Difference between revisions of "Attify Badge IoT Hacking Device:MAERehim"
Line 38: | Line 38: | ||
== Exploit by SPI == | == Exploit by SPI == | ||
1. Select the desired operation from the drop-down menu. | 1. Select the desired operation from the drop-down menu. | ||
2. For read/write commands, enter the path of the file where the data will be saved or read. An example of a path is ~/files/firmware.bin. | 2. For read/write commands, enter the path of the file where the data will be saved or read. An example of a path is ~/files/firmware.bin. |
Revision as of 21:41, 21 November 2021
Summary
This documentation describes basic information about the Attify Badge. General functionalities / hardfacts about the Badge and a set up example, where the Badge is used to exploit an IoT Device.
Introduction
Attify Badge is a dedicated hardware security assessment utility developed by Attify that enables communication between a PC and an embedded device over various hardware communication protocols. The Attify Badge uses an FTDI chip that supports a variety of communication protocols and standards including UART, SPI, I2C, 1-Wire and JTAG. This allows an interaction with any IoT/embedded device that has one or more hardware communication ports. It supports both 3.3V and 5V, making it suitable for a wide range of target devices.
Requirements
Devices: Attify Badge, IoT Device
Operating system: Ubuntu OS
Software: Attify Badge Tool
Supported Exploitation Interfaces
Universal Asynchronous Receiver Transmitter (UART)
Serial Peripheral Interface (SPI)
Joint Test Action Group (JTAG)
Inter-Integrated Circuit (I²C)
General Purpose Input/Output (GPIO)
Exploit by UART
1. Register the external USB device connected to the system and add it to the combo box at the top left of the user interface.
2. Select the USB port to which the device is connected and the baud rate to be used.
3. Once you have selected the desired baud rate, press Enter to connect to the device. the data received from the UART device will be displayed in a black console window. You can use the input fields below it to interact with the device. In the combo box at the bottom right, you can select the line termination for each line you want to send to the device.
Exploit by SPI
1. Select the desired operation from the drop-down menu.
2. For read/write commands, enter the path of the file where the data will be saved or read. An example of a path is ~/files/firmware.bin.