![BLOG_chalkboard_00623 BLOG_chalkboard_00623](https://www.blackhillsinfosec.com/wp-content/uploads/2023/04/BLOG_chalkboard_00623-1024x576-221x221.png)
reverse engineering
![BLOG_chalkboard_00623 BLOG_chalkboard_00623](https://www.blackhillsinfosec.com/wp-content/uploads/2023/04/BLOG_chalkboard_00623-1024x576-221x221.png)
![00403_09032019_HowToHackHardwareUART 00403_09032019_HowToHackHardwareUART](https://www.blackhillsinfosec.com/wp-content/uploads/2019/08/00403_09032019_HowToHackHardwareUART-1024x576-221x221.png)
How to Hack Hardware using UART
Raymond Felch // Preface: I began my exploration of reverse-engineering firmware a few weeks back (see “JTAG – Micro-Controller Debugging“), and although I made considerable progress finding and identifying the […]
![Lawrence Hoffman](http://www.blackhillsinfosec.com/wp-content/uploads/2016/03/employee-lh.jpg)
Lawrence’s List 081916
Lawrence Hoffman // So Microsoft is open sourcing PowerShell and putting it on Linux. Realistically Linux already has a full suite of administrative tools and some very powerful scripting languages […]
![G&L](http://www.blackhillsinfosec.com/wp-content/uploads/2016/06/GL.jpg)
Lawrence’s List 061016
Lawrence Hoffman // It’s been one of those crazy busy weeks. I always feel like I didn’t get enough time to read articles, surf Reddit, and attempt to keep up […]