0x00 Introduction Hacking embedded products has always been a hot topic. More and more attackers are targeting IoT embedded devices. Unlike traditional software security research, this type of research often requires a combination of relevant hardware knowledge and devices. In this article, Wang Wang will share practical cases and corresponding tool usage for the I2C protocol. Hope to borrow…