Chapter 6: Sniffing and Attacking the Most Common Protocols

Now that we've seen how to program the chip, let's apply it to an application and use it to actually start attacking systems. We will do that by looking into a number of standard protocols that are used to communicate between chips and the outside world. They usually define only the physical layer for chip-to-chip communication and (almost) never go into higher levels of abstractions. In this chapter, we will learn how to operate, sniff, and attack I2C, SPI, UART, and Dallas 1-Wire (D1W).

In this chapter, we will cover the following topics:

  • Understanding I2C
  • Understanding, sniffing, and attacking SPI
  • Understanding, sniffing, and attacking UART
  • Understanding, sniffing, and attacking ...

Get Practical Hardware Pentesting now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.