Class 03 - Sniffing Log

In this class, students learn to capture debug logs and system messages broadcast over UART. Many devices output boot sequences, error logs, or kernel diagnostics through UART even when user interaction is blocked. By passively connecting to the TX line, students can collect valuable intelligence about firmware versions, hardware components, and potential weak points. This reconnaissance step is crucial before any attempt at active exploitation. The instructor demonstrates how logs reveal device configurations, sometimes including credentials or debug flags left by engineers. This class ties into the module by establishing how UART serves not only as an interactive shell but also as a transparent window into system internals.

Learning Objective
Use UART as a reconnaissance tool by capturing logs and debug output.

Training Outcomes

  • Capture boot and runtime messages.

  • Identify sensitive information in logs.

  • Recognize firmware details leaked through UART.

Hands-On Experience

  • Connect to devices during boot and capture output.

  • Use terminal software for log collection.

  • Analyze logs for exploitable insights.