PCB-Level Reverse Engineering of Embedded Device Hardware

PCB-Level Reverse Engineering of Embedded Device Hardware

This article introduces some practical basic techniques for PCB-level hardware reverse engineering, which can be used by researchers and white hat groups to analyze unknown hardware. The hardware security laboratory operated by SEC Consult is part of the SEC Consult security lab. The research presented below is just the tip of the iceberg among many … Read more

Embedded Development: How to Prevent Device Cloning?

Embedded Development: How to Prevent Device Cloning?

liwen01 2023.06.04 Introduction (1) Conventional Devices (1) Patent Protection (2) Code Encryption (3) Authorization Verification (4) Continuous Updates and Improvements (2) Embedded Devices (1) Polish Key Chip Logos (2) Disable Debug Serial Ports (3) Set Flash Read Protection (4) Encrypt and Obfuscate Key Information (3) Junzheng T-Series Program Cracking (1) Locate the Root File System … Read more

Boeing 747 Digital Fuel Quantity Indicator – Teardown, Reverse Engineering and Testing

Boeing 747 Digital Fuel Quantity Indicator - Teardown, Reverse Engineering and Testing

From: Michelle’s LabLDM #401: Boeing 747 digital fuel quantity indicator – teardown, reverse engineering and testIntroductionInterface DisplayLabel InformationConnectorPinout of the Aviation ConnectorOpening the InstrumentFrom Altera’s CPLD, EPM7160 1MHz Crystal OscillatorPower Board (LT1074)Reverse Engineering: Power SupplyPower SupplyReverse Engineering: Dimmer Circuits0-5V, 400Hz AC Voltage Rectification Comparison 8-bit Sent to CPLDReverse Engineering: ARINC 429 InterfaceOptocoupler (an ARINC 429 … Read more

Embedded Development: How to Prevent Device Cloning?

Embedded Development: How to Prevent Device Cloning?

Table of Contents: Introduction I. Conventional Devices 1. Patent Protection 2. Code Encryption 3. Authorization Verification 4. Continuous Updates and Improvements II. Embedded Devices 1. Polishing Key Chip Logos 2. Disabling Debug Serial Ports 3. Flash Read Protection Settings 4. Encrypting and Obfuscating Key Information III. Cracking the Junzheng T Series Program 1. Locating the … Read more

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Reverse Engineering Analysis: How Insecure is the Motorola Security Camera?

Introduction In today’s world, who doesn’t need to guard against theft and intruders? Cloud security cameras have become increasingly popular. However, despite being labeled as “security” cameras, their actual security may not be very robust. The Motorola Focus 73 outdoor security camera is a case in point. The Motorola Focus 73 camera is an outdoor … Read more

Mastering JTAG Tools: Using JTAG Probe to “Reverse Engineer” Hardware Circuits

Mastering JTAG Tools: Using JTAG Probe to "Reverse Engineer" Hardware Circuits

On various second-hand websites, you can often find boards that lack accompanying documentation (such as schematics), and these boards are relatively inexpensive. If purchased in bulk, they can be used as development boards. The first challenge is to “reverse engineer” the schematics for subsequent routine development. Currently, there are two software tools that can assist … Read more

Latest Slider Encryption Parameters of Verification 4th Generation with Pure Algorithm Restoration

Latest Slider Encryption Parameters of Verification 4th Generation with Pure Algorithm Restoration

Special Statement All content in this article is for learning and communication purposes only and cannot be used for any commercial or illegal purposes. Otherwise, the consequences are at your own risk. If there is any infringement, please contact the author for immediate deletion! Due to my limited ability, if there are any inaccuracies in … Read more

A Reverse Engineering Journey of the Xiaomi Mi Band BLE Communication Protocol

A Reverse Engineering Journey of the Xiaomi Mi Band BLE Communication Protocol

AuthorForum Account:FinchK 0x0 Introduction As a pure beginner in reverse engineering, I have been involved in it for about two months. I have a Xiaomi Mi Band 4 NFC version, which has the built-in Xiao Ai assistant that can engage in voice conversations to control smart home devices and perform operations such as setting alarms. … Read more

Exploring Vulnerabilities in the VMware Workstation Renderer

Exploring Vulnerabilities in the VMware Workstation Renderer

Background In mid-January, ZDI announced the rules for the 2017 competition, which included a substantial reward for teams that could break VMware and achieve virtual machine escape. VMware is no longer a new target; it was identified as a target in 2016. As a target, VMware has undergone various attacks, with many points of attack … Read more

Pwndbg: A GDB Plugin Designed for Vulnerability Analysis

Pwndbg: A GDB Plugin Designed for Vulnerability Analysis

About Pwndbg Pwndbg is a GDB plugin specifically designed for security vulnerability analysis. This tool greatly simplifies the difficulty researchers face when using GDB for vulnerability analysis and debugging. It primarily focuses on the functionalities required by software developers, hardware hackers, reverse engineers, and vulnerability analysts. The original GDB is not suitable for reverse engineering … Read more