Skip to content

Commit 49d5c79

Browse files
Update README.md
1 parent 0fd286d commit 49d5c79

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

README.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,7 @@ Getting a sha512 hash:
175175
## Basic Analysis of the Firmware: 💻🕵️
176176
To gather basic strings and identify potential embedded information in the firmware before performing further analysis:
177177

178+
178179
```bash
179180
file doorbell.bin # Determine the file type
180181
@@ -194,7 +195,10 @@ To unpack the firmware and extract embedded files or hidden elements, I used bin
194195
binwalk -eM doorbell.bin # Extract known file types (-e), and recursively scan extracted files (-M)
195196
```
196197
## Basic Analysis of the Firmware's Filesystem: 🗃🕵️
197-
198+
<details>
199+
<summary>🖱Click here to expand</summary>
200+
If you want to follow along, I have included the passwd & shadow files in this repo.
201+
198202
#### We are performing <ins>*static*</ins> analysis, later in the series we look at <ins>*dynamic*</ins> analysis.
199203

200204
##### Here are some of the things we are looking for:
@@ -270,6 +274,8 @@ $ john hash.txt --show
270274
271275
1 password hash cracked, 0 left
272276
```
277+
</details>
278+
273279
## Password: 🗝 The password for the root user is <ins>tina.</ins>
274280
I think it's safe to say that ***tina*** comes from ***Tina Linux*** and that implies that default passwords are being used. I was able to verify this by performing the same steps on another doorbell, same manufacturer.
275281
The password was in fact the same, ***tina***.

0 commit comments

Comments
 (0)