{"version":1,"pages":[{"id":"kzTlst3tKo255yz4YpDi","title":"HardBreak - Hardware Hacking Wiki","pathname":"/","siteSpaceId":"sitesp_3vEGL","icon":"hand-wave","description":""},{"id":"06tKx7MrNM2Jr8WXOrOM","title":"How to start","pathname":"/introduction/how-to-start","siteSpaceId":"sitesp_3vEGL","icon":"flag-checkered","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"CyH2xJQs9yWJ1S8BYNav","title":"Methodology","pathname":"/introduction/quickstart","siteSpaceId":"sitesp_3vEGL","icon":"circle-chevron-right","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"ATQ8FMCxw2ZI9BodDD6S","title":"Case Study (Led to a CVE Update)","pathname":"/introduction/case-study-led-to-a-cve-update","siteSpaceId":"sitesp_3vEGL","icon":"play","description":"","breadcrumbs":[{"label":"Introduction"}]},{"id":"IKA2ycevrxZ2eUNCvL4l","title":"General Case Study","pathname":"/introduction/case-study-led-to-a-cve-update/general-case-study","siteSpaceId":"sitesp_3vEGL","icon":"play","description":"","breadcrumbs":[{"label":"Introduction"},{"label":"Case Study (Led to a CVE Update)","icon":"play"}]},{"id":"VeLnaLrmXp6elYBS9S4e","title":"Introduction","pathname":"/hardware-hacking/introduction","siteSpaceId":"sitesp_3vEGL","icon":"info","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"qdQcZO5sdmDyCop8fYwd","title":"Basics","pathname":"/hardware-hacking/basics","siteSpaceId":"sitesp_3vEGL","icon":"circle-play","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"55J8VK8QAA8sS5QpDP6q","title":"Tools","pathname":"/hardware-hacking/basics/tools","siteSpaceId":"sitesp_3vEGL","icon":"wrench-simple","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"}]},{"id":"fS9Jgn5Hm4XJM7G487GE","title":"Hardware Tools","pathname":"/hardware-hacking/basics/tools/hardware-tools","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"}]},{"id":"FrgWcAJQjt0q5UIma2aP","title":"Essential Tools","pathname":"/hardware-hacking/basics/tools/hardware-tools/essential-tools","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"wUPUpl4FZdHE50qE3oLC","title":"Soldering Tools","pathname":"/hardware-hacking/basics/tools/hardware-tools/soldering-tools","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"x0XG2LoLdoxvNG8UqouH","title":"Logic Analyzer","pathname":"/hardware-hacking/basics/tools/hardware-tools/logic-analyzer","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"PXq2XgFKxz4uoDgqHutz","title":"Saleae Logic Analyzer","pathname":"/hardware-hacking/basics/tools/hardware-tools/logic-analyzer/saleae-logic-analyzer","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"Logic Analyzer"}]},{"id":"8RBTtyjuLMYqIAosEG9h","title":"Open-Source Tools","pathname":"/hardware-hacking/basics/tools/hardware-tools/open-source-tools","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"pAlY2UtNZs5RWGw0kLyR","title":"Bus Pirate v3.6","pathname":"/hardware-hacking/basics/tools/hardware-tools/open-source-tools/bus-pirate","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"Open-Source Tools"}]},{"id":"0NFLdyrV3Jn5aSuVivCH","title":"Bus Pirate 5","pathname":"/hardware-hacking/basics/tools/hardware-tools/open-source-tools/bus-pirate-5","siteSpaceId":"sitesp_3vEGL","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"Open-Source Tools"}]},{"id":"LkBZQ2K7wty5LcAjATAG","title":"GoodFET","pathname":"/hardware-hacking/basics/tools/hardware-tools/open-source-tools/goodfet","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"Open-Source Tools"}]},{"id":"98gd2hE35rvbtZrWch0n","title":"Multimeters & Oscilloscopes","pathname":"/hardware-hacking/basics/tools/hardware-tools/multimeters-and-oscilloscopes","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"wFrIg37qoDV9eNKiTW72","title":"JTAG and SWD Debuggers","pathname":"/hardware-hacking/basics/tools/hardware-tools/jtag-and-swd-debuggers","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"1VzFdKUxtBoCTzDcYQoU","title":"Segger