-
Notifications
You must be signed in to change notification settings - Fork 92
HydraFW OpenOCD guide
Baldanos edited this page Feb 4, 2019
·
12 revisions
This guide is updated towards development firmware
OpenOCD can be used with the same protocol as the bus pirate. An example configuration file can be :
source [find interface/buspirate.cfg]
buspirate_mode open-drain
buspirate_pullup 1
buspirate_port /dev/ttyACM0
If you know the target JTAG pins, connect them on the default pins and run OpenOCD with your configuration file.
It is possible to discover the JTAG pins and use them without changing the wiring :
- Use the
brute
commands to discover the pins. - Once the pins are discovered, validate them using
bypass
andidcode
commands. - Run the
openocd
command - Leave the Hydrabus terminal
- Run OpenOCD with your configuration file
See tutorial here : https://cybermashup.com/2014/05/01/jtag-debugging-made-easy-with-bus-pirate-and-openocd/
- CHANGELOG
- Console commands
- Binary mode guide
-
NFC/HydraNFC v1 guide
- Read UID of an ISO/IEC_14443 Tag
- Read UID and data of a MIFARE Ultralight Tag
- Read UID of an ISO/IEC 15693 Tag
- Emul ISO14443a Tag
- Emul MIFARE Ultralight Tag
- Emul Mifare Classic Tag
- Unique NFC sniffer design
- Launch NFC sniffer from console
- Sniffer ISO14443A wireshark pcap
- Autonomous/stand-alone sniffer mode
- Sniffer ISO14443A real-time infinite trace mode
- HydraFW-HydraNFC-v1.x-TRF7970A-Tutorial