Quantcast
Channel: eeprom – Dangerous Prototypes
Viewing all articles
Browse latest Browse all 23

Demystifying hardware security with the Bus Pirate

$
0
0

Figure 13

Alain Iamburg over at FishNet Security writes:

Welcome to Part III of this series on hardware security. In Part II we explored passive data captures of EEPROM read operations over the SPI bus. In this installment, we will be looking at techniques for actively probing and communicating with such chips.
Memory chips can contain interesting data. You can find firmware, device configurations such as passwords or network addresses, and so on.

The tool of choice for this post is the Bus Pirate. This device can be used to interface with a wide range of chips using various low-level communication protocols, and it supports both interactive and binary modes. Think of it as a hardware hacker’s multi-tool.

Get an assembled Bus Pirate for $30, including world-wide shipping. Also available from our friendly distributors.


Viewing all articles
Browse latest Browse all 23

Trending Articles