- 71
- 2 523 272
Matt Brown
เข้าร่วมเมื่อ 29 ส.ค. 2022
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
- Soli Deo Gloria
Persistent Root Shell via IoT Firmware Modification - Rooting a TP-Link Security Camera
Minipro repo:
gitlab.com/DavidGriffith/minipro
Need IoT pentesting or reverse engineering services?
Please consider Brown Fine Security:
brownfinesecurity.com/
IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A
🛠️ Stuff I Use 🛠️
🪛 Tools:
Raspberry PI Pico: amzn.to/3XVMS3K
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4h4G7DD
iFixit Toolkit: amzn.to/44tTjMB
🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx
🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
💻 Social:
website: brownfinesecurity.com/
twitter: nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/
#hacking #iot #cybersecurity
gitlab.com/DavidGriffith/minipro
Need IoT pentesting or reverse engineering services?
Please consider Brown Fine Security:
brownfinesecurity.com/
IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A
🛠️ Stuff I Use 🛠️
🪛 Tools:
Raspberry PI Pico: amzn.to/3XVMS3K
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4h4G7DD
iFixit Toolkit: amzn.to/44tTjMB
🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx
🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
💻 Social:
website: brownfinesecurity.com/
twitter: nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/
#hacking #iot #cybersecurity
มุมมอง: 12 054
วีดีโอ
Glitching Linux Bootloader for Shells and Freedom - Rooting a TP-Link Security Camera
มุมมอง 32Kวันที่ผ่านมา
Hack the Planet!!! Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3Uz...
Open Source Flash Programmer Software - minipro FTW
มุมมอง 12K21 วันที่ผ่านมา
minipro repo: gitlab.com/DavidGriffith/minipro algorithm.xml archive: brownfinesecurity.com/algorithm.xml Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIh...
Hacking Time - Discussing the Bug Class that Earned Me 5-Figures
มุมมอง 8K21 วันที่ผ่านมา
ArchAngelDDay's Nahamsec Talk: th-cam.com/video/G1RHa7l1Ys4/w-d-xo.html NTP mitm Demo: github.com/nmatt0/ntp-mitm-demo Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer:...
Chip Off Firmware Extraction - Hacking the Totolink WiFi Router
มุมมอง 40Kหลายเดือนก่อน
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Power Supply: amzn.to/3QBNSpb Oscilloscope: amzn.to/3UzoAZM Logic Analyzer...
Top 5 Tools for IoT Hacking Beginners
มุมมอง 16Kหลายเดือนก่อน
Check out the blog post related to this video! brownfinesecurity.com/blog/hardware-hacking-tools-beginners-guide/ Amazon Items from the Video: WiFi Router: amzn.to/3YqjjqH iFixit Toolkit: amzn.to/408Kfwr Multimeter: amzn.to/4hn6Z27 UART Adapter: amzn.to/4h4G7DD Jumper Wire: amzn.to/4eOrZgk PINECIL Soldering Iron: amzn.to/48cxNxD Solder: amzn.to/3UdhISN Wire Strippers: amzn.to/4eMUYkv Need IoT p...
Make Binwalk Fast Again - Rust Rewrite of Binwalk is in Beta
มุมมอง 13Kหลายเดือนก่อน
Check out V3 of binwalk! github.com/ReFirmLabs/binwalk/tree/binwalkv3 Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Multimeter: amzn.to/4b9cUUG Powe...
Discovering Backdoor in Chinese Router Firmware Update Server - Hacking the Totolink WiFi Router
มุมมอง 35Kหลายเดือนก่อน
In this video, we show how I discovered a backdoor in the firmware update server for the TOTOLINK Wi-Fi router. Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.t...
UART Root Shell on Linux Router - Hacking the Totolink WiFi Router
มุมมอง 19Kหลายเดือนก่อน
In this video, we discover a hardcoded root password though the aid of OpenWRT's failsafe mode. OpenWRT Failsafe Mode Docs: openwrt.org/docs/guide-user/troubleshooting/failsafe_and_factory_reset Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Us...
