Intro to hardware security: UART access and SPI firmware extraction

Описание к видео Intro to hardware security: UART access and SPI firmware extraction

This is an introduction to hardware security for beginners. I will show you how to connect to the Linux terminal of a TP-Link wireless router using UART, and also how to dump its firmware using a SPI programmer. My aim has been to use the most affordable and accessible tools, so everyone can start without breaking the bank.

As promised in the video, here’s the list of tools that I used or mentioned:

The target: https://www.tp-link.com/us/home-netwo...
The advanced UART adapter that I mentioned: https://www.crowdsupply.com/pylo/muart
Programmer I used to dump the firmware: https://github.com/boseji/CH341-Store
Software I used to dump the firmware: https://flashrom.org/Flashrom
Software used to extract the firmware contents: https://github.com/ReFirmLabs/binwalk
For the UART you can use any USB-UART adapter (sometimes called USB to TTL). I used an adapter based on PL2303, but FT232 is more common (the one with the 3.3/5v switch was based on FT232)

If you need more guides, check these out:
https://www.thezdi.com/blog/2019/9/2/...
https://nvisium.com/blog/2019/08/07/e...
https://jcjc-dev.com/2016/04/08/rever...
https://blog.rapid7.com/2019/02/20/io...

I had to cut some corners to prepare a short and easy to understand video. For example I skipped the part on detecting the UART pins on the boards using an oscilloscope or logic analyzer.
If you have questions or comments, you can reach me via Twitter:   / mehdi0x61  

Комментарии

Информация по комментариям в разработке