Hardware Hacking

Explore device internals via UART, SPI, I²C, JTAG/SWD, and side-channel techniques. This page covers safe lab workflows, common buses, and defenses—for authorized research only.

Quick-start checklist

  1. Permission & scope: Only analyze hardware you own or are contractually authorized to assess.
  2. Non-destructive first: Photograph boards; note shielding, test pads, jumpers; avoid cutting or desoldering early on.
  3. ESD safety: Use wrist strap/mat; power down; isolate bench PSU; label voltages.
  4. Identify buses: Probe for UART, I²C, SPI, JTAG/SWD with multimeter + logic analyzer.
  5. Document everything: Pinouts, baud rates, dump hashes, tool versions—future you will thank you.

Primer: common debug buses

Many embedded devices expose test pads or headers for manufacturing or service. Typical interfaces:

Board Pads Clips / Probes Interface Tool Host (PC)
Identify pads → clip/probe safely → connect interface tool → interact from host.

Common lab workflows

1) Find a UART console

2) Dump SPI flash

3) I²C/EEPROM inspection

4) JTAG/SWD mapping

5) Firmware update interception (authorized)

Safety: Never power a target from two sources at once. Match logic levels. If unsure, isolate with series resistors and use current-limited bench supplies.

Glitching & side-channel (intro)

Glitching briefly disturbs power/clock to bypass checks; side-channel measures power/EM leakage to infer secrets. These are advanced topics—start with dev boards and documented labs (e.g., AES demo targets).

Defenses & hardening

Troubleshooting

FAQ

Can I brick a device?

Yes. Work non-destructively, back up firmware first, and practice on dev boards before touching anything critical.

Do I need expensive gear?

No. A USB-UART dongle, a logic analyzer, and a tool like Bus Pirate/GreatFET go a long way. Specialized gear helps later.

Is chip removal required?

Often no—many targets allow in-circuit SPI flash reads via SOIC clips. Chip-off is last resort and requires skill.

Devices for Hardware Hacking

Useful references

Legal & ethics: See Ethics for boundaries, authorization, and responsible disclosure.