Announcement

Collapse
No announcement yet.

JTAGULATOR

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • JTAGULATOR

    Joe Grand (Kingpin)

    JTAGulator is an open source hardware hacking tool that assists in identifying on-chip debug interfaces from test points, vias, component pads, or connectors on a circuit board.
    http://www.jtagulator.com
    http://www.grandideastudio.com/portfolio/jtagulator

    On-chip debug (OCD) interfaces can provide chip-level control of a target device and are a primary vector used by engineers, researchers, and hackers to extract program code or data, modify memory contents, or affect device operation on-the-fly. Depending on the complexity of the target device, manually locating available OCD connections can be a difficult and time consuming task, sometimes requiring physical destruction or modification of the device.

    JTAGulator is an open source hardware hacking tool that assists in identifying on-chip debug interfaces from test points, vias, component pads, or connectors on a circuit board. It currently supports the detection of JTAG and asynchronous serial/UART interfaces. The tool can save a significant amount of time during reverse engineering, particularly for those who don’t have the resources required for traditional hardware reverse engineering processes, and bridges the gap between gaining physical access to circuitry and exploiting it.

    JTAGulator continues to be updated with new features and functionality. The project welcomes feedback/contributions/pull requests from the community. JTAGulator hardware and core firmware is distributed under a Creative Commons Attribution-3.0 United States license
    (http://creativecommons.org/licenses/by/3.0/us/).

    Supporting Files, Code, etc: Complete design details, documentation, presentations/videos, etc. available at the project page above

    JTAGulator是一个开源硬件黑客工具,它可以帮助从测试点、过孔、组件板或电路板上的连接器识别芯 片上的调试接口。

    详情点击:http://www.jtagulator.com
    https://www.grandideastudio.com/portfolio/jtagulator

    片上调试(OCD)接口可以提供目标设备的芯片级控制,是工程师、研究人员和黑客用来提取程序代码或数据、 修改内存内容或实时影响设备操作的主要载体。

    根据目标设备的复杂性,手动定位可用的OCD连接可能是一项困难且耗时的任务,有时需要对设备进行物理销毁 或修改。JTAGulator是一个开源硬件黑客工具,它可以帮助从测试点、过孔、组件板或电路板上的连接 器识别芯片上的调试接口。它目前支持JTAG和异步串行/UART接口的检测。特别是对于那些没有传统硬件逆向工程过程所需资源的人来说,该工具可以在逆向工程过程 中节省大量时间,并填补了物理访问电路和利用电路之间的空白。JTAGulator不断更新新特性和功能。 该项目欢迎来自社区的反馈/贡献/拉取请求。JTAGulator硬件和核心固件是基于知识共享署名3.0美国许可协议发布的(http://creativecommons.org/licenses/...
    PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A
Working...
X