You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+15-10Lines changed: 15 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ The goal of this project is to offer a transparent look into the firmware of a w
14
14
Whether you’re a Linux enthusiast, a security researcher, a reverse engineer, or a hacker, this project aims to provide useful resources to help uncover how the firmware operates and potentially identify vulnerabilities, security flaws, or other points of interest.
15
15
16
16
17
-
# 📷 ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
17
+
##📷 ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
18
18
19
-
## 
19
+
###
20
20
21
21
## The first video was posted and is titled, ["Hacking an IoT Video Doorbell - What's Inside?"](https://youtu.be/dVZNmC5-uO4?si=WXdHWTCoSJMnTiCV)
22
22
@@ -55,7 +55,7 @@ minicom
55
55
-C, --capturefile=FILE # Open capture file at startup and whatever you get on the screen get saved to a logfile.
I have included the bootlogs file in this repo so that you can follow along with the first video.
60
60
One of the things that we did was pull out all of the ip address using regex:
61
61
@@ -98,9 +98,9 @@ The name of this operating system is ***Tina Linux.*** If you haven't done so al
98
98
> You can use `sed` to display only lines 36 to 47 from the Bootlogs.txt file.
99
99
100
100
101
-
# ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
101
+
## ["Hacking an IoT Video Doorbell: Extracting & Analyzing Firmware"](https://youtu.be/fGCQTk4-eE4?si=HizJNpvhUviEKrlf)
102
102
103
-
## 
103
+
### 
104
104
105
105
The firmware here was extracted using a CH341A SPI programmer and the `flashrom` utility. The resulting firmware image, doorbell.bin, is shared in its raw form, enabling anyone to dive into static analysis, emulation, or any other form of research.
106
106
@@ -125,8 +125,11 @@ Probe for the flash chip:
125
125
>**💡Important:**
126
126
>Always probe first to try and get the name of the chip.
@@ -146,7 +149,9 @@ Then compare image 1 with image 2 and if there are no differences, you know you
146
149
147
150
## Before we begin analysis, it's a good idea to first get a hash of the image:
148
151
<details>
149
-
<summary> There are several command line utilities that we could use for this including sha256sum, sha512sum and md5sum. </summary>
152
+
<summary>🖱Click here to expand</summary>
153
+
154
+
There are several command line utilities that we could use for this including sha256sum, sha512sum and md5sum.
150
155
151
156
Getting a md5 hash:
152
157
```bash
@@ -295,12 +300,12 @@ Your thoughts, questions, and feedback are greatly appreciated! Feel free to ope
295
300
Thank you for checking out [D00rb3ll](https://github.com/DouglasFreshHabian/d00rb3ll). Stay tuned for future updates, and happy reverse engineering!
0 commit comments