Wireshark Basics for IoT Hacking
มุมมอง 15K2 หลายเดือนก่อน
Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimeter: amzn.to/3YUjbQS Power Supply: amzn.to/3QBNSpb O...
Using Linux to Intercept IoT Device Traffic
มุมมอง 15K2 หลายเดือนก่อน
mitmrouter on GitHub: github.com/nmatt0/mitmrouter Need IoT pentesting or reverse engineering services? Please consider Brown Fine Security: brownfinesecurity.com/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimet...
Hacking a Chinese Medical Device via Bluetooth - iHealth Nexus Pro Scale
มุมมอง 19K2 หลายเดือนก่อน
exploit code: github.com/BrownFineSecurity/ihealth-hs2spro-exploit bletools repo: github.com/nmatt0/bletools Check out the blog post related to this video! brownfinesecurity.com/blog/intercepting-mobile-traffic-with-caido-and-frida/ Watch other videos about BLE hacking: th-cam.com/play/PLuyjXiwnBIa1vj9jHyO-uB8W1nHN-xjLO.html IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcx...
Intercepting Mobile Traffic with Caido and Frida - iHealth Nexus Pro Scale
มุมมอง 14K2 หลายเดือนก่อน
Check out the blog post related to this video! brownfinesecurity.com/blog/intercepting-mobile-traffic-with-caido-and-frida/ IoT Hackers Hangout Community Discord Invite: discord.com/invite/vgAcxYdJ7A 🛠️ Stuff I Use 🛠️ 🪛 Tools: Raspberry PI Pico: amzn.to/3XVMS3K XGecu Universal Programmer: amzn.to/4dIhNWy Handheld Multimeter: amzn.to/4b9cUUG Bench Multimeter: amzn.to/3YUjbQS Power Supply: amzn.t...
Siglent SDM3045X Multimeter - with Custom OBS Overlay
มุมมอง 5K3 หลายเดือนก่อน
Siglent SDM3045X Multimeter - with Custom OBS Overlay
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
มุมมอง 18K3 หลายเดือนก่อน
Statistical Attacks on Proprietary Encryption - Hacking the VStarcam CB73 Security Camera
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
มุมมอง 104K3 หลายเดือนก่อน
Breaking a Proprietary Chinese Encryption Protocol - Hacking the VStarcam CB73 Security Camera
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
มุมมอง 315K3 หลายเดือนก่อน
Decrypting SSL to Chinese Cloud Servers - Hacking the VStarcam CB73 Security Camera
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
มุมมอง 11K3 หลายเดือนก่อน
JFFS2 Firmware Modification - IoT Pentesting Tips and Tricks
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
มุมมอง 154K3 หลายเดือนก่อน
Discovering a Hardcoded Root Password - Hacking the VStarcam CB73 Security Camera
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
มุมมอง 39K3 หลายเดือนก่อน
Hacking a Tiny Security Camera - VStarcam CB73 Firmware Extraction
UFS/eMMC Firmware Extraction - UFI Box
มุมมอง 12K4 หลายเดือนก่อน
UFS/eMMC Firmware Extraction - UFI Box
Hacking a Knockoff Google Chromecast - Firmware Extraction
มุมมอง 107K4 หลายเดือนก่อน
Hacking a Knockoff Google Chromecast - Firmware Extraction
blueTag - A Raspberry PI Pico JTAGulator Alternative
มุมมอง 9K4 หลายเดือนก่อน
blueTag - A Raspberry PI Pico JTAGulator Alternative
Hacking a WiFi Fireworks Firing System - The FireFly Plus
มุมมอง 15K4 หลายเดือนก่อน
Hacking a WiFi Fireworks Firing System - The FireFly Plus
Flipper Zero Chat App - RF Signal Analysis via SDR
มุมมอง 12K4 หลายเดือนก่อน
Flipper Zero Chat App - RF Signal Analysis via SDR
4G GPS Tracker Reverse Engineering - GPS Digital Signal Decoding
มุมมอง 17K4 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - GPS Digital Signal Decoding
4G GPS Tracker Reverse Engineering - Cell Modem Interactions
มุมมอง 32K5 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - Cell Modem Interactions
4G GPS Tracker Reverse Engineering - Hardware Analysis
มุมมอง 18K5 หลายเดือนก่อน
4G GPS Tracker Reverse Engineering - Hardware Analysis
Hacking The Mojo C-75 - YT Comments Follow-Up
มุมมอง 4.4K5 หลายเดือนก่อน
Hacking The Mojo C-75 - YT Comments Follow-Up
Hacking The Mojo C-75 - Intercepting Network Traffic
มุมมอง 8K5 หลายเดือนก่อน
Hacking The Mojo C-75 - Intercepting Network Traffic
Cool beans! Looks like this is the only way we can actually get cameras to use on foss security setups.
