icon |
---|
magnifying-glass |
In this chapter we demonstrate on how to enumerate a device. It makes sense to follow a top down approach and start analyzing from the outside first before opening a device. Opening a unknown device comes always at the risk of triggering a tamper protection or damaging it. Even without opening the device we can already identify potential weaknesses.
- Closed device
- OSINT:
- search the web for public information
- use FCCID.io to get internal pictures of your device
- Investigate USB Ports / SD-card
- OSINT:
- Opened device
- Board Analysis:
- Things to look out for on the PCB:
- How to identify test pads as potential debug interfaces
- component identification (flash chips, MCUs, wireless modules)
- Things to look out for on the PCB:
- Board Analysis: