↓ Skip to Main Content
NM-Projects

Main Navigation

  • Home
  • Publications
  • Blog
  • About
  • Legal Disclosure
  • Privacy Policy

Category: Embedded Security

Investigation into DES cracking with John the Ripper and Ztex FPGA

By Matthias Niedermaier Posted on 2020-02-10 Posted in Embedded Security, IT-Security, Linux, Make, Reverse Engineering
Investigation into DES cracking with John the Ripper and Ztex FPGA

DES has not been considered safe for a long time. For some time now, cracking tool John the Ripp has even made it possible to accelerate cracking with FPGAs. Since I find this topic exciting, I tried it with an …

Investigation into DES cracking with John the Ripper and Ztex FPGA Read more »

PLC Cycle Time Attack

By Matthias Niedermaier Posted on 2020-01-28 Posted in Embedded Security, IT-Security, Linux
PLC Cycle Time Attack

Demo of how communication load can influence the cycle time of a PLC. Default main cyclic task is used. Cycle time is set to 1ms. Every 250 cycles the next output is set. Attack on different PLCs Attack Code #!/bin/bash …

PLC Cycle Time Attack Read more »

First Impression on the Xiaomi WiFi+

By Matthias Niedermaier Posted on 2017-12-30 Posted in Embedded Security, Linux, Make, Reverse Engineering
First Impression on the Xiaomi WiFi+

Here a first look at the Xiaomi WiFi+ PCB and Software is given.

Setting-up OpenPLC

By Matthias Niedermaier Posted on 2017-11-19 Posted in Embedded Security, IT-Security, Linux, Make, Raspberry Pi
Setting-up OpenPLC

The OpenPLC is a opensource Programmable Logic Controllers (PLC) alternative. Due to this, it is possible to understand the black box of these systems. It could be easily used with a Raspberry Pi.

Analysis of Mini 3G/4G WiFi Wireless Router (A5-V11)

By Matthias Niedermaier Posted on 2017-09-13 Posted in Embedded Security, IT-Security, Linux, Raspberry Pi, Reverse Engineering
Analysis of Mini 3G/4G WiFi Wireless Router (A5-V11)

Coreboot debugging, configuration, tint, etc.

By Matthias Niedermaier Posted on 2017-09-08 Posted in Embedded Security, IT-Security, Linux, Raspberry Pi
Coreboot debugging, configuration, tint, etc.

Coreboot provides a lot of possibilities of configurations, primary and secondary payloads and debugging mechanisms.

Flashing Coreboot on the T430 with a Raspberry Pi

By Matthias Niedermaier Posted on 2017-08-27 Posted in Embedded Security, IT-Security, Linux, Raspberry Pi
Flashing Coreboot on the T430 with a Raspberry Pi

Coreboot is an Open Source project, which replaces the proprietary BIOS of a traditional computer. Coreboot initialize the Hardware and then executes a payload (e. g. SeaBIOS or Grub).

Open Source Risc-V on the Xilinx Artix-7 35T Arty – Part 2

By Matthias Niedermaier Posted on 2017-06-16 Posted in Embedded Security, IT-Security, Linux, Make
Open Source Risc-V on the Xilinx Artix-7 35T Arty – Part 2

With OpenOCD it is possible to flash/upload programs to the spi flash of the Arty Board. From there the SiFive Risc-V “core” will boot.

Open Source Risc-V on the Xilinx Artix-7 35T Arty – Part 1

By Matthias Niedermaier Posted on 2017-06-14 Posted in Embedded Security, IT-Security, Make
Open Source Risc-V on the Xilinx Artix-7 35T Arty – Part 1

Configuring and programming the 100 € Xilinx Arty development board with an open source implementation of the Risc-V ISA from SiFive.

Hacking – Root @ Linksys E900 N300

By Matthias Niedermaier Posted on 2017-04-15 Posted in Embedded Security, IT-Security, Linux
Hacking – Root @ Linksys E900 N300

How to get root at Linksys E900 N300

Hacking – Root @ NETGEAR DM111PBL ADSL2+

By Matthias Niedermaier Posted on 2017-04-15 Posted in Embedded Security, IT-Security, Linux
Hacking – Root @ NETGEAR DM111PBL ADSL2+

How to get a root shell on the NETGEAR DM111PBL?

Hacking IP-Camera Digoo BB-M2 – Part 3 – Getting root access

By Matthias Niedermaier Posted on 2017-01-15 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering

After getting access to the serial interface of the IP-Camera the next step is to get a root shell.

Hacking IP-Camera Digoo BB-M2 – Part 2 – Analyzing the boot process

By Matthias Niedermaier Posted on 2017-01-01 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering
Hacking IP-Camera Digoo BB-M2 – Part 2 – Analyzing the boot process

The last article shows, how to identify the serial port on the IP-Camera. With this it is possible to solder wires on the IP-Camera and attach a USB to serial adapter to it.

Hacking IP-Camera Digoo BB-M2 – Part 1 – Identify serial interface

By Matthias Niedermaier Posted on 2016-12-28 Posted in Embedded Security, IT-Security, Linux, Reverse Engineering
Hacking IP-Camera Digoo BB-M2 – Part 1 – Identify serial interface

I have bought an WiFi security camera from banggood. The Digoo BB-M2 Mini WiFi HD 720P costs about 20 €, which is quite cheap for this kind of product. This article will analyze the serial interface of the IP camera.

Raspberry Pi – Hardware Hacking V0.1 update

By Matthias Niedermaier Posted on 2016-06-05 Posted in Embedded Security, Linux, Make, Raspberry Pi

The manufactured boards have arrived. Unexpectedly the component identifiers are printed on the PCB and i have not placed them. Due to this reason in the next version they have to be placed right. Top of the PCB: Bottom of …

Raspberry Pi – Hardware Hacking V0.1 update Read more »

Raspberry Pi – Hardware Hacking V0.1

By Matthias Niedermaier Posted on 2016-05-21 Posted in Embedded Security, Linux, Make, Raspberry Pi

The idea behind the hardware hacking shield for the Raspberry Pi is to learn IT-Security hacks on different bus systems on embedded boards. Features for the first version of the Raspberry Pi Hardware Hacking Board (V0.1): I2C EEPROM to learn …

Raspberry Pi – Hardware Hacking V0.1 Read more »

Hacking TL-MR3020 – Part 4 – Qemu test

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering

Qemu with RootFS of TL-MR3020 This tutorial should show, how it is possible to set-up a Qemu virtualized environment. DRAFT!

Hacking TL-MR3020 – Part 3 – Firmware analysis

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering

Extracting and Analysis Firmware of the TL-MR3020 This tutorial shows how the firmware of the TP-Link TL-MR3020 could be analysed. DRAFT!  

Hacking TL-MR3020 – Part 2 – Firmware dump over SERIAL

By Matthias Niedermaier Posted on 2016-01-15 Posted in Embedded Security, Linux, Reverse Engineering

TL-MR3020 Serial Dump over Python Script This tutorial show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 via a serial connection. DRAFT!

Hacking TL-MR3020 – Part 1 – Firmware dump over TFTP

By Matthias Niedermaier Posted on 2016-01-12 Posted in Embedded Security, Linux, Reverse Engineering

Firmware dump of the TP-Link TL-MR3020 This tutorial will show, how it is possible to make a firmware dump of the TP-Link TL-MR3020 Router. As a possible method the /dev/mtd* data will be transferred over tftp.

Footer Menu

  • Home
  • Publications
  • Blog
  • About
  • Legal Disclosure
  • Privacy Policy
Copyright © 2025 Matthias Niedermaier | Powered by Responsive Theme
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok