Category

Hardware Hacking

blue depth
blue depth
Parity bit

Reinventing UART Security: Leveraging the Parity Bit for Robust Protection in OT Networks

A practical and innovative approach to securing UART-based communication in OT networks—without replacing existing infrastructure. I outline the critical vulnerabilities found in legacy UART protocols, including sniffing, injection, replay, and man-in-the-middle attacks, and explain why traditional IT security solutions don’t work in these environments. Instead, I introduce a new method that leverages the UART parity bit as a lightweight mechanism for authentication, synchronization, and encryption. Through three techniques—ParityLock, BaudMorph, and CipherBit—I demonstrate how we can significantly enhance UART security using existing protocol features, with minimal performance impact and no need for hardware changes.

Dive in
trojan horse

Trojan Horse Implementation in Hardware

When I speak about Hardware Hacking and its crucial role in the safety of our future, I always get asked a version of: “Why can’t I just use tools like Flipper Zero and do what hackers do, without going through the effort and dedication you are talking about?” It’s a fair question for someone new to Hardware Hacking, but it also points out a major misconception about what it means to truly be a hacker. I call these people Mimickers—those who rely on pre-made devices to mimic what they think hacking is.

Dive in
Hardware hacking tool kit

Best starter Hardware Hacking Toolkit

A practical guide to building your first hardware hacking toolkit. From screwdrivers and wire cutters to logic analyzers and oscilloscopes, it outlines essential tools for beginners—focusing on quality, usefulness, and avoiding overkill. A must-read for anyone starting in hardware hacking.

Dive in

You can learn for free

We’ll keep you up to date with the latest trends, free content and discounts

Pavel Yosifovich

Software developer, trainer, consultant, author, and speaker. Co-author of “Windows Internals” 7th edition (2017). Author of “Windows Kernel Programming, 2nd ed” (2023), “Windows 10 System Programming Part 1” (2020) and Part 2 (2021).

@zodiacon

Uriel kosayev

Uriel Kosayev

Security researcher, consultant, and the author of the Antivirus Bypass Techniques book who lives both on the offensive and defensive fronts. Passionate about malware research, and red teaming while providing real-world security solutions. 

@MalFuzzer

Amichai Yifrach

Amichai Yifrach

30+ years of hands-on experience, Inventor, systems & electronics engineer, expert program manager, coder, cyber security researcher and startups mentor. Expert in Hardware-firmware-software integrated systems development

@The_H1tchH1ker