess. This talk will explore the validity of claims made by one smart lock manufacturer about the security of their product. The entire solution will be deconstructed and examined all the way from web services to the lock itself. By exploiting multiple vulnerabilities Jmaxxz will demonstrate not only how to backdoor a front door, but also how to utilize these same techniques to protect your privacy.
- When IoT Research Matters - Mark Loveless - Derbycon2017
- Educational/Informative
- Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond - NCC Group
- Ian Douglas - Creating an Internet of Private Things
- The next big market push is to have the cool IoT device that’s connected to the internet. As we’ve seen from the Mirai and Switcher hacks, it’s important to embed the appropriate safeguards so that devices are not open to attack. When selecting device components there are things that should be checked for, and when you’re doing the coding and workflows, there are other things that need to be taken in to account. Although security and privacy are close cousins, they’re also different. This talk will be centered around some best security and privacy practices as well as some common errors that should be avoided.
- Tools
- Papers
- 101
- Articles/Papers/Talks/Writeups
- Tools
- JTAGulator
- JTAGulator is an open source hardware tool that assists in identifying OCD connections from test points, vias, or component pads on a target device.
- JTAGulator
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Talks & Presentations
- Anatomy of a Medical Device Hack- Doctors vs. Hackers in a Clinical Simulation Cage Match - Joshua Corman & Christian Dameff MD MS & Jeff Tully MD & Beau Woods(Derbycon2017)
- In the near future, a crisis unfolds at a hospital: patients on automated drug infusion machines overdose, hacked insulin pumps lead to car crashes, and internal defibrillators flatline weakened hearts. Clinical staff are unprepared and ill equipped to treat these complications, as they are all unaware of the true culprits behind the crisis. A state of emergency is declared, the public demands answers, and policymakers scramble to preserve national trust. This was the scenario that played out in first-of-their-kind clinical simulations carried out in June, and the results were scary yet unsurprising: health care cybersecurity is in critical condition. It’s been a long four years since the guiding ideals and message of The Cavalry was tempered from the forge that was the first Hacker Constitutional Congress (hosted in these very halls at DerbyCon 3). The battle continues to ensure that technologies capable of impacting public safety and human life remain worthy of our trust, and no battlefield looms larger than the healthcare space. Despite important steps toward change- from the Hippocratic Oath for Connected Medical Devices to the just-published Health Care Industry Cybersecurity Task Force Report- recent events remind us that the dual pillars of healthcare technology- patient facing medical devices and the infrastructure that supports clinical practice- remain as vulnerable and exposed as ever. Join Josh Corman and Beau Woods of I am The Cavalry as they team up with Christian Dameff, MD, and Jeff Tully, MD- two “white coat hackers” working to save patient lives at the bedside- to share lessons learned from the world’s first ever clinical simulations of patients threatened by hacked medical devices. By bringing the technical work done by security researchers you know and love to life and demonstrating the profound impact to patient physiology from compromised devices, these life-like simulations provide a powerful avenue to engage with stakeholder groups including clinicians and policymakers, and may represent the new standard for hackers looking to demonstrate the true impact and importance of their biomedical work.
- Anatomy of a Medical Device Hack- Doctors vs. Hackers in a Clinical Simulation Cage Match - Joshua Corman & Christian Dameff MD MS & Jeff Tully MD & Beau Woods(Derbycon2017)
- Tools
- Miscellaneous
- dustcloud
- Xiaomi Vacuum Robot Reverse Engineering and Hacking
- Xiaomi Dafang hacks
- This repository is a collection of information & software for the Xiaomi Dafang Camera
- xiaomi-sensors-hacks
- collection of xiaomi/aqara sensors hacks/modifications
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- ThunderGate
- ThunderGate is a collection of tools for the manipulation of Tigon3 Gigabit Ethernet controllers, with special emphasis on the Broadcom NetLink 57762, such as is found in Apple Thunderbolt Gigabit Ethernet adapters.
- ThunderGate
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Inception
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. Inception aims to provide a relatively quick, stable and easy way of performing intrusive and non-intrusive memory hacks against live computers using DMA.
- PCILeech
- The PCILeech use the USB3380 chip in order to read from and write to the memory of a target system. This is achieved by using DMA over PCI Express. No drivers are needed on the target system. The USB3380 is only able to read 4GB of memory natively, but is able to read all memory if a kernel module (KMD) is first inserted into the target system kernel. Reading 8GB of memory from the target system take around one (1) minute. The PCILeech hardware is connected with USB3 to a controlling computer running the PCILeech program. PCILeech is also capable of inserting a wide range of kernel modules into the targeted kernels - allowing for pulling and pushing files, remove the logon password requirement, loading unsigned drivers, executing code and spawn system shells. The software is written in visual studio and runs on Windows 7/Windows 10. Supported target systems are currently the x64 versions of: Linux, FreeBSD, macOS and Windows.
