Hw - compromised

For this challenge, we have again a Saleae Logic project. There are 2 channels: dump_logic

This is a I²C communication with channel 0 being SDA and channel 1 SCL, the clock. We can add a I²C analyzer on logic and extract the analysis to dump.txt.

Time [s],Packet ID,Address,Data,Read/Write,ACK/NAK
0.974250660000000,0,4,s,Write,ACK
0.999460300000000,0,4,e,Write,ACK
1.024669880000000,0,4,t,Write,ACK
1.049884460000000,0,4,_,Write,ACK
1.075094020000000,0,4,m,Write,ACK
1.100303660000000,0,4,a,Write,ACK
1.100553640000000,0,COMMA,C,Write,ACK
1.125763220000000,0,4,x,Write,ACK
1.125998200000000,0,COMMA,H,Write,ACK

Then we will use a python script to find the flag.

dump = open('dump.txt', 'r').read().split('\n')

# we follow the COMMA address, found by experimenting both 4 address and COMMA address
print(''.join([s.split(',')[3] for s in dump[1:-1] if "COMMA" in s.split(',')[2]])) # the flag