JTAG may be almost 30 years old with little change, but that doesn’t mean most people really understand what it does and how. This workshop will start with a brief introduction to what JTAG really is, then quickly dive into some hands-on practice with finding, wiring, and finally exploiting a system via JTAG.
For this workshop, we’ll target a Raspberry Pi with an ARM microprocessor. In order to interact with the system, we’ll use a JTAG interface cable from FTDI. We won’t do any hardware modifications, but we will hook up wires in weird and wonderful ways to make the Raspberry Pi do things it otherwise shouldn’t.
All hardware and software is provided for use during the workshop. Familiarity with low-level programming is incredibly helpful but not essential..
Some of the materials are available on GitHub.
- Applied Physical Attacks 1: Embedded and IoT Systems
- Hardware Attacks, Risks, Threats, and Mitigations
- Applied Physical Attacks 4: Hardware Implants
- Hands-on JTAG for Fun and Root Shells!
- Applied Physical Attacks 2: Hardware Pentesting
- Applied Physical Attacks 3: Rapid Prototyping
- Applied Physical Attacks on a Raspberry Pi
- Side Channel Attacks for Hardware N00BZ
- Applied Physical Attacks and Silicon Defenses
- WTFpga
- Applied Physical Attacks on x86 Systems