- Inception
- Miscellaneous
See 'Printers' Section in Network Attacks & Scanning
- 101
- Articles/Papers/Talks/Writeups
- Smart TV Security - #1984 in 21 st century
- This talk is more about security bugs and rootkits than about firmware for TVs. This talk more covers rootkits than security bugs and exploitation thereof, as they’re not different to traditional techniques. This talk is about general security issues of all Smart TV vendors.
- MonitorDarkly
- This repo contains the exploit for the Dell 2410U monitor. It contains utilities for communicating with and executing code on the device. The research presented here was done in order to highlight the lack of security in "modern" on-screen-display controllers. Please check out our Recon 0xA presentation (included) for a detailed description of our research findings and process.
- Smart TV Security - #1984 in 21 st century
- General
- Tools
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- The Exploration and Exploitation of an SD Memory Card
- This talk demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card.
- The Exploration and Exploitation of an SD Memory Card
- General
- Tools
- Miscellaneous
- 101
- Articles & Writeups
- Talks & Presentations
- Chip & PIN is Definitely Broken - Defcon 19
- Jackson Thuraisamy & Jason Tran - Hacking POS PoS Systems
- Pwning the POS! - Nick Douglas - Notacon11
- Everybody’s talking about the Target breach. However, there’s lots wrong with the retail space… and it’s been this way for quite some time! Focusing on Point of Sale (POS) systems this talk will show you how to exploit friendly the POS ecosystem really is, and how you can help fix things.
- Pandora's Cash Box - The Ghost under your POS - RECON2015
- Retail Store/POS Penetration Testing - Daniel Brown - Derbycon2017
- Penetration Testing a retail/POS environment. The methods companies are using to try and protect them, methods of bypassing security implementations, and how they tie into a companies overall security.
- Papers
- Tools
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- General
- Tools
- Miscellaneous
- 101
- USB in a Nutshell
- Great explanation of the USB standard in depth
- USB in a Nutshell
- Articles/Papers/Talks/Writeups
- Attacking
- USB Attacks Need Physical Access Right? Not Any More… by Andy Davis
- This project's goal is to turn PS2303-based USB flash drive into a cheap USB 3.0 development platform (i.e. fast USB 3.0 to FPGA bridge).
- Multiplexed Wired Attack Surfaces - Michael Ossmann & Kos - Toorcon15
- Manufacturers of mobile devices often multiplex several wired interfaces onto a single connector. Some of these interfaces, probably intended for test and development, are still enabled when the devices ship. We'll show you how you can get a shell on a popular mobile phone via its USB port without using a USB connection and we will release an open source tool for exploring multiplexed wired interfaces.
- DRIVE IT YOURSELF: USB CAR
- Reversing USB and writing USB Drivers for an RC car.
- Introduction to USB and Fuzzing - Matt DuHarte - Defcon23
- Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation
- Abstract: Increased focus on the Universal Serial Bus (USB) attack surface of devices has recently resulted in a number of new vulnerabilities. Much of this advance has been aided by the advent of hardware-based USB emulation techniques. However, existing tools and methods are far from ideal, requiring a significant investment of time, money, and effort. In this work, we present a USB testing framework that improves significantly over existing methods in providing a cost-effective and flexible way to read and modify USB communication. Amongst other benefits, the framework enables man-in-the-middle fuzz testing between a host and peripheral. We achieve this by performing two-way emulation using inexpensive bespoke USB testing hardware, thereby delivering capa-bilities of a USB analyzer at a tenth of the cost. Mutational fuzzing is applied during live communication between a host and peripheral, yielding new security-relevant bugs. Lastly, we comment on the potential of the framework to improve current exploitation techniques on the USB channel.
- USB For All - Defcon 22 - Jesse Michael and Mickey Shkatov
- USB is used in almost every computing device produced in recent years. In addition to well-known usages like keyboard, mouse, and mass storage, a much wider range of capabilities exist such as Device Firmware Update, USB On-The-Go, debug over USB, and more. What actually happens on the wire? Is there interesting data we can observe or inject into these operations that we can take advantage of? In this talk, we will present an overview of USB and its corresponding attack surface. We will demonstrate different tools and methods that can be used to monitor and abuse USB for malicious purposes.
