Description
One of your friends tells you that a 1024-bit EEPROM connected to his Arduino is an extremely secure way to store his secrets, since the protocol used is “obfuscated” and “low level” according to him, “not like the USB which is hotplug and that you can plug directly into any OS!”.
To prove him that he is wrong, you use your logic analyzer to sniff the communication between the Arduino and the EEPROM when he types his secret.
Can you recover his secret with softwares like Sigrok
and gtkwave
?
Files
-
capture.vcd
36.06 KiB – 790b2960100407d34c8f92b2d24fa33fd3867ce4aebe4d6c799c3b4ef4a0bbf8
Author
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.