JLink","pathname":"/hardware-hacking/basics/tools/hardware-tools/jtag-and-swd-debuggers/segger-jlink","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"JTAG and SWD Debuggers"}]},{"id":"N2moI9x6IpLFiW7TducG","title":"TI CC-Debugger","pathname":"/hardware-hacking/basics/tools/hardware-tools/jtag-and-swd-debuggers/ti-cc-debugger","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"JTAG and SWD Debuggers"}]},{"id":"JGA7HFMw2fdfigSPNfK9","title":"UART-to-TTL adapter","pathname":"/hardware-hacking/basics/tools/hardware-tools/uart-to-ttl-adapter","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"BWMPBHrPX0DDNdJi2uBl","title":"Chip readers and programmers","pathname":"/hardware-hacking/basics/tools/hardware-tools/chip-readers-and-programmers","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"}]},{"id":"kblfXqymozAe35b5IdrY","title":"Xgecu T56","pathname":"/hardware-hacking/basics/tools/hardware-tools/chip-readers-and-programmers/xgecu-t56","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Hardware Tools","icon":"screwdriver-wrench"},{"label":"Chip readers and programmers"}]},{"id":"Nf2fww1RsJueFRJTwiYg","title":"Software Tools","pathname":"/hardware-hacking/basics/tools/software-tools","siteSpaceId":"sitesp_3vEGL","icon":"uncharted","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"}]},{"id":"i7ZI9qYhL8nljffkdVFq","title":"Binwalk","pathname":"/hardware-hacking/basics/tools/software-tools/binwalk","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"D589FnEX7CebA8gXuqkU","title":"Firmwalker","pathname":"/hardware-hacking/basics/tools/software-tools/firmwalker","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"AIypWsnQOOsKyw9ruCQo","title":"flashrom","pathname":"/hardware-hacking/basics/tools/software-tools/flashrom","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"LpWNfmCXWOoRUKsAHG0l","title":"Ghidra","pathname":"/hardware-hacking/basics/tools/software-tools/ghidra","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"G0tYgjrpp79Q0ons4XVe","title":"OpenOCD","pathname":"/hardware-hacking/basics/tools/software-tools/openocd","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"4DYazJfcOMbdxXtHMjJN","title":"Mitmrouter","pathname":"/hardware-hacking/basics/tools/software-tools/mitmrouter","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"},{"label":"Tools","icon":"wrench-simple"},{"label":"Software Tools","icon":"uncharted"}]},{"id":"S8SqWt9QU9ZGV4ujxqDN","title":"Common Hardware Components","pathname":"/hardware-hacking/basics/common-hardware-components","siteSpaceId":"sitesp_3vEGL","icon":"circle-chevron-right","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"}]},{"id":"oswFOeysNdyghbuya9P5","title":"Firmware Extraction Methods","pathname":"/hardware-hacking/basics/firmware-extraction-methods","siteSpaceId":"sitesp_3vEGL","icon":"browser","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"}]},{"id":"sYYB5mAGOR7Zi1U1BBTu","title":"Ethics","pathname":"/hardware-hacking/basics/ethics","siteSpaceId":"sitesp_3vEGL","icon":"scale-balanced","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Basics","icon":"circle-play"}]},{"id":"VWZh3sBDEDkCIokxqKkm","title":"Reconnaissance","pathname":"/hardware-hacking/reconnaissance","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"wmcfGW4vgMb2MXl2CcJp","title":"Closed device","pathname":"/hardware-hacking/reconnaissance/closed-device","siteSpaceId":"sitesp_3vEGL","icon":"ban","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Reconnaissance","icon":"magnifying-glass"}]},{"id":"c3Qv3Sb5SiSP9NBLjrJv","title":"OSINT (search the web)","pathname":"/hardware-hacking/reconnaissance/closed-device/osint-search-the-web","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Reconnaissance","icon":"magnifying-glass"},{"label":"Closed device","icon":"ban"}]},{"id":"PoVcfeKYwiMAOKmMh32N","title":"USB Ports / SD-card","pathname":"/hardware-hacking/reconnaissance/closed-device/usb-ports-sd-card","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Reconnaissance","icon":"magnifying-glass"},{"label":"Closed device","icon":"ban"}]},{"id":"zL2Rdsb8YEzU4HyiIl1A","title":"Opened device","pathname":"/hardware-hacking/reconnaissance/opened-device","siteSpaceId":"sitesp_3vEGL","icon":"skull-crossbones","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Reconnaissance","icon":"magnifying-glass"}]},{"id":"ypZfot1yphhuqlflBqHK","title":"Board Analysis","pathname":"/hardware-hacking/reconnaissance/opened-device/board-analysis","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Reconnaissance","icon":"magnifying-glass"},{"label":"Opened device","icon":"skull-crossbones"}]},{"id":"L7dI4o5CCxakHdKgdTvD","title":"Interface Interaction","pathname":"/hardware-hacking/interface-interaction","siteSpaceId":"sitesp_3vEGL","icon":"hand","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"fJ3cnvrK6RRV7QpBCH5z","title":"UART","pathname":"/hardware-hacking/interface-interaction/uart","siteSpaceId":"sitesp_3vEGL","description":"This page gives a general overview about UART. Checkout the subpages on how to identify UART, how to connect and extract firmware from it.","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"}]},{"id":"LCsDxupVdY0l3QhgzCSx","title":"Identify UART","pathname":"/hardware-hacking/interface-interaction/uart/uart-from-start-to-finish","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"UART"}]},{"id":"qfctNNdz437OBkOdzLfh","title":"Connect to UART","pathname":"/hardware-hacking/interface-interaction/uart/connect-to-uart","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"UART"}]},{"id":"w4pGPcEY12jZKDWwXIfg","title":"Extract Firmware using UART","pathname":"/hardware-hacking/interface-interaction/uart/extract-firmware-using-uart","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"UART"}]},{"id":"Hi0hAdwBk03ZqSmqnSNm","title":"I2C","pathname":"/hardware-hacking/interface-interaction/i2c","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"}]},{"id":"modvFIVvAsPVw763Qieo","title":"SPI","pathname":"/hardware-hacking/interface-interaction/spi","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"}]},{"id":"bDvh9VBtqVqMPVRs03OP","title":"Extract Firmware using SPI","pathname":"/hardware-hacking/interface-interaction/spi/extract-firmware-using-spi","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"SPI"}]},{"id":"kD0Zv8GQIiqGMpRzhm4q","title":"JTAG/SWD","pathname":"/hardware-hacking/interface-interaction/jtag-swd","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"}]},{"id":"Lb8VYRm6w7PtsS6v19Ct","title":"JTAG","pathname":"/hardware-hacking/interface-interaction/jtag-swd/jtag","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"JTAG/SWD"}]},{"id":"yH041pMnQYTZLG8jURC6","title":"Identify JTAG","pathname":"/hardware-hacking/interface-interaction/jtag-swd/jtag/identify-jtag","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"JTAG/SWD"},{"label":"JTAG"}]},{"id":"1sIokS3La37bStBY1gf5","title":"SWD","pathname":"/hardware-hacking/interface-interaction/jtag-swd/swd","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"JTAG/SWD"}]},{"id":"prMUml958UKOAsHF9Ml9","title":"Extract Firmware using JTAG/SWD","pathname":"/hardware-hacking/interface-interaction/jtag-swd/extract-firmware-using-jtag-swd","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"},{"label":"JTAG/SWD"}]},{"id":"TpyYvXLh9sDW8jQSyepm","title":"VE.Direct","pathname":"/hardware-hacking/interface-interaction/ve.direct","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Interface Interaction","icon":"hand"}]},{"id":"VOg5yJiO14vEKFGkOIDV","title":"Bypassing Security","pathname":"/hardware-hacking/bypassing-security","siteSpaceId":"sitesp_3vEGL","icon":"forward","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"r5bVdLguCnwimk0dpxIg","title":"Voltage