Difference between revisions of "Sniffing Devices"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 38: Line 38:
** [[Saleae Logic 8 USB Logic Analyzer]] - 8 channel Logic analyzer is a debugging tool used to record and view digital signals with a sample rate of 100 MSPS  
** [[Saleae Logic 8 USB Logic Analyzer]] - 8 channel Logic analyzer is a debugging tool used to record and view digital signals with a sample rate of 100 MSPS  
** [[FPGA ZYBO Z7-20 Zynq-7020 Dev Board]] -  Zybo Z7 is a feature-rich, ready-to-use embedded software and digital circuit  
** [[FPGA ZYBO Z7-20 Zynq-7020 Dev Board]] -  Zybo Z7 is a feature-rich, ready-to-use embedded software and digital circuit  
* [[Attify Badge IoT Hacking Device]] - supported protocols: UART, SPI, JTAG, I2C, GPIO for offensive IOT exploitation
** [[GreatFET One]] - Hardware Hackers friend, USB peripherial to interface an external chip, a logic analyzer, a debugger, or just a whole lot of pins to bit-bang. The GreatFET project produces interface tools for hardware hacking, making, and reverse engineering.
* [[Bus Pirate v3.6 Universal serial interface]] - 1-Wire, I2C, SPI, JTAG, asynchronous serial (UART), MIDI, PC keyboard, HD44780 LCDs, and generic 2- and 3-wire libraries for custom protocols
* [[C232HM-DDHSL-0 USB to MPSSE Serial cable 3.3V 0.5m]] - USB Hi-Speed Multi Protocol Synchronous Serial Engine (MPSSE) Cables - JTAG, SPI, I2C,
* [[Adafruit General Purpose USB to GPIO/SPI/I2C FT232H Breakout]]


* Firmware Aquisition
** [[Attify Badge IoT Hacking Device]] - supported protocols: UART, SPI, JTAG, I2C, GPIO for offensive IOT exploitation
** [[Bus Pirate v3.6 Universal serial interface]] - 1-Wire, I2C, SPI, JTAG, asynchronous serial (UART), MIDI, PC keyboard, HD44780 LCDs, and generic 2- and 3-wire libraries for custom protocols
** [[Segger J-Link V8]] - USB JTAG Emulator device used to flash, program and debug ARM-based chipsets
** [[JTAGulator]] -  On-chip debug (OCD) interface to extract program code or data, modify memory contents, or affect device operation on-the-fly
==  Wireless Technologies ==
==  Wireless Technologies ==
* WiFi
* WiFi

Revision as of 19:58, 15 November 2022

Summary

This documentary mentions sniffing devices of the Elvis Lab maintained at the date of 19-12-2021.

Wired Technologies

  • USB
  • LAN
  • cable connected IoT protocols

USB

LAN - Ethernet

Cable connected IoT protocols

  • Logic Analyzer
    • Saleae Logic 8 USB Logic Analyzer - 8 channel Logic analyzer is a debugging tool used to record and view digital signals with a sample rate of 100 MSPS
    • FPGA ZYBO Z7-20 Zynq-7020 Dev Board - Zybo Z7 is a feature-rich, ready-to-use embedded software and digital circuit
    • GreatFET One - Hardware Hackers friend, USB peripherial to interface an external chip, a logic analyzer, a debugger, or just a whole lot of pins to bit-bang. The GreatFET project produces interface tools for hardware hacking, making, and reverse engineering.
  • Firmware Aquisition
    • Attify Badge IoT Hacking Device - supported protocols: UART, SPI, JTAG, I2C, GPIO for offensive IOT exploitation
    • Bus Pirate v3.6 Universal serial interface - 1-Wire, I2C, SPI, JTAG, asynchronous serial (UART), MIDI, PC keyboard, HD44780 LCDs, and generic 2- and 3-wire libraries for custom protocols
    • Segger J-Link V8 - USB JTAG Emulator device used to flash, program and debug ARM-based chipsets
    • JTAGulator - On-chip debug (OCD) interface to extract program code or data, modify memory contents, or affect device operation on-the-fly

Wireless Technologies

  • WiFi
  • Bluetooth LE (advertising only)
  • 802.15.4 (used by Zigbee, Xbee, 6LoWPAN)
  • ZWave (European frequency, 868MHz)
  • RFID + NFC

Wireless WiFi

802.11ac WiFi, Bluetooth 4.2

Bluetooth

Zigbee

802.15.4 (Zigbee, 6LoWPAN)

Z-Wave

LoRa

Wireless access point

RFID + NFC

  • Proxmark 3- for sniffing in low frequency ( 125kHz and 134kHz) and high frequency (13.56mHz) bands