Intro to IOT Hardware Hacking

When we talk about hardware hacking — we have physical device as attack surface, we have embedded devices to pentest on, One may try to start pentesting that piece of hardware by enumeration some useful information with the help of few tools will be listed below.

By opening the casing of device there’s a motherboard on which all the circuitry is present which can give us an how the device works like what IC the device is using. Once you get the name of IC you can start looking for the DATA Sheet of that particular IC and understand it’s working and move further by analyzing the device.

It is possible that you can get easy shell on the device with UART device as most of the devices revel their RXD and TXD pins, it is possible that someone can get shell via these pins through Serial connection.

You will need to gain access to the hardware’s electronics. This is bit more involved since a lot of devices are physically designed to make it difficult to access the embedded electronics. They have hard plastic shells and hidden screws that require uncommon bits to open.

Finally using the following hardware tools you will identify debug ports and serial protocol interfaces, dump firmware, and reverse engineer the target device.

These tools will allow you to explore your target device through the hardware’s various serial bus interfaces or allow you to dump the firmware image from the device for reverse engineering the software. The firmware image is a compressed file, containing the operating system and its files, it may contain interesting things like the code to the web interface that most these devices have. You can then run that dumped code and reverse engineer it on an emulator like QEMU http://wiki.qemu.org/Main_Page

Some of the main serial bus interfaces that the following hardware tools can connect to are

JTAG http://concerts.livenation.com/

< < Some Hardware tools > >

USB to TTL converter

It is a combination of two products: USB to RS232 Adapter (USB-232–2) utilizing the FTDI chipset and the RS232 to 5V TTL Converter (TTL-232–5P). It can convert any standard full duplex USB port to a 5V TTL signal in either direction. The unit is powered from the USB port and requires no external power.

You can get this for one for yourself here —

https://www.amazon.in/PL2303-Converter-Adapter-Aurdino-Raspberry/dp/B00UZERG94

Logic Analyzer

A logic analyzer is an electronic instrument that captures and displays multiple signals from a digital system or digital circuit. A logic analyzer may convert the captured data into timing diagrams, protocol decodes, state machine traces, assembly language, or may correlate assembly with source-level software.

You can get one yourself here —

https://www.amazon.in/Xsentuals-24MHz-Logic-Analyzer-Arduino/dp/B0845TVBBP/ref=sr_1_3?dchild=1&keywords=logic+analyzer&qid=1618837137&sr=8-3

Shikra

This device is touted as a more stable tool compared to the Bus Pirate. The hardware is very reliable and stable for connecting to UART, JTAG, and SPI. Many people in the Software Exploitation via Hardware Exploitation community really enjoy using this somewhat lesser known device and is used in the SEXviaHEX http://www.sexviahex.com/ training.

If you want to pull the firmware image off a target IoT device for software exploitation then the Shikra is a great tool for the job. Just connect the Shikra to the target device’s SPI chip. You may need an 8-pin SOIC clip to connect the Shikra to the SPI interface.

https://www.blackhillsinfosec.com/hardware-hacking-with-shikra/

In the how to use guide linked above, it was claimed to have taken the Bus Pirate 30 minutes to dump a 4MB firmware image off a device compared to just under a minute for the Shikra to do the same job. The Shikra may be something less people are familiar with, but it provides consistent, powerful and fast performance for certain jobs.

Bus Pirate

This is one of the most widely used tools out there right now. At the time of this blog’s posting the Bus Pirate version 4 official firmware development seems to have been abandoned. This has caused a lot of headaches for users struggling to get features to work on version 4 as well as they did on version 3. For example some people have had difficulties with getting JTAG support to work on version 4.

As stated in the documentation link, the version 3 firmware has a strong community effort behind it. As long as there is a strong community backing this tool that community will be committed to fixing and maintaining the firmware of the Bus Pirate. Overall the Bus Pirate is a vey robust tool. Finding someone to help you use it will not be hard.

JTAGulator

Besides looking badass this tool is great for identifying what the the different pinouts and chips do on the target device. When you open up the device it is not going to be obvious what pinouts and chips run which serial protocols. Testing each one with the JTAGulator will help you find your UART, JTAG, SPI, and other serial protocol interfaces.

Facedancer21

Not every IoT device is going to have a USB port, but this tool can be very useful when one is available. The Facedancer, besides having a cool name, essentially lets your computer become the USB drive plugged into a device. Within this emulation you can communicate to the target device over the USB bus with Python. Devices often trust USB drives plugged into them so exploring the target device from this perspective can be very rewarding.

Oscilloscope

An oscilloscope allows you to watch how the voltage between two points in a circuit varies over time. For example, if you were to probe a sinusoidal voltage, your oscilloscope might display something similar to Figure 2. The most popular modern oscilloscope is the digital storage oscilloscope (DSO).

Note: This thing is not so cheap and it is not mandatory if you are not making your own piece of electronics.

Some Important Tools

- A set of screw driver
- Probers and Jumper Wires
- A sharp Knife
- Pliers and wire strippers

i would like to thank Hackers Arcade for sharing this blog:(https://hackersarcade.tech/blog/)

Make sure you follow me on This Platform to stay updated with more such informative articles on Hacking - Zeus

I am a Penetration Tester, Currently pursuing OSCP. Skilled in Network Pen-testing and Developing Hacking Tools using Python.I Share my Knowledge on YouTube