Glitching","pathname":"/hardware-hacking/bypassing-security/voltage-glitching","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Bypassing Security","icon":"forward"}]},{"id":"7GFwY0tjfDacouAJmOmQ","title":"Example: LPC1768","pathname":"/hardware-hacking/bypassing-security/voltage-glitching/example-lpc1768","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Bypassing Security","icon":"forward"},{"label":"Voltage Glitching"}]},{"id":"t09UBf6o4YEYqvpEJhsU","title":"Pico Glitcher","pathname":"/hardware-hacking/bypassing-security/voltage-glitching/pico-glitcher","siteSpaceId":"sitesp_3vEGL","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Bypassing Security","icon":"forward"},{"label":"Voltage Glitching"}]},{"id":"26rd5CsiFWrevtPpqItd","title":"Electromagnetic Fault Injection","pathname":"/hardware-hacking/bypassing-security/electromagnetic-fault-injection","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Hardware Hacking"},{"label":"Bypassing Security","icon":"forward"}]},{"id":"BBQwmHU0YRg8jVkQ2PQA","title":"Analyze Firmware","pathname":"/hardware-hacking/analyze-firmware","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass-chart","description":"","breadcrumbs":[{"label":"Hardware Hacking"}]},{"id":"3pXT6BmvpoCy4j1jLTRD","title":"Introduction","pathname":"/network-analysis/introduction","siteSpaceId":"sitesp_3vEGL","icon":"info","description":"","breadcrumbs":[{"label":"Network Analysis"}]},{"id":"i5TRA5eVEUc2hDHCwxTw","title":"Reconnaissance","pathname":"/network-analysis/reconnaissance","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"Network Analysis"}]},{"id":"T73qlZyaLP5zRgLUIrcI","title":"Protocols","pathname":"/network-analysis/protocols","siteSpaceId":"sitesp_3vEGL","icon":"comments","description":"","breadcrumbs":[{"label":"Network Analysis"}]},{"id":"e8TDGhPtcBncVU4OsvEv","title":"WIFI","pathname":"/network-analysis/protocols/wifi","siteSpaceId":"sitesp_3vEGL","icon":"wifi","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"}]},{"id":"GpWdUn6BwzaW6uMjZJpO","title":"WEP","pathname":"/network-analysis/protocols/wifi/wep","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"WIFI","icon":"wifi"}]},{"id":"BNIkhcFUvzdKJ9snPRfU","title":"Deauthentication Attacks","pathname":"/network-analysis/protocols/wifi/deauthentication-attacks","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"WIFI","icon":"wifi"}]},{"id":"nEKCR9qzyCXDInWUaMqf","title":"Application Layer","pathname":"/network-analysis/protocols/application-layer","siteSpaceId":"sitesp_3vEGL","icon":"browser","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"}]},{"id":"J3fefMrZOXctu0EE2ENt","title":"Proprietary Protocols","pathname":"/network-analysis/protocols/application-layer/proprietary-protocols","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"Application Layer","icon":"browser"}]},{"id":"lr7KvYjIuGcn74SLVf0h","title":"Parrot Anafi Drone Reverse Engineering","pathname":"/network-analysis/protocols/application-layer/proprietary-protocols/parrot-anafi-drone-reverse-engineering","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"Application Layer","icon":"browser"},{"label":"Proprietary Protocols"}]},{"id":"z2RKjdmX0Ecrf1SoL8Z9","title":"MQTT","pathname":"/network-analysis/protocols/application-layer/mqtt","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"Application Layer","icon":"browser"}]},{"id":"o0D70ZW9VvQo7dXKMfRn","title":"CoAP","pathname":"/network-analysis/protocols/application-layer/coap","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"Application Layer","icon":"browser"}]},{"id":"ZLDtccsj6R9HDeJUXKYt","title":"Web Sockets","pathname":"/network-analysis/protocols/application-layer/web-sockets","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Network Analysis"},{"label":"Protocols","icon":"comments"},{"label":"Application Layer","icon":"browser"}]},{"id":"SsCNDqPjoSHon0VY5yZv","title":"Introduction","pathname":"/radio-hacking/introduction","siteSpaceId":"sitesp_3vEGL","icon":"info","description":"","breadcrumbs":[{"label":"Radio