23C3 - 1.5

23rd Chaos Communication Congress
Who can you trust?

Speakers
Hunz
Schedule
Day 3
Room Saal 2
Start time 17:15
Duration 01:00
Info
ID 1622
Event type Lecture
Track Hacking
Language English
Feedback

Void the warranty!

How to start analyzing blackboxes

We're surrounded by blackboxes containing digital technology nowadays. There are complex devices like cell phones as well as more simple ones that don't look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.

The intention of this lecture is showing the listener that it's possible to analyse and mess around with a wide range of devices at home and how to do this.

Thus low-cost and homebrewn hardware tools are used as far as possible. Enabling the listener to design such hardware is also an ambition of this talk. The JTAG-Finder can be given as an example here.

The lecture will also point out some of the common problems during the research, and ideas on how to deal with them (e.g. acquiring data in realtime and getting it into a PC for the analysis). Various example projects of different complexities along with the procedure of analysis and modification will be explained throughout the lecture.

Recovering a lost PIN-number from a DECT-station or circumventing a printer's anti-refill technology are less complex examples while connecting a (non-DMA) PCMCIA (or CompactFlash) card to a common microcontroller is a more complex one.

Archived page - Impressum/Datenschutz