Introduction

What?

Understand the protocols that interact directly with a system’s electronic components.

Why?

Target IoT devices at the physical level.

How?

  • UART, JTAG, and SWD exploitation

  • SPI and I2C

  • Firmware hacking