- Purpose: This guide provides instructions for connecting and using the Exploit Bridge by Exploit Security.
- Target Audience: This guide is designed for hackers and ethusiasts alike.
- Exploit Bridge: This Exploit Bridge was initially designed by Exploit Security for their field operatives. It's basic functionality is that of a USB to UART and SPI bridge. It allows for its user to interact with a device or component for troubleshooting and security research purposes.
- Connection: Connection of a USB-C cable between the Exploit Bridge and the testers PC
- Physical UART Connection: After determining a valid UART interface on the target device, correctly wire from the Exploit Bridge to the target device.
- Interfacing using terminal emulator: Using your choice of terminal emulator interfacing with your target device is now possible.
- Physical SPI Connection: After connection of a USB-C cable between the Exploit Bridge and the testers PC has been established and determination of a valid SPI chip, correctly wire from the Exploit Bridge to the target device.
- Interfacing using the flashrom utility: Documentation and Downloads can be found Flashrom
- Example Utility Command used for pulling flash: This will vary depending on your USB device and flash chip being interfaced with
flashrom -p ft2232_spi:type=2232H,port=A -c <chip type> -r output.bin
- SDCARD: This slot can be used to support a micro-sdcard. When mounted on your system can be used to read and write to this for mass storage usage.
- Handling Precautions:
- Use ESD-safe tools and wear an anti-static wrist strap when handling the Exploit Bridge to avoid damaging sensitive components.
- Cleaning and Storage:
- Store the board in an anti-static bag to prevent damage.