Security Experts:

Connect with us

Hi, what are you looking for?


IoT Security

SEC Consult Open Sources Hardware Analysis Tool

SEC Xtractor

Austria-based IT security services and consulting company SEC Consult on Wednesday announced the release as open source of its SEC Xtractor assisted hardware analysis tool.

SEC Xtractor

Austria-based IT security services and consulting company SEC Consult on Wednesday announced the release as open source of its SEC Xtractor assisted hardware analysis tool.

SEC Xtractor, which SEC Consult has used for several research and customer projects in the past years, started off as a memory extraction and UART (Universal Asynchronous Receiver/Transmitter) interface project. It was built after the company determined that none of the existing hardware analysis tools met all its requirements.

SEC Xtractor has now become a tool that allows researchers to dump the content of NAND, NOR, SPI and I2C flash memory without the need for soldering, as long as the chip has been removed from the targeted device. The system can also act as a UART-to-USB converter and a JTAG adapter.

SEC Xtractor was developed in C and its capabilities can be easily extended, SEC Consult said.

The company told SecurityWeek that the price of the hardware components needed to build the tool is roughly €100-130 ($110-145), depending on shipping costs.

SEC Xtractor has been released as open source to aid hackers, but SEC Consult does not exclude the possibility to offer it as a commercial product at one point if it finds the right collaborator.

SEC Consult will continue to maintain the tool, but it welcomes contributions. All the information needed to build the hardware analysis tool is available on GitHub.

Related: Cruise Releases Automated Firmware Security Analyzer to Open Source

Related: FireEye Releases Open Source Persistence Toolkit ‘SharPersist’

Related: Cloudflare Open-Sources Network Vulnerability Scanner

Related: Sophos Makes Sandboxie Free in Transition to Open Source

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

IoT Security

Vulnerabilities in electric vehicle charging management systems can be exploited for DoS attacks and to steal energy or sensitive information.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

Today’s growing attack surface is dominated by non-traditional endpoints.

IoT Security

Taiwan-based networking and storage solutions provider Synology has informed customers about the availability of patches for several critical vulnerabilities, including flaws likely exploited recently...

IoT Security

Chinese video surveillance company Hikvision has patched a critical vulnerability in some of its wireless bridge products. The flaw can lead to remote CCTV...

IoT Security

Censys finds 30,000 internet-exposed QNAP appliances that are likely affected by a recently disclosed critical code injection vulnerability.