Skip to content

Commit 6dd7b03

Browse files
Update README.md
1 parent 623a43e commit 6dd7b03

File tree

1 file changed

+15
-10
lines changed

1 file changed

+15
-10
lines changed

README.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ The goal of this project is to offer a transparent look into the firmware of a w
1414
Whether you’re a Linux enthusiast, a security researcher, a reverse engineer, or a hacker, this project aims to provide useful resources to help uncover how the firmware operates and potentially identify vulnerabilities, security flaws, or other points of interest.
1515

1616

17-
# 📷 ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
17+
## 📷 ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
1818

19-
## ![Hacking an IoT Doorbell - Youtube Thumbnail.](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Thumbnail-1.png)
19+
### ![Hacking an IoT Doorbell - Youtube Thumbnail.](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Thumbnail-1.png)
2020

2121
## The first video was posted and is titled, ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
2222

@@ -55,7 +55,7 @@ minicom
5555
-C, --capturefile=FILE # Open capture file at startup and whatever you get on the screen get saved to a logfile.
5656
```
5757

58-
## 👢 [Bootlogs:](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Bootlogs.txt)
58+
### 👢 [Bootlogs:](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Bootlogs.txt)
5959
I have included the bootlogs file in this repo so that you can follow along with the first video.
6060
One of the things that we did was pull out all of the ip address using regex:
6161

@@ -98,9 +98,9 @@ The name of this operating system is ***Tina Linux.*** If you haven't done so al
9898
> You can use `sed` to display only lines 36 to 47 from the Bootlogs.txt file.
9999
100100
101-
# ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
101+
## ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
102102
103-
## ![Hacking an IoT Doorbell - Youtube Thumbnail-2.](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Graphics/Thumbnail-Video-2.png)
103+
### ![Hacking an IoT Doorbell - Youtube Thumbnail-2.](https://github.com/DouglasFreshHabian/D00rb3ll/blob/main/Graphics/Thumbnail-Video-2.png)
104104
105105
The firmware here was extracted using a CH341A SPI programmer and the `flashrom` utility. The resulting firmware image, doorbell.bin, is shared in its raw form, enabling anyone to dive into static analysis, emulation, or any other form of research.
106106
@@ -125,8 +125,11 @@ Probe for the flash chip:
125125
>**💡Important:**
126126
>Always probe first to try and get the name of the chip.
127127
## Ok, Let's get hands on: ✋🤚
128+
Read and dump the firmware:
128129
<details>
129-
<summary> Read and dump the firmware: </summary>
130+
131+
<summary>🖱Click here to expand</summary>
132+
130133
Commands:
131134
```bash
132135
flashrom --programmer ch341a_spi --chip [Chip Name] --read doorbell-1.bin
@@ -146,7 +149,9 @@ Then compare image 1 with image 2 and if there are no differences, you know you
146149

147150
## Before we begin analysis, it's a good idea to first get a hash of the image:
148151
<details>
149-
<summary> There are several command line utilities that we could use for this including sha256sum, sha512sum and md5sum. </summary>
152+
<summary>🖱Click here to expand</summary>
153+
154+
There are several command line utilities that we could use for this including sha256sum, sha512sum and md5sum.
150155

151156
Getting a md5 hash:
152157
```bash
@@ -295,12 +300,12 @@ Your thoughts, questions, and feedback are greatly appreciated! Feel free to ope
295300
Thank you for checking out [D00rb3ll](https://github.com/DouglasFreshHabian/d00rb3ll). Stay tuned for future updates, and happy reverse engineering!
296301

297302

298-
## Resources: [FreshPdfLibrary](https://github.com/DouglasFreshHabian/FreshPdfLibrary)
303+
### Resources: [FreshPdfLibrary](https://github.com/DouglasFreshHabian/FreshPdfLibrary)
299304
In this repo, you find the guide that I am using in this series as well as a lot more!!!
300305

301-
### If you have not done so already, please head over to the channel and hit that subscribe button to show some support. Thank you!!!
306+
#### If you have not done so already, please head over to the channel and hit that subscribe button to show some support. Thank you!!!
302307

303-
## 👊 [https://www.youtube.com/@DouglasHabian-tq5ck](https://www.youtube.com/@DouglasHabian-tq5ck)
308+
### Support Me: 👊 [https://www.youtube.com/@DouglasHabian-tq5ck](https://www.youtube.com/@DouglasHabian-tq5ck)
304309

305310

306311

0 commit comments

Comments
 (0)