Accessing and Dumping Firmware Through UART

Accessing and Dumping Firmware Through UART

| | Threat Research
Introduction In the first part of my hardware hacking series, we discussed dumping firmware through the SPI flash chip. In this post, we will review the process of accessing and dumping the firmware of a ... Read More
An Introduction to Hardware Hacking

An Introduction to Hardware Hacking

| | Threat Research
With the introduction of more and more IOT and embedded devices in the market, hackers are starting to find firmware exploitation as a more viable mechanism for gaining access into networks and taking over machines ... Read More