Hardware Reverse Engineering
Reverse engineering of circuitry hardware and firmware...
63 topics in this forum
-
TI Stellaris plus AT Modem project to connect to Exosite
by JoshuaSimi- 1 reply
- 5.6k views
This project demonstrates how to use a Stellaris Development Kit to send and receive data to/from the cloud via Exosite's Cloud Data Platform. The communication with the cloud is accomplished over HTTP with the Janus-RC GSM864Q GPRS modem. The project sends the AT command over a UART to the Janus modem. The project functionality writes a 'Ping' value to the cloud and reads a value 'interval' from the cloud. Cloud information is shown on the on-board LCD screen. For some development kits with enough screen size, an option to read a public temperature data source is also available to display on the screen. The source code in this folder is a project called "Stellaris ATDT C…
-
EK-TM4C1294XL Connected LaunchPad
by JoshuaSimi- 1 reply
- 6.7k views
The Tiva C Series TM4C1294 LaunchPad features on-board emulation, which means you can program and debug your projects without the need for additional tools. Texas Instruments and Exosite have brought you the foundational elements for building connected products. Instead of re-inventing the wheel, you can use our Internet of Things (IoT) building blocks to create your connected product vision quickly. The Texas Instruments Connected LaunchPad Evaluation Kit EK-TM4C1294XL uses the Texas Instruments Tiva™ C Series TM4C1294 microcontroller. This kit ships with Exosite application code already flashed onto the chip! We created a demo Internet of Things application uses the E…
-
Scada Internet Exposure 2013-11
by Teddy Rogers- 1 reply
- 5.6k views
Scada Internet Exposure 2013-11 http://www.scadaexposure.com/report/2013-11#summary http://www.scadaexposure.com/report/2013-11#overall http://www.scadaexposure.com/library/ScadaExposure_Introduction.pdf Ted.
-
Unpacking Belkin Firmware
by andrewborg- 1 reply
- 6.9k views
Hello,I am trying to unpack a Belkin F5D8636-4.The first Thing I did after downloading the Firmware was letting Binwalk analyze the File. The result was 4 LZMA Partitions.Then I Analyzed the File Manually and I Figured out that each LZMA binwalk Found is Preceded by 12 Bytes. ( Except the First One, which was fount at Offset 0 of the Firmware)Although these 12 bytes are not the same for all the 4 LZMA Partitions, they are quite similar.The 12 Bytes for Three Partitions are in the Image Below.Now, my first guess was that these numbers represent some kind of a Magic Number, but Google returned nothing of Value.Do any of you guys know what such Hex Digits may Mean? Also if a…
-
Reverse Engineering LPC’s Device Firmware Upgrade Protocol...
by Teddy Rogers- 0 replies
- 8.3k views
Reverse Engineering LPC’s Device Firmware Upgrade Protocol http://blog.technical.io/post/66686276686/reverse-engineering-lpcs-device-firmware-upgrade Ted.
-
Unpacking Firmware Images from Cable Modems...
by Teddy Rogers- 0 replies
- 5.4k views
Unpacking Firmware Images from Cable Modems http://w00tsec.blogspot.com.au/2013/11/unpacking-firmware-images-from-cable.html Ted.
-
NIST Releases Preliminary Cybersecurity Framework...
by Teddy Rogers- 0 replies
- 4.9k views
NIST Releases Preliminary Cybersecurity Framework http://www.nist.gov/itl/upload/preliminary-cybersecurity-framework.pdf Ted.
-
IntegraXor HMI/SCADA Bug Bounty Program...
by Teddy Rogers- 1 reply
- 5.6k views
IntegraXor HMI/SCADA Bug Bounty Program http://www.integraxor.com/blog/integraxor-hmi-scada-bug-bounty-program Ted.
-
Project Basecamp at S4...
by Teddy Rogers- 0 replies
- 6.8k views
/>http://www.digitalbond.com/2012/01/19/project-basecamp-at-s4/ Project Basecamp - Attacking ControlLogix [media]http://www.youtube.com/watch?v=D-FZs0nPxC8&feature=player_embedded Ted.
-
Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP...
by Teddy Rogers- 0 replies
- 7.3k views
Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP />http://www.poppopret.org/?p=40 Ted.
-
Hackers Destroy Water Pump...
by Teddy Rogers- 0 replies
- 6.2k views
Hackers Destroy Water Pump />http://www.theregister.co.uk/2011/11/17/water_utility_hacked/ Ted.
-
100 bugs in 100 days: An analysis of ICS (SCADA)...
by Teddy Rogers- 2 replies
- 6.4k views
100 bugs in 100 days: An analysis of ICS (SCADA) I am surprised they only found that many bugs. Scada is a security mess... >http://www.youtube.com/watch?v=29S_Beg71dA&feature=player_embedded Ted.
-
SCADA Trojans: Attacking the Grid...
by Teddy Rogers- 2 replies
- 8.2k views
/>http://www.reversemode.com/downloads/exploit_advantech.zip/>http://www.reversemode.com/downloads/Scada_Trojans_Ruben_Rootedcon.pdf Ted.