Главная
Study mode:
on
1
Intro
2
The target group
3
Why I use OpenOCD?
4
My reverse engineering rules
5
Short investigation: History of JTAG
6
boundary scan
7
BSDL Example 1
8
The road map
9
Exploring JTAG port (time frames)
10
Exploring JTAG port (Allwinner JTAG/SD)
11
Exploring JTAG port (Open Sesame)
12
Exploring the internals
13
Find the right TAP
14
Find the right Instruction
15
Find the right Bits
16
Exploring JTAG port (BS on STM32)
17
Exploring JTAG port (GPIO + BS on STM32)
18
Exploring JTAG port (GPIO + BS on PIC32)
19
Exploring JTAG port (GPIO + BS on IMX6)
20
Exploring JTAG on iMX6
Description:
Explore advanced applications of OpenOCD beyond simple software debugging in this informative conference talk. Delve into unconventional use cases, including utilizing Boundary Scan for software configuration testing, hardware troubleshooting techniques, and combining OpenOCD with tools like IDA Pro or radare2 for reverse engineering and debugging. Gain insights into the history of JTAG, learn how to explore JTAG ports on various platforms, and discover methods for finding the right TAP, instruction, and bits. Follow along as the speaker demonstrates practical examples using STM32, PIC32, and IMX6 devices, providing inspiration and ideas for embedded developers and hackers to expand their OpenOCD toolkit.

OpenOCD - Beyond Simple Software Debugging

Linux Foundation
Add to list