Godzilla Vs. Kong Vs … Ghidra? - Ghidra Scripting, PCode Emulation, and Password Cracking on a GBA ROM Overview This month Godzilla Vs. Kong is being released. As a long-time Toho/kaiju fan, I th...
A first look at Ghidra’s Debugger - Game Boy Advance Edition Overview Yesterday the NSA Twitter account announced that a new branch of Ghidra has been release with the long-awaited debugging capa...
Background / Catching Up Over the last few months, those of you who follow my ramblings here have probably noticed a serious lack of content (4 months!). When I started this project I wanted to tr...
Background To follow up on my last post about SWD and hardware debugging, I wanted to do a deep dive into JTAG from a reverse-engineering perspective. The previous post received a lot of great fee...
Background In my last post, we managed to dump the firmware off of an Xbox One controller by using the Single Wire Debug interface. Now that we have the firmware image as well as the target CPU de...
Background I was looking around my apartment for potential targets for my next post and was pleasantly surprised to find the following XBox One controller still in the packaging: I don’t really ...
Overview Over the holiday break, I received a few more random game platforms from friends and family who know how much I enjoy tearing into these things. While I didn’t find anything amazing or ins...
BasicFUN MK Teardown Part 1: Flash Extraction Background I noticed not too long ago that a new BasicFUN cabinet came out featuring one of my favorite childhood games: Mortal Kombat. This of cours...
Router Analysis Part 1: Hardware Teardown Overview In previous posts, we’ve gone over how to tear down Arcade cabinets containing SPI Flash as well as how to dissect the data that was extracted f...
Using Buildroot for Reverse Engineering Overview When reverse engineering an embedded system that is Linux based, one often wishes that they had an examplar system that could be virtualized, if o...