Chapter 6: Sniffing and Attacking the Most Common Protocols

Now that we've seen how to program the chip, let's apply it to an application and use it to actually start attacking systems. We will do that by looking into a number of standard protocols that are used to communicate between chips and the outside world. They usually define only the physical layer for chip-to-chip communication and (almost) never go into higher levels of abstractions. In this chapter, we will learn how to operate, sniff, and attack I2C, SPI, UART, and Dallas 1-Wire (D1W).

In this chapter, we will cover the following topics:

  • Understanding I2C
  • Understanding, sniffing, and attacking SPI
  • Understanding, sniffing, and attacking UART
  • Understanding, sniffing, and attacking ...

Get Practical Hardware Pentesting now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.