Hacking"}]},{"id":"Aq6fSj1QLErPJbm3voEC","title":"Reconnaissance","pathname":"/radio-hacking/reconnaissance","siteSpaceId":"sitesp_3vEGL","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"Radio Hacking"}]},{"id":"PYS1Bv7iuhXRKhmqWZ9m","title":"Protocols","pathname":"/radio-hacking/protocols","siteSpaceId":"sitesp_3vEGL","icon":"comments","description":"","breadcrumbs":[{"label":"Radio Hacking"}]},{"id":"Bf2J1kFxUfM1D3TrmafL","title":"NFC","pathname":"/radio-hacking/protocols/nfc","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Protocols","icon":"comments"}]},{"id":"Wjb7WspELX4yZvXr12gv","title":"RFID","pathname":"/radio-hacking/protocols/rfid","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Protocols","icon":"comments"}]},{"id":"H2wURPJTXfFCL4IqOWs0","title":"Tools","pathname":"/radio-hacking/tools","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Radio Hacking"}]},{"id":"PLRiSv8XKM2OPI4VSOwt","title":"RF Signal Analyzers","pathname":"/radio-hacking/tools/rf-signal-analyzers","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"}]},{"id":"h4SXz7A3UcZJ8ejuina2","title":"RTL-SDR","pathname":"/radio-hacking/tools/rf-signal-analyzers/rtl-sdr","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"},{"label":"RF Signal Analyzers"}]},{"id":"dhpBgQSIG2yHhvFSqxn4","title":"HackRF","pathname":"/radio-hacking/tools/rf-signal-analyzers/hackrf","siteSpaceId":"sitesp_3vEGL","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"},{"label":"RF Signal Analyzers"}]},{"id":"WXbqzsdoFZe4vPrQeEJ9","title":"Flipper Zero","pathname":"/radio-hacking/tools/flipper-zero","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"}]},{"id":"3UEkGquQfVDV03n1wmcN","title":"NFC","pathname":"/radio-hacking/tools/flipper-zero/nfc","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"},{"label":"Flipper Zero"}]},{"id":"Fw5WjC9D5tvuJdsrtjrz","title":"Sub-GHz","pathname":"/radio-hacking/tools/flipper-zero/sub-ghz","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Radio Hacking"},{"label":"Tools","icon":"screwdriver-wrench"},{"label":"Flipper Zero"}]},{"id":"3TzvteEIFQEheVEHf6dA","title":"How to contribute","pathname":"/contribute/how-to-contribute","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Contribute"}]},{"id":"kmYkwmIIRpr95JS2U5tK","title":"Gitbook - Basics","pathname":"/contribute/gitbook-basics","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"Contribute"}]},{"id":"ZXxfwYY21Yz9PCv9X7ja","title":"Markdown","pathname":"/contribute/gitbook-basics/markdown","siteSpaceId":"sitesp_3vEGL","icon":"markdown","description":"","breadcrumbs":[{"label":"Contribute"},{"label":"Gitbook - Basics"}]},{"id":"QwHFLVleY7QejI9V4gc3","title":"Images & media","pathname":"/contribute/gitbook-basics/images-and-media","siteSpaceId":"sitesp_3vEGL","icon":"image-landscape","description":"","breadcrumbs":[{"label":"Contribute"},{"label":"Gitbook - Basics"}]},{"id":"oa0XskrCEgbVlYaOnehE","title":"Interactive blocks","pathname":"/contribute/gitbook-basics/interactive-blocks","siteSpaceId":"sitesp_3vEGL","icon":"hand-pointer","description":"","breadcrumbs":[{"label":"Contribute"},{"label":"Gitbook - Basics"}]},{"id":"C5Y1AciytM9JreuAS26o","title":"Impressum – Legal Notice","pathname":"/about/impressum-legal-notice","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"About"}]},{"id":"b9qMUlLG3GDnGXsWuWJO","title":"Privacy Policy","pathname":"/about/privacy-policy","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"About"}]},{"id":"9S22t25pcNPLRvAhLDaj","title":"Datenschutzerklärung","pathname":"/about/datenschutzerklarung","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"About"}]},{"id":"k5bpmKaR6yJBJ5iOB09h","title":"License","pathname":"/about/license","siteSpaceId":"sitesp_3vEGL","description":"","breadcrumbs":[{"label":"About"}]}]}