DES has not been considered safe for a long time. For some time now, cracking tool John the Ripp has even made it possible to accelerate cracking with FPGAs. Since I find this topic exciting, I tried it with an …
Category: Embedded Security
Demo of how communication load can influence the cycle time of a PLC. Default main cyclic task is used. Cycle time is set to 1ms. Every 250 cycles the next output is set. Attack on different PLCs Attack Code #!/bin/bash …
Here a first look at the Xiaomi WiFi+ PCB and Software is given.
The OpenPLC is a opensource Programmable Logic Controllers (PLC) alternative. Due to this, it is possible to understand the black box of these systems. It could be easily used with a Raspberry Pi.
Coreboot provides a lot of possibilities of configurations, primary and secondary payloads and debugging mechanisms.
Coreboot is an Open Source project, which replaces the proprietary BIOS of a traditional computer. Coreboot initialize the Hardware and then executes a payload (e. g. SeaBIOS or Grub).
With OpenOCD it is possible to flash/upload programs to the spi flash of the Arty Board. From there the SiFive Risc-V “core” will boot.
Configuring and programming the 100 € Xilinx Arty development board with an open source implementation of the Risc-V ISA from SiFive.
How to get root at Linksys E900 N300
How to get a root shell on the NETGEAR DM111PBL?
After getting access to the serial interface of the IP-Camera the next step is to get a root shell.
The last article shows, how to identify the serial port on the IP-Camera. With this it is possible to solder wires on the IP-Camera and attach a USB to serial adapter to it.
I have bought an WiFi security camera from banggood. The Digoo BB-M2 Mini WiFi HD 720P costs about 20 €, which is quite cheap for this kind of product. This article will analyze the serial interface of the IP camera.
The manufactured boards have arrived. Unexpectedly the component identifiers are printed on the PCB and i have not placed them. Due to this reason in the next version they have to be placed right. Top of the PCB: Bottom of …
The idea behind the hardware hacking shield for the Raspberry Pi is to learn IT-Security hacks on different bus systems on embedded boards. Features for the first version of the Raspberry Pi Hardware Hacking Board (V0.1): I2C EEPROM to learn …
Qemu with RootFS of TL-MR3020 This tutorial should show, how it is possible to set-up a Qemu virtualized environment. DRAFT!
Extracting and Analysis Firmware of the TL-MR3020 This tutorial shows how the firmware of the TP-Link TL-MR3020 could be analysed. DRAFT!
TL-MR3020 Serial Dump over Python Script This tutorial show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 via a serial connection. DRAFT!
Firmware dump of the TP-Link TL-MR3020 This tutorial will show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 Router. As a possible method the /dev/mtd* data will be transferred over tftp.