Announcement

Collapse
No announcement yet.

JTAGULATOR

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • JTAGULATOR

    Joe Grand (Kingpin)

    JTAGulator is an open source hardware hacking tool that assists in identifying on-chip debug interfaces from test points, vias, component pads, or connectors on a circuit board.
    http://www.jtagulator.com
    http://www.grandideastudio.com/portfolio/jtagulator

    On-chip debug (OCD) interfaces can provide chip-level control of a target device and are a primary vector used by engineers, researchers, and hackers to extract program code or data, modify memory contents, or affect device operation on-the-fly. Depending on the complexity of the target device, manually locating available OCD connections can be a difficult and time consuming task, sometimes requiring physical destruction or modification of the device.

    JTAGulator is an open source hardware hacking tool that assists in identifying on-chip debug interfaces from test points, vias, component pads, or connectors on a circuit board. It currently supports the detection of JTAG and asynchronous serial/UART interfaces. The tool can save a significant amount of time during reverse engineering, particularly for those who don’t have the resources required for traditional hardware reverse engineering processes, and bridges the gap between gaining physical access to circuitry and exploiting it.

    JTAGulator continues to be updated with new features and functionality. The project welcomes feedback/contributions/pull requests from the community. JTAGulator hardware and core firmware is distributed under a Creative Commons Attribution-3.0 United States license
    (http://creativecommons.org/licenses/by/3.0/us/).

    Supporting Files, Code, etc: Complete design details, documentation, presentations/videos, etc. available at the project page above

    JTAGulator是一个开源硬件黑客工具,它可以帮助从测试点、过孔、组件板或电路板上的连接器识别芯 片上的调试接口。

    详情点击:http://www.jtagulator.com
    https://www.grandideastudio.com/portfolio/jtagulator

    片上调试(OCD)接口可以提供目标设备的芯片级控制,是工程师、研究人员和黑客用来提取程序代码或数据、 修改内存内容或实时影响设备操作的主要载体。

    根据目标设备的复杂性,手动定位可用的OCD连接可能是一项困难且耗时的任务,有时需要对设备进行物理销毁 或修改。JTAGulator是一个开源硬件黑客工具,它可以帮助从测试点、过孔、组件板或电路板上的连接 器识别芯片上的调试接口。它目前支持JTAG和异步串行/UART接口的检测。特别是对于那些没有传统硬件逆向工程过程所需资源的人来说,该工具可以在逆向工程过程 中节省大量时间,并填补了物理访问电路和利用电路之间的空白。JTAGulator不断更新新特性和功能。 该项目欢迎来自社区的反馈/贡献/拉取请求。JTAGulator硬件和核心固件是基于知识共享署名3.0美国许可协议发布的(http://creativecommons.org/licenses/...?/视频等。 目标人群:硬件、进攻、防守硬件黑客攻击地寻找攻击硬件设备的入口。工程师们希望通过使用该工具来测试设备 上的开放接口,从而防御性地识别/分类敞口。

    Target Audience:
    Hardware, Offense, Defense

    Hardware hackers looking offensively for an entry point in which to compromise a hardware device. Engineers looking to defensively identify/classify their exposure by using the tool to test for open interfaces on their devices.

    Joe Grand (@joegrand), also known as Kingpin, is a computer engineer, hardware hacker, DEF CON badge designer, teacher, advisor, runner, daddy, honorary doctor, TV host, member of legendary hacker group L0pht Heavy Industries, and the proprietor of Grand Idea Studio (grandideastudio.com). He has been creating, exploring, and manipulating electronic devices since the 1980s.

    Joe Grand (@joegrand),又名Kingpin,是一名计算机工程师、硬件黑客、DEF CON徽章设计师、教师、顾问、跑步者、爸爸、名誉医生、电视主持人、传奇黑客组织L0pht Heavy Industries的成员、Grand Idea Studio (granddeastudio.com)的所有者。自20世纪80年代以来,他一直在创造、探索和操纵电子设备。

    The Dark Tangent: Use PGP for email Key ID: 0x8B0B476D
    Fingerprint: EA2B 63F9 2219 9171 2AB1 0065 FC59 8B0B 476D
Working...
X