icon | cover | coverY | layout | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hand-wave |
0 |
|
This page is a free and collaborative wiki about hardware hacking!
HardBreak Wiki
The goal of HardBreak (https://www.hardbreak.wiki/) is to collect knowledge about Hardware Hacking / IoT hacking in one place. There are many great blogs about Hardware Hacking, but it is a rather unpleasant experience to search through multiple blogs in different formats to find the information you need. HardBreak aims to organize all information in one accessible and easy-to-use platform.
🎉 We just launched our HardBreak Discord Server! 🎉
Join us here 👉 https://discord.gg/AWVsKxJHvQ
If you:
- Want to discuss hardware hacking and IoT security
- Share the project you are working on
- Have feedback or requests for new content on our wiki
Come be a part of our growing community of hardware hackers⚡
{% hint style="success" %} Hey! I’m Jonas Rosenberger, the creator of HardBreak. I’d love to hear your feedback or help out with any projects you’re working on. Feel free to reach out on LinkedIn or Discord (f_3nter)! {% endhint %}
- Introduction
- In this chapter we give you guidance on how to start hardware hacking:
- What first target device to choose
- Essential tools to start with
- Methodology
- A hands on Case Study
- In this chapter we give you guidance on how to start hardware hacking:
- Hardware Hacking
- Top down approach to follow and investigate your device
- Reconnaissance (OSINT, Board Analysis)
- Interface Interaction:
- Bypass Security Mechanisms
- Introduction to Voltage Glitching
- How to analyze Firmware
- Network Analysis
- How to analyze protocols: Reverse Engineering a drone
- Radio Hacking
- Tools (RTL-SDR, Flipper Zero)
- Protocols (RFID, NFC) and how to hack them
We strongly encourage anyone interested to contribute their knowledge and insights. By sharing your discoveries or improving existing content, you help build a valuable resource for everyone.
To contribute:
- Submit a pull request on our GitHub repository
- Help us keep the content accurate—if you notice an error, please report it so we can correct it quickly! Reach out on LinkedIn or Twitter
{% hint style="info" %} Reference the original source or blog whenever you include content from another author. {% endhint %}
Check out our Contribution Guide for a step-by-step tutorial to making your first pull request!
{% hint style="warning" %} While this wiki is built with the best knowledge and intentions from our contributors, it may contain errors. We encourage users to double-check any advice or strategies before applying them in practice. If you spot an issue, please help us by reporting it or making an edit! {% endhint %}
{% hint style="danger" %} The strategies and advice shared on this site are for educational and informational purposes only. They should not be used for any unlawful or harmful activities. We do not endorse or encourage any illegal or unethical conduct. Use the information here responsibly and at your own risk. {% endhint %}
Introduction | How to start | how-to-start.md | ||
Basics | Hardware Hacking Tools | hardware-tools | ||
Hardware Hacking | Extracting Firmware using UART | extract-firmware-using-uart.md | ||
Reverse Engineering | Hacking a drone | parrot-anafi-drone-reverse-engineering.md |