New Class Dates – /dev/ttyS0
New Embedded Device Exploitation class dates have just been announced: August 14th and 15th, 2012. Sign up now!
New Embedded Device Exploitation class dates have just been announced: August 14th and 15th, 2012. Sign up now!
We’ve just added a forums section to the devttyS0 site! Feel free to post your questions, ideas, projects, or anything else related to hardware, firmware, or embedded systems in general.
In preparation for our Embedded Device Exploitation classes, I’ve just released my latest project, the Gumbi board: New Gumbi boards, fresh off the press The Gumbi board provides a flexible USB interface to the real world in the form of 64 digital I/O pins – all controllable from the comfort… Continue reading
A bit of old-school hacking today. 🙂 I picked up an old J.H. Bunnell telegraph relay, which from what I’ve been able to deduce is a mainline type 2-3 relay made sometime in the late 1800’s. It was missing a few parts, but a binding post from the junk box… Continue reading
Reaver Pro is now available in Hak5’s HakShop! Get ’em while they’re hot!
We just opened registration for our first embedded exploitation class on June 7th & 8th, 2012! In addition to training attendees will receive plenty of goodies to take home, including a customized virtual machine, hardware hacking tools, and more. More details are available on the registration page. See you there!
I was recently working on some uClinux-based devices and needed to disassemble some of the binaries in the firmware. Unfortunately, IDA doesn’t have a loader for the bFLT file format used by uClinux: No bFLT Loader Fortunately, I was able to find a bFLT loader over at rockbox.org. Unfortunately this… Continue reading
As some of you are aware, we’ve been working on creating an embedded systems hacking course. We’ve been busy lately putting together a few invitation-only classes and have gotten some great feedback from our students. The two day beginner’s course is designed to introduce students to hardware and firmware analysis,… Continue reading
Being able to emulate embedded applications in Qemu is incredibly useful, but not without pitfalls. Probably the most common issue that I’ve run into are binaries that try to read configuration data from NVRAM; since the binary is running in Qemu and not on the target device, there is obviously… Continue reading
The decision has been made to open source the Reaver command line tool. The commercial version will contain the all the features the open source command-line tool has along with a web based client, support, and service options. This means that the open source version of Reaver will have much… Continue reading