Attacking Microcontroller Firmware via USB

Attacking Microcontroller Firmware via USB

One Who Hacks Video Game Consoles? The manufacturing of counterfeit and unauthorized products is prevalent in the world of video game consoles. This is a multi-billion dollar industry where demand creates supply. You can now find devices for nearly every existing console that allow you to play licensed video game “backups” from flash drives, counterfeit … Read more

Understanding Tesla Attack Cases: Hardware Reverse Analysis

Understanding Tesla Attack Cases: Hardware Reverse Analysis

This article is an excellent piece from the KXue Forum, author ID: kxliping 1 Purpose of Analyzing Attack Cases The main purpose of studying attack cases is to understand how attackers breach vehicles and take control of them. In the research on Tesla attacks, Tencent’s Keen Lab has contributed several successful cases, which should ideally … Read more

Restoration of APP Encryption and Signature Algorithms

Restoration of APP Encryption and Signature Algorithms

This article is an excellent piece from the KX forum. KX forum author ID: taobluesky Recently encountered a shell with quite high intensity, sharing how to debug with the shell, purely a technical exchange, please do not use this article for illegal purposes! 1 Prepare Environment frida 12.11.18 jeb-3.24 jadx-gui-1.3.3-1 xcube android 7.0 (real machine) … Read more

In-Depth Guide to Assembly Language and Binary Vulnerabilities

In-Depth Guide to Assembly Language and Binary Vulnerabilities

Learning programming has become a headache for many. There are those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and fulfill my dreams. But reality always hits hard…. There are many moments when I feel like smashing my keyboard, but we, the brave, will not … Read more

Introduction to Assembly Language

Introduction to Assembly Language

Friends with a bit of computer knowledge must know that computers only recognize 0s and 1s. Back in the day, to write a program, one had to use 0s and 1s, haha, cool right? The admiration for programmers likely originated from that time. Later, people found it very inconvenient to write programs using just 0s … Read more

Embedded Security Tool: Practical JTAG Debugging

Embedded Security Tool: Practical JTAG Debugging

He is the “Little Horse” mentioned by TK at the GeekPwn conference in 2015, another alchemist who intruded into the security circle (originally a chemistry major) – HyperChem. After a few years of experience in software unpacking, he is currently focusing on embedded security and firmware reverse engineering. This researcher from Tencent Security’s Xuanwu Lab, … Read more

Introduction to IoT Firmware Vulnerability Research

Introduction to IoT Firmware Vulnerability Research

With the advent of the 5G era, the role of the Internet of Things (IoT) is becoming increasingly important, along with more security risks. IoT security covers a wide range of topics. This series of articles will discuss the author’s understanding of IoT vulnerability research from a technical perspective. The author will explore five dimensions: … Read more

Reverse Engineering STM32 Firmware: A Comprehensive Guide

Reverse Engineering STM32 Firmware: A Comprehensive Guide

This article is a highlight from the KX forum, authored by KX forum user ID: Lpwn 1 Overview Using an old project on fan control as an experiment. It utilized external interrupts, timer interrupts, and PWM. The MCU is STM32F103ZET6. In the Keil settings, you can see the starting address of the firmware, which is … Read more

Reverse Engineering FreeRTOS: A Comprehensive Guide

Reverse Engineering FreeRTOS: A Comprehensive Guide

FreeRTOS Introduction FreeRTOS is a mini real-time operating system kernel. As a lightweight operating system, it includes functionalities such as task management, time management, semaphores, message queues, memory management, logging features, software timers, coroutines, etc., which can basically meet the needs of smaller systems. Compiling FreeRTOS Compilation Environment · Windows 10 20H2 · Keil V5.33.0.0 … Read more

STM32 Firmware Dump Tutorial: A Comprehensive Guide

STM32 Firmware Dump Tutorial: A Comprehensive Guide

Background Finally, with some rare free time and a long-lost passion, I quickly got to work. This is also a preliminary experience, so the goal is simply to dump the program and perform basic disassembly. Toolset Introduction Software Part OpenOCD Open On-Chip Debugger, a well-known open-source hardware debugger. Supports various debuggers like (St-link) and (jlink) … Read more