Useful Links
Computer Science
Other Tools and Technologies
Hardware Hacking
1. Introduction to Hardware Hacking
2. Foundational Electronics Knowledge
3. Laboratory Setup and Safety
4. Hardware Hacking Toolkit
5. Target Device Reconnaissance
6. Communication Interface Analysis
7. Memory Analysis and Extraction
8. Firmware Analysis Methodologies
9. Reverse Engineering Techniques
10. Vulnerability Discovery and Exploitation
11. Advanced Attack Techniques
12. Firmware Modification and Patching
13. Defensive Countermeasures
Memory Analysis and Extraction
Memory Technology Overview
Volatile Memory Types
SRAM Characteristics
DRAM Variants
Cache Memory Systems
Non-Volatile Memory Types
Flash Memory Technologies
EEPROM Characteristics
FRAM and MRAM
OTP Memory
Memory Interface Protocols
Parallel Memory Interfaces
Address and Data Bus Analysis
Control Signal Functions
Timing Requirements
Serial Memory Interfaces
SPI Flash Memory
I2C EEPROM
Single-Wire Interfaces
Quad-SPI Protocols
In-Circuit Memory Access
Direct Memory Interface Access
Bus Monitoring Techniques
Signal Injection Methods
Timing Synchronization
Debug Interface Memory Access
JTAG Memory Commands
SWD Memory Operations
Boundary Scan Memory Access
Physical Memory Extraction
Chip Removal Techniques
Hot Air Desoldering
Infrared Heating Methods
Mechanical Removal
Socket Programming Methods
Universal Programmer Usage
Adapter Requirements
Programming Verification
Test Clip Interfaces
SOIC Clip Application
TSOP Clip Usage
BGA Probing Techniques
Memory Content Analysis
Raw Data Examination
Hex Dump Analysis
Pattern Recognition
Data Structure Identification
Filesystem Recovery
Partition Table Analysis
File Allocation Methods
Deleted Data Recovery
Encryption and Obfuscation
Encrypted Data Detection
Key Material Search
Obfuscation Pattern Analysis
Previous
6. Communication Interface Analysis
Go to top
Next
8. Firmware Analysis Methodologies