Skip to content

Reverse engineering a Belkin N150 Wireless Router model F9K1001V4

License

Notifications You must be signed in to change notification settings

joeyda3rd/Hacking-Belkin-N150

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hacking-Belkin-N150

Reverse engineering a Belkin N150 Wireless Router model F9K1001V4

Accessing UART Interface without JTAGulator

  1. Remove the board from the case, the first screw is under the sticker on the bottom.
  2. Near the Broadcome MCU, you'll find 4 test points at J3 (TP106) - See image
  3. Using a multimeter, check voltages and resistance against GND and VCC to determine pinout, see chart below.
  4. solder a 4 (or 3) pin connector strip through the holes or onto the pads. - see image
  5. Connect a serial port adapter (FTDI FT232RL) at 3.3V. GND to GND, cross Tx to Rx and Rx to Tx, 4th pin unused.
  6. Start a terminal emulator (PuTTY) on the appropriate serial port of your PC at 115,200 baud rate. Enable logging printable output.
  7. Boot the device, allow the bootup log to finish to retrieve information about the device. See log
  8. Power device off and on and press space key when you see Press space bar to cancel startup... to access shell prompt.

Test Point Multimeter Chart

with ethernet ports on the left, point 1 is on the left and 4 is on the far right

TP V Ω GND Ω VCC Notes
1 0 GND
2 3.3
3 3.3
4 3.3 unused

Information

Microprocessor: Broadcom BCM5356C0KFBG

About

Reverse engineering a Belkin N150 Wireless Router model F9K1001V4

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published