With this post, I hope to explain how to set up a development environment for the latest Ghidra release on Ubuntu 20.04. After following the steps outlined below, we will have the ability to write, debug and export custom Ghidra plugins, modules, and scripts.| VoidStar Security Blog
In this post, I want to demonstrate and explain the following, Using pre-existing Ghidra scripts to aid in your analysis, Writing your own scripts to automate analysis tasks,Utilize and emulate Ghidra's intermediate language PCode to aid in your analysis| VoidStar Security Blog
This post covers the basics of manually extracting data from I2C and parellel flash interfaces. We will use commodity tools to extract data from our exemplar targets and learn more about how they work.| VoidStar Security Blog
Hacking a Low-Cost Electric Toothbrush| Voidstar Security Research Blog
JTAG for Reverse Engineers| Voidstar Security Research Blog
This blog entry aims to familiarize readers with locating an active UART on a target system, how to approach a UBoot console, and ultimately how to leverage both of these components to extract the flash memory from our target. After reading this, readers will be familiar with the screen utility the depthcharge python3 libraries.| VoidStar Security Blog
This post reviews some of the tools needed when setting up a lab for reverse engineering embedded systems. There will be two sections, one for hardware tools and one for software tools. After reading this blog post, the reader should know what is needed to set up an introductory lab for reverse engineering embedded systems and firmware images.| VoidStar Security Blog