YoVDO

Discovering Debug Interfaces with the JTAGulator Part 2

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Embedded Systems Courses Hardware Security Courses UART Courses JTAG Courses

Course Description

Overview

Explore advanced techniques for discovering debug interfaces using the JTAGulator in this 43-minute Black Hat conference talk. Delve into the intricacies of JTAG, including its architecture, data registers, state machine, and instructions. Learn about software tools for ID code scanning, device identification, and bypass scanning. Witness practical demonstrations using various devices like Linksys WRT54G and Samsung products. Gain insights into UART specifications, asynchronous data transmission, and UART scanning techniques. Discover the limitations of current methods and potential future developments in the field. Acquire valuable resources for further information and engage in a Q&A session to deepen your understanding of debug interface discovery.

Syllabus

Intro
What is JTAG
What is cool about JTAG
What is interesting about JTAG
Fun slide
Architecture
Data Registers
State Machine
Instructions
Protection
Software Tools
ID Code Scan
Device ID
Bypass Scan
Timing with ID Code
Demo
LinksysWRT54G
Samsung
CplD
Samsung SCHI
JTAG Demonstration
UART Spec
TX RX
Asynchronous Data
The Scan
UART Scan Example
Speed
UARTs
Rootshell
USB to Serial
Limitations
Future Work
Where to Get Information
Questions


Taught by

Black Hat

Related Courses

Reversing and Exploiting Embedded Devices - Walking the Software and Hardware Stack
YouTube
Assessing IoT with EXPLIoT Framework - Hardware Hacking Space
Ekoparty Security Conference via YouTube
Introducing Serberus - A Multi-Headed Serial Hardware Hacking Tool
BSidesLV via YouTube
The IoT Hacker's Toolkit
Security BSides San Francisco via YouTube
IoT on Easy Mode - Reversing Embedded Devices
YouTube