"Pensada para sustituir a varias otras, esta herramienta multiprotocolo y multivoltaje para hacking de hardware proporciona compatibilidad con el software estándar."
Tigard is an open source FT2232H-based, multi-protocol, multi-voltage tool for hardware hacking. By incorporating commonly used pin-outs, a labelled wiring harness, onboard level-shifting, and a logic analyzer connection, it is designed specifically for attaching to and communicating with low-speed interfaces on reverse-engineered hardware targets.
Tigard combines support for all of the most-used interfaces and most-needed features on to a simple board. As a drop-in replacement for dozens of other hardware tools based on FTDI chips, it has native support from a number of commonly used hardware tools like OpenOCD, FlashROM, and more.
There’s a wide range of more advanced hardware hacking tools available. Tigard serves as an excellent complement to these by supporting the 20% of the features that enable 80% of the common hardware hacking tasks involved with speaking various protocols. Whether you’re new to hardware hacking, or you just need a quick and simple solution, Tigard is designed to be the best first step - sometimes followed by a more capable tool, if needed.
Documentation and hardware files can be found in the Tigard Tools GitHub repository.
In general, Tigard was designed to work as-is with several tools and libraries that already support the x232H family of chips. This includes:
Thanks to the drop-in compatibility with so many tools, there is no need for Tigard-specific tools to interface with any targets. If you do find the need to customize a tool or script using Tigard, it should work fine with any other FT2232H interface board.
|Tigard||C232HM Cable||UM232H-B||Adafruit FT232H||CJMCU FT232H||BusBlaster||BusPirate||Glasgow|
|UART||Dedicated||Shared||Shared||Shared||Shared||With Gateware||Shared||With Gateware|
|SPI/JTAG||Dedicated||Shared||Shared||Shared||Shared||With Gateware||SLOW||With Gateware|
|I2C||Hard Switch||Add'l Parts||Add'l Parts||Hard Switch||Add'l Parts||With Gateware||Yes||With Gateware|
|SWD||Hard Switch||Add'l Parts||Add'l Parts||Add'l Parts||Add'l Parts||With Gateware||Yes||With Gateware|
|Headers||ALL, labeled||Loose Wires||wires/2.0 mm||I2C, Through Holes||Through Holes||Header, Generic||Header, Generic||Header, Generic|
|Level Shifting||1.6-5.5 V||N||N||N||N||1.5-3.3 V||0.8-5 V, with effort||1.8-5.4 V|
|USB||Type C||Type A||Type A||Type Micro-B||Type A||Type Mini-B||Type Mini-B||Type C|
Why does all this matter?
One open source FT2232H-based, multi-protocol, multi-voltage Tigard board for hardware hacking, with wiring harnesses included.
Combine Tigard with a BitMagic Basic Logic Analyzer for live debugging of serial protocols.
BitMagic Basic is an open hardware FX2-based logic analyzer. It’s designed specifically to work with the open source fx2lafw firmware and the open source Sigrok logic analyzer suite, including the Pulseview GUI.
BitMagic Basic supports eight channels sampled at up to 24 Msps. It works like any other logic analyzer and includes a labeled wiring harness so you can use it with any 2.54 mm pin headers or your favorite probe clips.
It also includes a 14-pin cable for connecting directly to Tigard. When it’s all wired up, you can use Pulseview to monitor all the communications between Tigard and your target system. This is helpful for debugging electrical, protocol, and signal integrity issues.
We’ve used a number of different tools for our own research as well as for our Applied Physical Attacks training, but none of them seemed to be just the right combination of features we need with the simplicity that we want. Tigard came about in order to create the tool we needed to teach the basics of hardware hacking on embedded and IoT systems.
Faced with a calendar free of travel and face-to-face training commitments, we used the time to design, build, and test Tigard, as well as bring our hands-on in-person training to a self-paced online format, updated to work with Tigard and BitMagic.
This kit includes:
This kit goes hand-in-hand with online access to 3+ days of lectures, labs, and support that will guide you through the process of:
Tigard was designed as a drop-in replacement for other FT232H-series devices. In general, there are zero software changes required for support, though customizing configuration files might be necessary.
This greatly simplifies the support requirements for Tigard, and allows easy A/B testing with other FT232H-series devices when potential issues arise.
The entire design is open hardware, designed in KiCad with a public git repository. The documentation covers using a variety of software tools to complete several common tasks with Tigard. Should you have difficulty, Tigard has LEDs that will assist in debugging your target, your protocol, and your software.
We’re putting the finishing touches on a free online training for some common uses for Tigard.
We’d love to hear what you’ve done with Tigard - let us know by submitting a field report to Crowd Supply so we can highlight all the cool uses you come up with.
Revision V0.0 of Tigard was the first prototype. All four boards worked properly, validating the design and assembly process.
Revision V0.1 and production of 80 boards quickly followed with some minor fixes, but primarily with changes to make the pin-outs better organized and easier to use. These boards have been tested in the field over the past three months, in both SecuringHardware.com’s Hardware Hacking training and regular work.
Revision V1.0 added a few low-risk features. Ten boards were produced to test the assembly process. The initial production run was completed before the end of the campaign and worked right on the first poweron.
Revision V1.1 has some minor manufacturing enhancements, and moved the LA connector about 1mm to give more clearance for attaching cables. This batch has a slightly darker orange soldermask.
Tigard was assembled and tested at our our overseas contract manufacturer. Once complete and delivered to us in Portland, Oregon, we did another round of QA testing as well as provisioning the EEPROMs with unique serial numbers, then pack the boards, harnesses, and a few stickers so they’re ready for fulfilment.
Lead time for large volumes requiring additional production runs should be about 8 weeks.
All stock orders ship from Crowd Supply’s fulfillment partner, Mouser Electronics, based in Texas. You can learn more in the Crowd Supply Guide page on Ordering, Paying, and Shipping.
Building hardware always involves risk. Now that Tigard is out in the field in use, we’re even more confident that it’s a robust, versatile design, but there are always risks and challenges to sustaining production as well: