
UART Page Overview #
The UART page in MACOBOX is designed to help you interact with the serial interface of embedded devices — one of the most common and useful entry points during hardware analysis and penetration testing.
UART (Universal Asynchronous Receiver/Transmitter) allows you to:
The UART page is divided into two main sections:
- View boot logs
- Access console interfaces
- Send commands directly to the device
- UART Output
- Saved Files
UART Output #
This is where you’ll see the live communication with the target device.
You can:
- Select the baud rate from a dropdown list, including the most common ones.
- Choose “Auto” to let MACOBOX automatically test the most used baud rates and detect the correct one.
- Press Start to begin the UART session.
Next to the Start button, you’ll find:
- Expand, to enlarge the output area for easier reading.
- Save, to store the current log in the Saved Files section (under the Logs tab).
Advanced Options #
In the Advanced Options section, two powerful features are available:
Run Scripts #
You can define and save one-liner commands to be sent directly over serial.
The output of each command will be saved automatically under the Output tab in the Saved Files section.
Grep & Send #
This feature lets you automatically send commands when a specific output is detected from the device — ideal for situations like sending repeated input to enter failsafe mode.
It’s especially handy when operating MACOBOX via the touchscreen interface.
Tabs: Serial vs Terminal #
All the above features are part of the Serial tab.
If you switch to the Terminal tab, you’ll get a classic command-line interface (CLI) experience with interactive shell support — something not available in the Serial tab, which is focused on automation and analysis.
AI-Powered Analysis (Subscription Only) #
The final tab under Saved Files is Analyzed.
This tab is populated via the “Start AI Analysis” button, available in the log viewer modal.
(Only for subscribed users.)
MACOBOX’s AI will scan the log and extract key information such as:
- Device identifiers
- Memory areas
- Detected components
- Potential entry points or useful patterns
The output is saved in a human-readable format, making it easier to continue your investigation without re-parsing raw logs.
