You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+65-8Lines changed: 65 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ The goal of this project is to offer a transparent look into the firmware of a w
13
13
14
14
Whether you’re a Linux enthusiast, a security researcher, a reverse engineer, or a hacker, this project aims to provide useful resources to help uncover how the firmware operates and potentially identify vulnerabilities, security flaws, or other points of interest.
15
15
16
-
## 📷 ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
16
+
## 📷 [Hacking an IoT Video Doorbell - What's Inside?](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
17
17
18
18
### 
19
19
@@ -100,9 +100,9 @@ The name of this operating system is ***Tina Linux.*** If you haven't done so al
100
100
```
101
101
>**💡Tip:**
102
102
> You can use `sed` to display only lines 36 to 47 from the Bootlogs.txt file.
103
+
---
103
104
104
-
105
-
## ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
105
+
## [Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
106
106
107
107
### 
108
108
@@ -285,10 +285,33 @@ $ john hash.txt --show
285
285
I think it's safe to say that ***tina*** comes from ***Tina Linux*** and that implies that default passwords are being used. I was able to verify this by performing the same steps on another doorbell, same manufacturer.
286
286
The password was in fact the same, ***tina***.
287
287
288
-
## ["Hacking an IoT Doorbell: Automated Analysis"](https://www.youtube.com/watch?v=GhEeZATJi2Y)
288
+
---
289
+
290
+
## [Hacking an IoT Doorbell: Automated Analysis](https://www.youtube.com/watch?v=GhEeZATJi2Y)
289
291
290
292
### 
291
293
294
+
## 🔍 Automated Firmware Analysis Overview
295
+
In this video, we dive into automating the firmware analysis process using a powerful suite of tools to save time, reduce manual effort, and uncover potential vulnerabilities in IoT firmware. Using a low-cost video doorbell as the target, we follow the **OWASP Firmware Security Testing Methodology** and move from manual to automated analysis techniques.
[ClamAV](https://clamav.net) | Scans for known malware, viruses, and threats within extracted files | https://www.clamav.net
305
+
[ChatGPT](https://chat.openai.com) | Assists in analyzing shell scripts and interpreting logic | https://chat.openai.com
306
+
307
+
---
308
+
309
+
310
+
## 📄 Bonus Resources
311
+
OWASP Firmware Security Testing Methodology: Followed throughout the series. Available via Doug’s [Fresh PDF Library GitHub repo](https://github.com/DouglasFreshHabian/FreshPDFLibrary).
312
+
313
+
This episode marks a key shift from **manual analysis** to **scalable, repeatable automation**, making it easier to spot security flaws in embedded devices.
314
+
292
315
## Contributing & Collaboration: 🤝
293
316
294
317
#### This is an open project, and I welcome contributions and feedback from the community. If you have insights, improvements, or additional findings related to the firmware, please feel free to submit issues or pull requests.
@@ -313,13 +336,47 @@ Your thoughts, questions, and feedback are greatly appreciated! Feel free to ope
313
336
314
337
Thank you for checking out [D00rb3ll](https://github.com/DouglasFreshHabian/d00rb3ll). Stay tuned for future updates, and happy reverse engineering!
315
338
339
+
# Support D00rb3ll™️
340
+
341
+
Thank you for using and supporting **D00rb3ll™**! If this project has helped you, or if you appreciate the work put into it, there are several ways you can support the project.
342
+
343
+
Your support helps with continued development, testing, and future features. Any contribution is highly appreciated!
344
+
345
+
## 💖 Ways to Support
346
+
347
+
### ☕💜 Buy Me a Coffee
348
+
If you'd like to buy me a coffee to show your appreciation, click the link below:
349
+
[Buy Me a Coffee](https://www.buymeacoffee.com/dfreshZ)
350
+
351
+
### 💙☕ Ko-fi:
352
+
Support me on Ko-fi and get exclusive updates and perks:
353
+
[Support on Ko-fi](https://ko-fi.com/thefreshlab)
354
+
355
+
## 🛍 Fresh Forensics Store (Shopify)
356
+
Check out my Shopify 🛒 Store for creative artwork, custom Linux tools, and open-source solutions!
You can sponsor me directly on GitHub for long-term support:
361
+
[Sponsor on GitHub](https://github.com/sponsors/DouglasFreshHabian)
362
+
363
+
### Amazon Affiliate Links
364
+
Purchase any products through Amazon by clicking on my affiliate links and I get a small percentage!
365
+
[Full List of Affiliate Links](https://github.com/DouglasFreshHabian/D00rb3ll/PRODUCTS.md)
366
+
367
+
## 🙏 Thank You!
368
+
369
+
Every contribution, whether it's financial, code contributions, or simply using and promoting the project, hels make REPOSITORY™ even better. Thank you for your support!
370
+
371
+
Your generosity allows me to continue developing and maintaining the project for the benefit of everyone. 🌟
0 commit comments