# HardBreak - Hardware Hacking Wiki

***This page is a free and collaborative wiki about hardware hacking!***

<figure><img src="https://812024329-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FS20l0nCBFmcT2JDBwjvL%2Fuploads%2Fgit-blob-faa4867a9acf9c36d29cc58ccf33bc582dd0e0df%2Fimage.png?alt=media" alt="" width="155"><figcaption><p>HardBreak Wiki</p></figcaption></figure>

The goal of HardBreak (<https://www.hardbreak.wiki/>) is to collect knowledge about Hardware Hacking / IoT hacking in one place. There are many great blogs about Hardware Hacking, but it is a rather unpleasant experience to search through multiple blogs in different formats to find the information you need. HardBreak aims to organize all information in one accessible and easy-to-use platform.

## Discord

**🎉 We just launched our HardBreak Discord Server! 🎉**

Join us here 👉 [**https://discord.gg/AWVsKxJHvQ**](https://discord.gg/AWVsKxJHvQ)

If you:

* Want to discuss hardware hacking and IoT security
* Share the project you are working on
* Have feedback or requests for new content on our wiki

Come be a part of our growing community of hardware hackers⚡

{% hint style="success" %}
Hey! I’m Jonas Rosenberger, the creator of HardBreak. I’d love to hear your feedback or help out with any projects you’re working on. Feel free to reach out on [LinkedIn](https://www.linkedin.com/in/jonas-rosenberger-3276b1164/) or Discord (f\_3nter)!
{% endhint %}

## Overview

* [Introduction](https://www.hardbreak.wiki/introduction/how-to-start)
  * In this chapter we give you guidance on how to start hardware hacking:
    * What first target device to choose
    * Essential tools to start with
    * [Methodology](https://www.hardbreak.wiki/introduction/quickstart)
    * A hands on [Case Study](https://www.hardbreak.wiki/introduction/case-study-led-to-a-cve-update/general-case-study)
* [Hardware Hacking](https://www.hardbreak.wiki/hardware-hacking/introduction)
  * Top down approach to follow and investigate your device
    * [Basics](https://www.hardbreak.wiki/hardware-hacking/basics) ([Hardware Tools](https://www.hardbreak.wiki/hardware-hacking/basics/tools/hardware-tools), [Software](https://www.hardbreak.wiki/hardware-hacking/basics/tools/software-tools) and [Common Hardware Components](https://www.hardbreak.wiki/hardware-hacking/basics/common-hardware-components))
  * [Reconnaissance](https://www.hardbreak.wiki/hardware-hacking/reconnaissance) ([OSINT](https://www.hardbreak.wiki/hardware-hacking/reconnaissance/closed-device/osint-search-the-web), [Board Analysis](https://www.hardbreak.wiki/hardware-hacking/reconnaissance/opened-device/board-analysis))
  * [Interface Interaction](https://www.hardbreak.wiki/hardware-hacking/interface-interaction):
    * Introduction to different protocols: e.g.,[UART](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/uart), [JTAG](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/jtag-swd/jtag), [SWD](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/jtag-swd/swd), [SPI](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/spi), [I2C](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/i2c)..
      * How to [Identify](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/uart/uart-from-start-to-finish) and use those protocols
      * [extract firmware](https://www.hardbreak.wiki/hardware-hacking/interface-interaction/uart/extract-firmware-using-uart) using debug protocols
  * [Bypass Security Mechanisms](https://www.hardbreak.wiki/hardware-hacking/bypassing-security)
    * Introduction to [Voltage Glitching](https://www.hardbreak.wiki/hardware-hacking/bypassing-security/voltage-glitching)
  * How to [analyze Firmware](https://www.hardbreak.wiki/hardware-hacking/analyze-firmware)
* [Network Analysis](https://www.hardbreak.wiki/network-analysis/introduction)
  * How to analyze protocols: [Reverse Engineering ](https://www.hardbreak.wiki/network-analysis/protocols/application-layer/proprietary-protocols/parrot-anafi-drone-reverse-engineering)a drone
* [Radio Hacking](https://www.hardbreak.wiki/radio-hacking/introduction)
  * Tools ([RTL-SDR](https://www.hardbreak.wiki/radio-hacking/tools/rf-signal-analyzers/rtl-sdr),[ Flipper Zero](https://www.hardbreak.wiki/radio-hacking/tools/flipper-zero))
  * Protocols ([RFID](https://www.hardbreak.wiki/radio-hacking/protocols/rfid), [NFC](https://www.hardbreak.wiki/radio-hacking/tools/flipper-zero/nfc)) and how to hack them

## How You Can Contribute

We strongly encourage anyone interested to contribute their knowledge and insights. By sharing your discoveries or improving existing content, you help build a valuable resource for everyone.

To contribute:

* Submit a pull request on our [GitHub repository](https://github.com/F3enter/HardBreak)
* Help us keep the content accurate—if you notice an error, please report it so we can correct it quickly! Reach out on [LinkedIn](https://www.linkedin.com/in/jonas-rosenberger-3276b1164/) or [Twitter](https://x.com/HardBreakWiki)

{% hint style="info" %}
Reference the original source or blog whenever you include content from another author.
{% endhint %}

Check out our [Contribution Guide](https://www.hardbreak.wiki/contribute/how-to-contribute) for a step-by-step tutorial to making your first pull request!

## Important Disclaimers

{% hint style="warning" %}
While this wiki is built with the best knowledge and intentions from our contributors, **it may contain errors**. We encourage users to double-check any advice or strategies before applying them in practice. If you spot an issue, please help us by reporting it or making an edit!
{% endhint %}

#### Educational Use Only

{% hint style="danger" %}
The strategies and advice shared on this site are for **educational and informational purposes only**. They should not be used for any unlawful or harmful activities. We do not endorse or encourage any illegal or unethical conduct. Use the information here responsibly and at your own risk.
{% endhint %}

## Get Started

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Introduction</strong></td><td>How to start</td><td></td><td></td><td><a href="introduction/how-to-start">how-to-start</a></td></tr><tr><td><strong>Basics</strong></td><td>Hardware Hacking Tools</td><td></td><td></td><td><a href="hardware-hacking/basics/tools/hardware-tools">hardware-tools</a></td></tr><tr><td><strong>Hardware Hacking</strong></td><td>Extracting Firmware using UART</td><td></td><td></td><td><a href="hardware-hacking/interface-interaction/uart/extract-firmware-using-uart">extract-firmware-using-uart</a></td></tr><tr><td><strong>Reverse Engineering</strong></td><td>Hacking a drone</td><td></td><td></td><td><a href="network-analysis/protocols/application-layer/proprietary-protocols/parrot-anafi-drone-reverse-engineering">parrot-anafi-drone-reverse-engineering</a></td></tr></tbody></table>
