Attacking Embedded Devices

From Exploitee.rs
Jump to navigationJump to search

"Although the information we release has been verified and shown to work to the best our knowledge, we cant be held accountable for bricked devices or roots gone wrong."

Attacking Embedded Devices

This page is intended to be a set of resources on attack types, methodologies, and general embedded device hacking principles. This should include information for beginners on intro topics like how to solder and recommended hardware.

Beginner Topics

Hardware Hacking

Methodology

Tools

Debug Protocols

Flash Storage

Firmware/Software Hacking

Acquiring Firmware Updates

The Easy Way

Firmware can often be found on the manufacturer's official website, along with patch notes, user manuals, and heavily abridged 'Data Sheets' that may occasionally include some interesting information about the device.

The Fun Way

Some devices attempt to prevent self-updating by limiting access to the firmware and pushing out updates to devices connected to the internet. Thankfully, programs like WireShark can be used to record the information sent from the manufacturer to the device.

Reverse Engineering