-
Notifications
You must be signed in to change notification settings - Fork 92
HydraFW OpenOCD guide
Baldanos edited this page Jul 27, 2020
·
12 revisions
This guide is updated towards development firmware
OpenOCD can be used with the same protocol as the bus pirate.
Example OpenOCD configuration :
source [find interface/buspirate.cfg]
buspirate_mode open-drain
buspirate_pullup 1
buspirate_port /dev/ttyACM0
If you know the target JTAG pins, connect them on the default pins and run OpenOCD with your configuration file.
It is possible to discover the JTAG pins and use them without changing the wiring :
- Use the
brute
commands to discover the pins. - Once the pins are discovered, validate them using
bypass
andidcode
commands. - Run the
openocd
command - Leave the Hydrabus terminal
- Run OpenOCD with your configuration file
Hydrabus can also be used as an SWD interface to connect to various devices.
An example configuration can be found in utils/openocd/hydrabus_swd_host.cfg
Hydrabus can be debugged using an external SWD interface on the debug pins using the OpenOCD configuration found in utils/openocd/hydrabus_target.cfg
See tutorial here : https://cybermashup.com/2014/05/01/jtag-debugging-made-easy-with-bus-pirate-and-openocd/
- CHANGELOG
- Console commands
- Binary mode guide
-
NFC/HydraNFC v1 guide
- Read UID of an ISO/IEC_14443 Tag
- Read UID and data of a MIFARE Ultralight Tag
- Read UID of an ISO/IEC 15693 Tag
- Emul ISO14443a Tag
- Emul MIFARE Ultralight Tag
- Emul Mifare Classic Tag
- Unique NFC sniffer design
- Launch NFC sniffer from console
- Sniffer ISO14443A wireshark pcap
- Autonomous/stand-alone sniffer mode
- Sniffer ISO14443A real-time infinite trace mode
- HydraFW-HydraNFC-v1.x-TRF7970A-Tutorial