SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
H4rdw4re H4cking 
Short Introduction to Arduino & Co.
Microcontroller ATmega328 
Clock Speed 16 MHZ 
SRAM 2 KB 
Flash Memory 32 KB 
EEPROM 1 KB 
Price ca. 25 EUR
Serial 
I2C 
13 Input/Outputs 
5 Analog 
Interrupts
It’s NOT Processing
- Perfect for Starters 
- Runs on all OSs 
- Basic IDE features 
- Inline: 
• compiling 
• upload 
• console 
- For Pros: limited :-(
AVR-DUDE 
+ Tools
DEMO TIME!
Hardware Hacking
Hardware Hacking

Contenu connexe

Tendances

Capabilities of Arduino (including Due)
Capabilities of Arduino (including Due)Capabilities of Arduino (including Due)
Capabilities of Arduino (including Due)
Sudar Muthu
 

Tendances (20)

Robotics and Arduino (Arduino UNO)
Robotics and Arduino (Arduino UNO)Robotics and Arduino (Arduino UNO)
Robotics and Arduino (Arduino UNO)
 
Arduino Hands-on Workshop
Arduino Hands-on WorkshopArduino Hands-on Workshop
Arduino Hands-on Workshop
 
Capabilities of Arduino (including Due)
Capabilities of Arduino (including Due)Capabilities of Arduino (including Due)
Capabilities of Arduino (including Due)
 
Introduction to programming AVR microcontrollers
Introduction to programming AVR microcontrollersIntroduction to programming AVR microcontrollers
Introduction to programming AVR microcontrollers
 
Arduino uno
Arduino unoArduino uno
Arduino uno
 
Cheap, good, hackable tools from China: AVR component tester
Cheap, good, hackable tools from China: AVR component testerCheap, good, hackable tools from China: AVR component tester
Cheap, good, hackable tools from China: AVR component tester
 
Arduino & NodeMcu
Arduino & NodeMcuArduino & NodeMcu
Arduino & NodeMcu
 
Interfacing with Arduino
Interfacing with ArduinoInterfacing with Arduino
Interfacing with Arduino
 
Building the Minima - Pacificon 2014
Building the Minima - Pacificon 2014Building the Minima - Pacificon 2014
Building the Minima - Pacificon 2014
 
Robotics with arduino
Robotics  with arduinoRobotics  with arduino
Robotics with arduino
 
Introduction to Arduino and Circuits
Introduction to Arduino and CircuitsIntroduction to Arduino and Circuits
Introduction to Arduino and Circuits
 
Arduino Robotics workshop Day1
Arduino Robotics workshop Day1Arduino Robotics workshop Day1
Arduino Robotics workshop Day1
 
uRock @ Jserv Course Final
uRock @ Jserv Course Final uRock @ Jserv Course Final
uRock @ Jserv Course Final
 
Getting started with arduino workshop
Getting started with arduino workshopGetting started with arduino workshop
Getting started with arduino workshop
 
Aurdino presentation
Aurdino presentationAurdino presentation
Aurdino presentation
 
Capabilities of Arduino
Capabilities of ArduinoCapabilities of Arduino
Capabilities of Arduino
 
Introduction to Arduino
Introduction to ArduinoIntroduction to Arduino
Introduction to Arduino
 
Physical prototyping lab3-serious_serial
Physical prototyping lab3-serious_serialPhysical prototyping lab3-serious_serial
Physical prototyping lab3-serious_serial
 
Arduino Robotics workshop day2
Arduino Robotics workshop day2Arduino Robotics workshop day2
Arduino Robotics workshop day2
 
Introduction to Arduino
Introduction to ArduinoIntroduction to Arduino
Introduction to Arduino
 

En vedette

Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntu
Jisim Kuring
 
password series
password seriespassword series
password series
Ammar WK
 
backdooring workshop
backdooring workshopbackdooring workshop
backdooring workshop
Ammar WK
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
Ammar WK
 

En vedette (20)

IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Hardware Hacking and Arduinos
Hardware Hacking and ArduinosHardware Hacking and Arduinos
Hardware Hacking and Arduinos
 
Alur attacking web (sisi client)
Alur attacking web (sisi client)Alur attacking web (sisi client)
Alur attacking web (sisi client)
 
Pentesting with linux
Pentesting with linuxPentesting with linux
Pentesting with linux
 
Tutorial server ubuntu
Tutorial server ubuntuTutorial server ubuntu
Tutorial server ubuntu
 
Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015Uji performa kontroler on Semnasteknomedia Amikom 2015
Uji performa kontroler on Semnasteknomedia Amikom 2015
 
Course lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented ProgrammingCourse lecture - An introduction to the Return Oriented Programming
Course lecture - An introduction to the Return Oriented Programming
 
password series
password seriespassword series
password series
 
Had sec mikrotik administrator
Had sec mikrotik administratorHad sec mikrotik administrator
Had sec mikrotik administrator
 
Penetrasi Jaringan
Penetrasi JaringanPenetrasi Jaringan
Penetrasi Jaringan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Debian Packaging tutorial
Debian Packaging tutorialDebian Packaging tutorial
Debian Packaging tutorial
 
backdooring workshop
backdooring workshopbackdooring workshop
backdooring workshop
 
Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)Advanced Exploit Development (Updated on 28 January, 2016)
Advanced Exploit Development (Updated on 28 January, 2016)
 
Linux Exploit Research
Linux Exploit ResearchLinux Exploit Research
Linux Exploit Research
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
 
Backtrack 5 - web pentest
Backtrack 5 - web pentestBacktrack 5 - web pentest
Backtrack 5 - web pentest
 
Backtrack 5 - network pentest
Backtrack 5 - network pentestBacktrack 5 - network pentest
Backtrack 5 - network pentest
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
 

Plus de rngtng (8)

RngTng - Three Example Projects
RngTng - Three Example ProjectsRngTng - Three Example Projects
RngTng - Three Example Projects
 
All that Swing
All that SwingAll that Swing
All that Swing
 
21 New York City Facts - You probably don't know
21 New York City Facts - You probably don't know21 New York City Facts - You probably don't know
21 New York City Facts - You probably don't know
 
How to win a dance battle
How to win a dance battleHow to win a dance battle
How to win a dance battle
 
Testing with Rspec
Testing with RspecTesting with Rspec
Testing with Rspec
 
Processing presentation
Processing presentationProcessing presentation
Processing presentation
 
Swing It!
Swing It!Swing It!
Swing It!
 
Rainbowduino
RainbowduinoRainbowduino
Rainbowduino
 

Hardware Hacking