23C3 - 1.5
23rd Chaos Communication Congress
Who can you trust?
Speakers | |
---|---|
Hunz |
Schedule | |
---|---|
Day | 3 |
Room | Saal 2 |
Start time | 17:15 |
Duration | 01:00 |
Info | |
ID | 1622 |
Event type | Lecture |
Track | Hacking |
Language | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Void the warranty!
How to start analyzing blackboxes
We're surrounded by blackboxes containing digital technology nowadays. There are complex devices like cell phones as well as more simple ones that don't look very digital at all. This lecture shall motivate the listener to take more electronic things apart, examine the mode of operation and modify it.
The intention of this lecture is showing the listener that it's possible to analyse and mess around with a wide range of devices at home and how to do this.
Thus low-cost and homebrewn hardware tools are used as far as possible. Enabling the listener to design such hardware is also an ambition of this talk. The JTAG-Finder can be given as an example here.
The lecture will also point out some of the common problems during the research, and ideas on how to deal with them (e.g. acquiring data in realtime and getting it into a PC for the analysis). Various example projects of different complexities along with the procedure of analysis and modification will be explained throughout the lecture.
Recovering a lost PIN-number from a DECT-station or circumventing a printer's anti-refill technology are less complex examples while connecting a (non-DMA) PCMCIA (or CompactFlash) card to a common microcontroller is a more complex one.