Glitching & side-channel (intro)
Glitching briefly disturbs power/clock to bypass checks; side-channel measures power/EM leakage to infer secrets.
These are advanced topics—start with dev boards and documented labs (e.g., AES demo targets).
- Clock/power glitch: Time a narrow pulse during a check (PIN compare, signature verify) in a lab rig.
- Simple power analysis (SPA/DPA): Measure current draw while crypto runs on a known target to learn methodology.
- Always lawful: Use demo targets; never attack live production systems.
FAQ
Can I brick a device?
Yes. Work non-destructively, back up firmware first, and practice on dev boards before touching anything critical.
Do I need expensive gear?
No. A USB-UART dongle, a logic analyzer, and a tool like Bus Pirate/GreatFET go a long way. Specialized gear helps later.
Is chip removal required?
Often no—many targets allow in-circuit SPI flash reads via SOIC clips. Chip-off is last resort and requires skill.