Exploit Bridge User Guide

1. Overview

  • Purpose: This guide provides instructions for connecting and using the Exploit Bridge by Exploit Security.
  • Target Audience: This guide is designed for hackers and ethusiasts alike.
  • Exploit Bridge: This Exploit Bridge was initially designed by Exploit Security for their field operatives. It's basic functionality is that of a USB to UART and SPI bridge. It allows for its user to interact with a device or component for troubleshooting and security research purposes.

2. UART Usage

  • Connection: Connection of a USB-C cable between the Exploit Bridge and the testers PC
  • Physical UART Connection: After determining a valid UART interface on the target device, correctly wire from the Exploit Bridge to the target device.

  • Interfacing using terminal emulator: Using your choice of terminal emulator interfacing with your target device is now possible.

3. SPI Usage

  • Physical SPI Connection: After connection of a USB-C cable between the Exploit Bridge and the testers PC has been established and determination of a valid SPI chip, correctly wire from the Exploit Bridge to the target device.

  • Interfacing using the flashrom utility: Documentation and Downloads can be found Flashrom
  • Example Utility Command used for pulling flash: This will vary depending on your USB device and flash chip being interfaced with
flashrom -p ft2232_spi:type=2232H,port=A -c <chip type> -r output.bin

4. SDCARD Slot

  • SDCARD: This slot can be used to support a micro-sdcard. When mounted on your system can be used to read and write to this for mass storage usage.

5. Maintenance and Handling

  • Handling Precautions:
    • Use ESD-safe tools and wear an anti-static wrist strap when handling the Exploit Bridge to avoid damaging sensitive components.
  • Cleaning and Storage:
    • Store the board in an anti-static bag to prevent damage.