- Implementing an USB Host Driver Fuzzer - Daniel Mende - Troopers14
- Attacking secure USB keys, behind the scene
- Attacking encrypted USB keys the hard(ware) way - Jean-Michel Picod, Rémi Audebert, Elie Bursztein -BHUSA 17
- In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives. We will demonstrate how this methodology works in practice via a set of case-studies. We will demonstrate some of the practical attacks we found during our audit so you will learn what type of vulnerability to look for and how to exploit them. Armed with this knowledge and our tools, you will be able to evaluate the security of the USB device of your choice.
- Here's a List of 29 Different Types of USB Attacks - BleepingComputer
- 5 Things to Do Now: the USB/JTAG/IME Exploit - ci.security
- USB Attacks Need Physical Access Right? Not Any More… by Andy Davis
- Understanding
- Attacking
- Educational/Informative
- USBProxy
- A USB man in the middle device using USB On-The-Go, libUSB and gadgetFS
- Attacks via physical access to USB (DMA…?)
- Can a connected USB device read all data from the USB bus?
- Defending Against Malicious USB Firmware with GoodUSB - Dave Tian, Adam Bates, Kevin Butler
- Defending Against Malicious USB Firmware with GoodUSB - davejintian.org
- USBProxy
- Tools
- WHID Injector: an USB-Rubberducky/BadUSB on Steroids
- umap
- The USB host security assessment tool
- NSA USB Playset - ShmooCon201
- Phison PS2303 (PS2251-03) framework
- Miscellaneous
- BadUSB
- USB Device/Class Info
- USB Device Class Specifications - Official Site
- These specifications recommend design targets for classes of devices. For HID related information, please go to the HID web page.
- Universal Serial Bus Device Class Specification for Device Firmware Upgrade Version 1.1 Aug 5, 2004
- Identifiers for USB Devices - docs.ms
- USB Device Class Specifications - Official Site
- 101
- Articles/Papers/Talks/Writeups
- Tools
- Miscellaneous
- 101
- Articles/Papers/Talks/Writeups
- How can I do that? Intro to hardware hacking with an RFID badge reader - Kevin Bong
- An analysis of the vulnerabilities introduced with Java Card 3 Connected Edition
- Outsmarting smartcards
- Deconstructing a secure processor - Christopher Tarnovsky
- From start to finish, we will walk through how a current generation smartcard was successfully compromised. The talk will discuss everything that was required in the order the events took place. We will cram several months into an hour! PS- The talk will be very technical mixed hardware and software (60% hardware, 40% software).
- Tools
- Miscellaneous
- Chameleon Mini
- Hacking Voting Machines at DEF CON 25
- dc25-votingvillage-report - notes from participants
- dc25-votingvillage-report
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village
- Introduction to Trusted Execution Environments - Steven J. Murdoch
- Fault Attacks
- The Sorcerer’s Apprentice Guide to Fault Attacks
- The effect of faults on electronic systems has been studied since the 1970s when it was noticed that radioactive particles caused errors in chips. This led to further research on the effect of charged particles on silicon, motivated by the aerospace industry who was becoming concerned about the effect of faults in airborne electronic systems. Since then various mechanisms for fault creation and propagation have been discovered and researched. This paper covers the various methods that can be used to induce faults in semiconductors and exploit such errors maliciously. Several examples of attacks stemming from the exploiting of faults are explained. Finally a series of countermeasures to thwart these attacks are described.
- The Sorcerer’s Apprentice Guide to Fault Attacks
- Glitch Attacks
- Introduction to Glitch Attacks
- This advanced tutorial will demonstrate clock glitch attacks using the ChipWhisperer system. This will introduce you to many required features of the ChipWhisperer system when it comes to glitching. This will be built on in later tutorials to generate voltage glitching attacks, or when you wish to attack other targets.
- Glitching for n00bs - A journey to coax out chips' inner seccrets
- Despite claims of its obsolescence, electrical glitching can be a viable attack vector against some ICs. This presentation chronicles a quest to learn what types of electrical transients can be introduced into an integrated circuit to cause a variety of circuit faults advantageous to an reverser. Several hardware platforms were constructed during the quest to aid in research, including old-skool & solderless breadboards, photo-etched & professional PCBs, FPGAs, and cheap & dirty homemade logic analyzers. The strengths and weaknesses of the various approaches will be discussed.
- Introduction to Glitch Attacks
- Traffic Injection
- Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems
- Abstract: This paper maps out the bus-facing attack surface of a modern operating system, and demonstrates that effective and effcient injection of traffc into the buses is real and easily a ordable. Further, it presents a simple and inexpensive hardware tool for the job, outlining the architectural and computation-theoretic challenges to creating a defensive OS/driver architecture comparable to that which has been achieved for network stacks.
- Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems
http://www.sp3ctr3.me/hardware-security-resources/ https://github.com/yadox666/The-Hackers-Hardware-Toolkit/
-
Code used in the Great Drone Duel of 2016
- At ToorCamp 2016, an unknown Chinese benefactor provided all participants with Cheerson CX-10A quadcopters. Coincidentally, Michael Ossmann and Dominic Spill gave a talk about hacking those very same quadcopters, and as part of their talk, they released a protocol specification which formalized the packet format used by the drones. Following the only logical path that made sense at the time, we challenged them to a duel at high noon. Using Python, nRF24LU1+ dongles (running Marc's nRF24LU1+ firmware), and an IntimidationAntenna(tm), we hacked together some code to either fly their drones far, far away, or bring them crashing to the ground. The code has been alpha tested against giant fishing nets with mixed results.
-
How To Set Up A Drone Vulnerability Testing Lab - Sanders Walters
-
[JTAG Explained (finally!): Why "IoT", Software Security Engineers, and Manufacturers Should Car - senr.io] https://www.attify-store.com/
-
Hardware Stuff for Software People By Stephen Ridley(REcon2011)
- This talk will be an introduction to doing "hardware stuff" stuff, for people accustomed to plying their trade against software. I will discuss how to build tools (and use existing tools) to sniff/spy on a variety of hardware communications channels from UART Serial (the kind in your computer) to the very ubiquitous SPI/I2C serial busses used in virtual everything (from EEPROM in your portable DVD player to the HDMI/VGA cables between your computer and monitor). I will demonstrate how these simple hardware taps can be used to begin reverse engineering, spoofing, and fuzzing in places where (as a software person) you might not have previously felt comfortable. I will be bringing along a number of custom hardware and software tools (used specifically for these purposes) as well as a mock lab environment for demonstrations. Other than these practical skills, I am new to this "hardware stuff" so please don't expect a "embedded-JTag-SCADA-mobile" buzzword soliloquy. I'll just be sharing some stories and showing some neat hardware and software I've recently found useful.
-
- "Kinda useful notes collated together publicly"
-
Embedded Devices Security and Firmware Reverse Engineering - Jonas Zaddach, Andrei Costin(BH13USA)
- This workshop aims at presenting a quick-start at how to inspect firmwares and a hands-on presentation with exercises on real firmwares from a security analysis standpoint.
-
Hardware and Firmware Security Guidance
- This repository provides content for aiding DoD administrators in verifying systems have applied and enabled mitigations for hardware and firmware vulnerabilities such as side-channel and UEFI vulnerabilities. The repository is a companion to NSA Cybersecurity Advisories such as Vulnerabilities Affecting Modern Processors. This repository is updated as new information, research, strategies, and guidance are developed.
-
Inception: System-wide Security Testing of Real-World Embedded Systems Software http://s3.eurecom.fr/docs/usenixsec18_corteggiani.pdf
-
Are We Really Safe? - Bypassing Access Control Systems - Dennis Maldonado(Defcon23)
- The world relies on access control systems to ensure that secured areas are only accessible to authorized users. Usually, a keypad is the only thing stopping an unauthorized person from accessing the private space behind it. There are many types of access control systems from stand-alone keypads to telephony access control. In this talk, Dennis will be going over how and where access control systems are used. Dennis will walk through and demonstrate the tips and tricks used in bypassing common access control systems. This presentation will include attack methods of all nature including physical attacks, RFID, wireless, telephony, network, and more.
-
Reverse-engineering Broadcom wireless chipsets - Hugues Anguelkov
Drone hacking
- DeviationTX with NRF24L01 module, the universal drone remote control - dronegarageblog.wordpress
- How To Set Up A Drone Vulnerability Testing Lab - Sander Walters
- How to hack IP camera in toy drone - u/pj530i
- PHD VI: How They Stole Our Drone
- Code used in the Great Drone Duel of 2016
- "At ToorCamp 2016, an unknown Chinese benefactor provided all participants with Cheerson CX-10A quadcopters. Coincidentally, Michael Ossmann and Dominic Spill gave a talk about hacking those very same quadcopters, and as part of their talk, they released a protocol specification which formalized the packet format used by the drones. Following the only logical path that made sense at the time, we challenged them to a duel at high noon.""
- nRF24L01+ sniffer - part 1 - Yveaux
- GPS Spoofing Of UAV - YUAN Jian
- DEVIATIONTX WITH NRF24L01 MODULE, THE UNIVERSAL DRONE REMOTE CONTROL. - garagedrone https://github.com/phodal/awesome-iot https://github.com/V33RU/IoTSecurity101
- Hardware Hacking for the Masses (and you!) - BusesCanFly(LevelUp 0x05)
- Custom summary: Intro(ish)-level talk for getting started/introduced to HardwareHacking. Good stuff.
- Slides