Dears,
I'm coming from the software side of the world, with very limited skills in electronic/hardware and I am trying to reverse engineer my wireless alarm. So far I've been able to extract firmwares of various components (sensors, motion captors, ...) and to analyze (+decrypt) radio communications. It's a very funny project which helps me to learn a bit about embed devices hacking.
Now my problem.
I'm stuck finding the JTAG port of the central device. I've tried various approaches against the exposed pinouts of the PCB such as logic/voltage analyzing (based on
http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/), JTAGulator, etc, but nothing worked so far.
Therefore, I would be interested to hook directly on the dedicated pins of the chipset. The problem for me is that the chip is a 128 pins STR91xFA, so small that I can't solder anything on it my self. Pins are 0.007 inch (0.2 mm) large. I'm also trying to find test clips grabbers small enough, but here again, without luck.
Here is the datasheet, package dimensions are on page 96:
http://www.st.com/st-web-ui/static/active/en/resource/technical/document/datasheet/CD00159308.pdfCould anyone point me an alternated technique (or hardware) to hook on these small pins ?
Do test clips exists for this ? and where could I get them ?
Any other advices or idea would be very welcome in any case !
Thank you very much
Ps: Sorry for my English.