icon | cover | coverY | layout | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hand-wave |
0 |
|
This page is a free and open-source wiki about hardware hacking!
HardBreak Wiki
The goal of HardBreak (https://www.hardbreak.wiki/) is to collect knowledge about Hardware Hacking / IoT hacking in one place. There are many great blogs about Hardware Hacking, but it is a rather unpleasant experience to search through multiple blogs in different formats to find the information you need. HardBreak aims to organize all information in one accessible and easy-to-use platform.
- Introduction
- In this chapter we give you guidance on how to start hardware hacking:
- What first target device to choose
- Essential tools to start with
- Methodology
- A hands on Case Study
- In this chapter we give you guidance on how to start hardware hacking:
- Hardware Hacking
- Top down approach to follow and investigate your device
- Reconnaissance (OSINT, Board Analysis)
- Interface Interaction:
- Bypass Security Mechanisms
- Introduction to Voltage Glichting
- How to analyze Firmware
- Network Analysis
- How to analyze protocols: Reverse Engineering a drone
- Radio Hacking
- Tools (RTL-SDR, Flipper Zero)
- Protocols (RFID, NFC) and how to hack them
We strongly encourage anyone interested to contribute their knowledge and insights. By sharing your discoveries or improving existing content, you help build a valuable resource for everyone.
To contribute:
- Submit a pull request on our GitHub repository
- Help us keep the content accurate—if you notice an error, please report it so we can correct it quickly! Reach out on LinkedIn or Twitter
{% hint style="info" %} Reference the original source or blog whenever you include content from another author. {% endhint %}
Check out our Contribution Guide for a step-by-step guide to making your first pull request!
{% hint style="warning" %} While this wiki is built with the best knowledge and intentions from our contributors, it may contain errors. We encourage users to double-check any advice or strategies before applying them in practice. If you spot an issue, please help us by reporting it or making an edit! {% endhint %}
{% hint style="danger" %} The strategies and advice shared on this site are for educational and informational purposes only. They should not be used for any unlawful or harmful activities. We do not endorse or encourage any illegal or unethical conduct. Use the information here responsibly and at your own risk. {% endhint %}
Introduction | How to start | how-to-start.md | ||
Basics | Hardware Hacking Tools | hardware-tools | ||
Hardware Hacking | Extracting Firmware using UART | extract-firmware-using-uart.md | ||
Reverse Engineering | Hacking a drone | parrot-anafi-drone-reverse-engineering.md |