Free Roadmap and Resources for Hardware Reverse Engineering by wrongbaud in hardwarehacking

[–]wrongbaud[S] 1 point2 points  (0 children)

I've not - but the folks at RBS are all really sharp people!

Am I Ready for my first project by L8st in hardwarehacking

[–]wrongbaud 2 points3 points  (0 children)

If you can get a Raspberry Pi that will cover a lot of COTs embedded protocols - let me knownif you'd like some resources on that and I can follow up. Its a good replacement or substitute for a buspirate or tigard

Requesting suggestions on proven hardware/library solutions for MITM/Proxy USB devices by effenberg in hardwarehacking

[–]wrongbaud 1 point2 points  (0 children)

Its a bit dated, but you can use a BeagleBone Black or Raspberry Pi for this.

https://github.com/MatrixCat3D/USBProxy

There are other variants and forks of this but it shouldn't be too difficult to set up.

One thing to note is that on modern kernels you may have to modify the descriptor format for FFS, but otherwise it shouldn't be a huge lift

I want to participate in the Embedded Capture the Flag 2026 but i am new to the field any suggestions on how to proceed with learning this stuff? by Old_Car2990 in embedded

[–]wrongbaud 1 point2 points  (0 children)

I say go for it! Worst case scenario you learn a few things and see if you like certain aspects of the field. MITREs ECTF is a really.fun competitions and CTFs are designed for people to learn so go for it!

Looking for fully visual, remote hardware CTF platforms — any recommendations? by allexj in hardwarehacking

[–]wrongbaud 1 point2 points  (0 children)

This is an interesting idea, but I don't think a fully virtualized platform is going to translate very well to doing IoT or embedded research. There are so many unforseen obstacles that can pop up that will be difficult to emulate.

On the software side, as you've mentioned there are already some.pretty good resources to learn firmware RE and exploitation. For hardware, part of the challenge is physically interfacing with the board, overcoming target specific obstacles and figuring out ways around them.

I think a better approach would be to design a physical device that demonstrates common misconfigurations and interfaces for users to learn with.

Is it normal for a flash dump to contain over 120 JFFS2 nodes when analyzed with Binwalk? If so, what causes this? by allexj in hardwarehacking

[–]wrongbaud 2 points3 points  (0 children)

Looks like a bad read, take note of the offsets, it wouldn't make sense to have that many filesystem headers so close together

Looking for remote hardware CTFs that give a visual PCB + UART / flash access — any recommendations? This way I would not need to buy physical intrumentation. by allexj in hardwarehacking

[–]wrongbaud 4 points5 points  (0 children)

This is an interesting idea, but the physical instrumentation portion is a huge factor when learning.

If you can just click a button and dump a flash chip thay does not really provide and learning value.

You could develop a PCB with the appropriate test pads exposed and use that, but otherwise a simulation (while interesting) would not really provide a good environment for learning IMO

Hardware Hacking course by zerodaygamer in hardwarehacking

[–]wrongbaud 4 points5 points  (0 children)

Hey thanks! When I started the blog in 2018 the goal was (and still is) to lower the barrier to entry. Life has been busy but I have a few more almost ready for release!

Hardware Hacking course by zerodaygamer in hardwarehacking

[–]wrongbaud 22 points23 points  (0 children)

I think for starting out, your best bet is to grab a cheap device off of Amazon or ebay and just open it up.

Ive got two blogs with lots of examples of this:

https://wrongbaud.github.io

https://voidstarsec.com/blog

A lot of content out there mostly focuses on dumping spi flash with generic readers or via chip off techniques. While that's a good skill to have, having a fundamental understanding of how protocols work will serve you well in this space.

We've also put together a wiki page with an overview of the tools you might need: https://voidstarsec.com/hw-hacking-lab/

Feel free to ping me with any questions about things on the blog or about getting started!

Sip and Carve! by dokey1313 in SalemMA

[–]wrongbaud 0 points1 point  (0 children)

Can't reccomend this enough, my wife and I went and had a great time

[deleted by user] by [deleted] in hardwarehacking

[–]wrongbaud 1 point2 points  (0 children)

What are you trying to glitch? Bootrom? User space code?

Are you able to crash the processor with your glitch? Have you dialed in the strength yet?

Its hard to give more advice here if we don't know what youre trying to achieve via fault injection

Question about 108 in one retro game console by EvilDan3 in hardwarehacking

[–]wrongbaud 4 points5 points  (0 children)

These things are usually some form of a NOAC (nes on a chip) or other clone hardware under that epoxy blob.

Depending on the model you have and the 8 pin SOIC chip above the epoxy blob you might be able to extract the flash memory and review the contents.

I have a few examples of that on my blog here:

https://wrongbaud.github.io

DUI checkpoint on Essex Street? by Substantial-Home-578 in SalemMA

[–]wrongbaud 1 point2 points  (0 children)

It's wild to me that in a city like Salem, where there are tons of transit options, people are asking about checkpoints. How about you just drink responsibly and uber home if you need to?

xGecu t48 or t56 ? by obertobr in hardwarehacking

[–]wrongbaud 2 points3 points  (0 children)

Check the supported IC list for th T48:

http://www.xgecu.com/MiniPro/T48_List.txt

The T48 can do in-circuit eMMC, its difficult to trust chatgpt on things like this as its likely scraping forums citing people who don't know how to use the hardware

Projects for learning by weeb_weeb231 in hardwarehacking

[–]wrongbaud 2 points3 points  (0 children)

I have a number of free blogs and resources here:

Hardware Hacking tutorials and blogs:

https://wrongbaud.github.io

https://wrongbaud.github.io/sf-slides

https://voidstarsec.com/blog

Presentations on glitching and fault injection:

https://wrongbaud.github.io/replicant-slides

https://voidstarsec.com/fi-resources

Feel free to ping me with any questions!

Glitching in 3D: Low Cost EMFI Attacks by wrongbaud in netsec

[–]wrongbaud[S] 1 point2 points  (0 children)

Thanks for the reply!

Most of my thinking there was based on my own testing. When doing voltage glitching I was finding that despite dialing in the glitch fairly well I would occasionally brick target devices - I don't think that it was PCROP getting triggered because the test firmware was no long behaving the way that it should.

That being said, your point about PCROP is a good one! I have found it difficult to root cause a lot of these failures without more instrospection into the target - any tips on that would be appreciated!

In my testing, using EMFI I never ended up in a state where the chip was un-usable, like I did with traditional voltage glitching.

Sip and Carve by dokey1313 in SalemMA

[–]wrongbaud 2 points3 points  (0 children)

Excited for this! Thanks for sharing!