So, question for the hardware hacking community out there!

I'm looking at an ECE dual degree, for the sake of going down the hardware hacking path, anyone have any insights on this?

#hardwarehacking #electricalengineering #computerengineering #hacker #hardware

There's a pretty nice ongoing #hardwarehacking project called the Evertop

"an ultra lower power, ultra long battery solar PC"

https://github.com/ericjenott/Evertop

Runs off an ESP32 with an e-Ink display and has a solar panel on the back.

"Evertop is a portable PC that emulates an IBM XT with an 80186 processor and 1MB RAM. It can run DOS, Minix, and some other old 1980s operating systems."

"Runs almost all IBM PC/XT compatible DOS software from the 1980s and early 90s."

Modifying an HDMI dummy plug’s EDID using a Raspberry Pi

https://lemmy.world/post/31444045

Modifying an HDMI dummy plug’s EDID using a Raspberry Pi - Lemmy.World

Lemmy

Anyone have a good device for a beginner ish to take apart and hardware hack a bit? Mostly stuff like extracting firmware and other fuckery like that. Have a soic clip on the way so no desoldering would be needed probably.

#hardware #hardwarehacking #electronic #electricalengineering

Engineer creates first custom motherboard for 1990s PlayStation console

New “nsOne” board can save a dying 1990s PlayStation 1 by transplanting original chips.

Ars Technica

Two days until #BSidesBoulder25 and only 15 tickets remain! Today we highlight, two #BSidesBoulder25 talks: Andrew Brandt's "Smashing Smishing by Quashing Quishing" and Eric Harashevsky's "Firmware Readout Bypass in STM92 (Don't put this in an alarm control panel).

Andrew's talk will examine QR-based phishing attacks, how attackers are exploiting QR codes and SMS to steal credentials and MFA tokens, and how a cross-industry collaboration between mobile vendors, telcos, and the infosec community could finally slam the door on mobile phishing. Think SafeBrowsing, but for QR scans! And we promise that our BSidesBoulder event QR codes will not redirect you to an Andrew-controlled C2 server.

Eric's talk will explore his adventure tinkering with an old STM92's firmware - the talk will explore his findings, reverse engineering the legacy microcontroller, bypassing firmware protections, and what that means for devices still hanging on your wall! Expect a live demo that is sure to excite your future hardware hacking journey.

#BSides #BSidesBoulder #CyberSecurity #Quishing #Smishing #MobileSecurity #PhishingDefense #HardwareHacking #FirmwareSecurity

Check out our full schedule at https://bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: https://www.eventbrite.com/e/bsides-boulder-2025-registration-1290129274389

First round of surface cleaning on my trusty Teletype Model 33 ASR: a bit of dust gone, some mechanical clicks revived, and the keyboard is now stripped bare, ready for its isopropyl alcohol spa 🧽✨

Next step: full deep-clean and a proper exorcism of the demons of time.
📟💾 Yes, it’s a lot of work for a machine that types at 10 cps, but hey — that’s the beauty of electromechanical poetry.

🛠️ Ongoing project https://hacking.museum – we're not just restoring hardware, we're resurrecting bits.

#RetroComputing #HardwareHacking #Teletype33 #ASCIIForLife #DataCassetteVibes #HackThePast

Jetzt in der Make 3/25: Fritzbox pimpen

Mit der Custom Firmware Freetz-NG lässt sich das volle Potenzial einer alten Fritzbox ausschöpfen. Wir zeigen in der Make 3/25, wie es geht.

https://www.heise.de/news/Jetzt-in-der-Make-3-25-Fritzbox-pimpen-10433070.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Fritzbox #Hacking #HardwareHacking #Make #Router #Wissenschaft #WLAN #news

Jetzt in der Make 3/25: Fritzbox pimpen

Mit der Custom Firmware Freetz-NG lässt sich das volle Potenzial einer alten Fritzbox ausschöpfen. Wir zeigen in der Make 3/25, wie es geht.

heise online
Hey #infosec #hardware #hardwarehacking peeps. I have an ARM bootrom, that I would like to run against a candidate firmware, and see what it is doing. Any ideas?
I obviously need to NOP out any instructions that reference hardware that won't be present in an emulator, load my candidate firmware to the appropriate address, and then jump to the validation routines. Anyone done something like this before?

Tiny, silent, and cheap, single board computers like the Raspberry Pi and Orange Pi have become essential tools for hackers and phreaks. Set one up as a rogue access point, a SIP scanner, a wardriving rig, or even a portable PBX. With onboard radios, GPIO pins, and full Linux environments, these boards are more than toys, they’re Swiss army knives in the right hands. They can automate attacks, log traffic, spoof signals, or act as hidden listeners on hostile networks. Deploy them stealthily or stash one behind a target’s router. They run quietly, but speak volumes.

#SBC #RaspberryPi #HardwareHacking #PhreakingTools #LinuxOnBoard