The Hardware Hacking Tutorial series is to share information on how to do hardware hacking and how to do reverse engineering. The series is useful both for beginners and experts.
In this episode I will talk about how the find tue UART interface on an IoT device; I will take an home router (Gemtek WVRTM-127ACN) and show how to find the UART interface using simple tools like a multi-meter and using more advanced tools like a JTagulator board.
UART stands for Universal Asynchronous Receiver-Transmitter, it is the serial interface of the device where to attach the serial console. It is essential, in hardware hacking, to find the UART interface because it allows you to see what is printed on the serial console during the boot cycle, and it allows to see what type of bootloader your device is using and his version, what Operating System you have and his version, what kind of CPU and other peripherals you have, the amount of RAM and EEPROM; often you can get information on how the EEPROM is partitioned and a lot of other information, including information printed during the firmware upgrade cycle.
Often it is also possible to interact with the serial console, interacting with the bootlader, getting the login prompt and, sometimes, being able to logon locally on the system.
In the device we are interested in, usually the serial or UART interface is included, because it is used during the development phase and for testing purposes, but it is hidden inside the motherboard.
I will discuss, and show on video, various techniques to find the position and the pin-out of the UART interface including using a simple multi-meter.
I will show, also, how to connect a PC, running a terminal emulator software (I use PuTTY), to the UART of the IoT device using a TTL serial adapter.