Главная
Study mode:
on
1
Intro
2
Has this ever happened to you?
3
STU-III is born!
4
What about the key?
5
Keceptacle
6
DIY keys?
7
Mechanical reproduction
8
Electrical reproduction
9
PKS-703 Key Reader
10
Verifying connections
11
A few minutes later...
12
Electro-mechanical assembly
13
Simplifying teeth
14
It fits! But does it work?
15
Putting it all together
16
Can we clone this?
17
Improvised CIK-DIP adapter
18
So excited!
19
What if I want a...uniquely designed...t-shirt?
20
WIP: firmware analysis
21
WIP: dynamic anlaysis
22
WIP: misc type 4 devices
Description:
Explore the process of reverse engineering and replicating a secure telephone key for the Motorola Sectel 9600 in this 19-minute Hackaday conference talk. Delve into the history of the STU-III secure telephone, originally developed by the NSA, and learn about the challenges of creating compatible keys for these devices. Discover techniques for analyzing and reproducing both mechanical and electrical components, addressing low-volume manufacturing issues, and developing strategies to overcome obstacles. Follow along as the speaker demonstrates the step-by-step process of fabricating a functional key, from initial analysis to final testing. Gain insights into electromechanical assembly, simplifying complex designs, and verifying connections. The talk also touches on firmware analysis, dynamic analysis, and explores potential applications for other Type 4 devices.

Replicating a Secure Telephone Key

Hackaday
Add to list