HardBreak
GitHubDiscordLinkedInX
  • HardBreak - Hardware Hacking Wiki
  • Introduction
    • How to start
    • Methodology
    • Case Study (Led to a CVE Update)
      • General Case Study
  • Hardware Hacking
    • Introduction
    • Basics
      • Tools
        • Hardware Tools
          • Essential Tools
          • Soldering Tools
          • Logic Analyzer
            • Saleae Logic Analyzer
          • Open-Source Tools
            • Bus Pirate v3.6
            • Bus Pirate 5
            • GoodFET
          • Multimeters & Oscilloscopes
          • JTAG and SWD Debuggers
            • Segger JLink
            • TI CC-Debugger
          • UART-to-TTL adapter
          • Chip readers and programmers
            • Xgecu T56
        • Software Tools
          • Binwalk
          • Firmwalker
          • flashrom
          • Ghidra
          • OpenOCD
          • Mitmrouter
      • Common Hardware Components
      • Firmware Extraction Methods
      • Ethics
    • Reconnaissance
      • Closed device
        • OSINT (search the web)
        • USB Ports / SD-card
      • Opened device
        • Board Analysis
    • Interface Interaction
      • UART
        • Identify UART
        • Connect to UART
        • Extract Firmware using UART
      • I2C
      • SPI
        • Extract Firmware using SPI
      • JTAG/SWD
        • JTAG
          • Identify JTAG
        • SWD
        • Extract Firmware using JTAG/SWD
      • VE.Direct
    • Bypassing Security
      • Voltage Glitching
        • Example: LPC1768
      • Electromagnetic Fault Injection
    • Analyze Firmware
  • Network Analysis
    • Introduction
    • Reconnaissance
    • Protocols
      • WIFI
        • WEP
        • Deauthentication Attacks
      • Application Layer
        • Proprietary Protocols
          • Parrot Anafi Drone Reverse Engineering
        • MQTT
        • CoAP
        • Web Sockets
  • Radio Hacking
    • Introduction
    • Reconnaissance
    • Protocols
      • NFC
      • RFID
    • Tools
      • RF Signal Analyzers
        • RTL-SDR
        • HackRF
      • Flipper Zero
        • NFC
        • Sub-GHz
  • Contribute
    • How to contribute
    • Gitbook - Basics
      • Markdown
      • Images & media
      • Interactive blocks
  • About
    • Impressum – Legal Notice
    • Privacy Policy
    • Datenschutzerklärung
    • License
Powered by GitBook
On this page
  • Theory
  • Usage
  • Resources

Was this helpful?

Edit on GitHub
  1. Hardware Hacking
  2. Basics
  3. Tools
  4. Hardware Tools
  5. Logic Analyzer

Saleae Logic Analyzer

PreviousLogic AnalyzerNextOpen-Source Tools

Last updated 4 months ago

Was this helpful?

Theory

Saleae Logic is a popular line of logic analyzers known for their ease of use, versatility, and powerful software capabilities. They are designed for both hobbyists and professionals looking to debug and analyze digital signals and protocols in electronic circuits.

Requirements

  • Computer with USB Port

  • Target Device

Software

  • The device is accompanied by proprietary software that is available for free. It provides a user-friendly interface for capturing, visualizing, and analyzing data.

    • Features:

      • Waveform visualization.

      • Protocol decoding for various standards like SPI, I2C, UART, and more.

      • Ability to save and load projects.

      • Data export in various formats (CSV, etc.).

Usage

  1. Setup:

    • Connect the Saleae Logic analyzer to your computer via USB.

    • Connect the probes to the target device's test points to capture the digital signals.

  2. Launch Software:

    • Open the Saleae Logic software on your computer.

  3. Configure Channels:

    • Select the channels you want to monitor and set their voltage levels.

    • Choose the sampling rate based on the speed of the signals you're analyzing.

    • higher sampling rate => more data points, but also more memory usage

  4. Capture Data:

    • Click the capture button to start collecting data.

    • Use the triggering options to capture specific events or signals of interest.

  5. Analyze Data:

    • Use the software to visualize the waveform data.

    • Utilize the decoding feature to interpret the protocol data, making it easier to analyze complex communication

  6. For any analyzer we can specify settings (here for the Async Serial Analyzer);

  7. Once we save the settings Saleae will automatically analyzer our captured data.

  8. Example output:

  9. We can also look at the decoded in the terminal view

  10. If you don't find the correct analyzer for your protocol you may use extensions to load your custom analyzers: 1.

    <figure><img src="../../../../../.gitbook/assets/extensions.png" alt="" width="563"><figcaption><p>Saleae extensions</p></figcaption></figure>

Resources

Salae Logic Analyzer - Getting Started
Async Serial Analyzer settings
Analyzer in graph
Analyzer in terminal