I've done a lot of contacted IoT testing for some of the big companies. Given you had a root shell, no chip off writing of flash was needed. This device has pretty poor security: - no/poor secure boot implementation - poor uboot security - no verification of squashfs partition by previous stage - data on flash not encrypted via EFUSE keys Also fortunate not BGA chips. That said, not knocking the video - great tutorial on how to do chip off read/write.
Happy follower, and still very ADHD... cards linking to prior videos when you mention them (or a playlist or collection) would be lovely. Thank you for the work you do, and for explaining so well.
Very nice and well explained. I always enjoy your content.
So cool!
Great video as always. Can you tell us what the exact model is?
Try dmesg -n0 , perhaps it would stop loggin to the console..
So... U`ll MITM that TLS Connection to China? Or even look at those UDP packets?
Hi Matt, could you please add a link for the pogo pins? You mentioned that there was a link but I don't see it. Thanks 🙂
Good call on the bin compression
Your new compressed squash fs binary was few hundred bytes smaller. When you write it to firmware - what happens? Does it mean there will be few hundred bytes of the original squash fs binary remaining in the firmware? Does it remain as a dead (non accessible data)? Also, what would happen if tje new squash fs binary is larger even if by few bytes?
P.S. Would be nice to see further videos on what you managed to reverse engineer, and how would you improvevthis device. P.P.S. I guess for making further changes you would need to do absolotelly the same procedure on modifying that read only fs. Because of that, would it not make sense to add some socket onto the camera board for easy removal/reinsertion of the chip (if they exist for this 8 pin package)?
can you try ubiquiti devices
Great work! Do you think it's possible to reprogram the chips without having to take them off the board? Is it just easier to get all the pins aligned and stuff if you have it on its own?
Are you hacking free service or what
Great knowledge! Brilliant explanation! Thank you Mat!!!!!!!!!!!!!!!!!!!!!
Cool vid. Waiting on the episode of reverse Eng. Of these binaries
Awesome video Matt! Much appreciated with your knowledge and skills. Questions, have you ever tried doing a chip off and firmware extraction from a Secure Enclave chip from an iOS device? Curious as its super robust (maybe encrypted at rest itself). Godspeed!
The chip actually supports secure boot. Its such a shame that it wasn't implemented for this platform
Please explain to me why hack your own router what's the purpose what are you gaining just asking
Could you make a video detailing your education and how you got to your skill level? Vids are great, keep it up!
Very much agree with all other commenters on your format and detailed explanations! I would only encourage you to invest in slightly better cameras (resolution makes it blurry looking) and to beef up the lighting. It will make a huge difference to what the camera manages to capture.
which camera specifically is blurry? or all of them?
Basically all of them. Can't tell if it's the compression causing it or if the camera itself that is causing it.
Excellent video, I love these hacks, I learn a lot from them. If I may give you one point of feedback: for me the flow of information is a little too slow in the videos. I find myself reaching for the playback speed setting and skipping bits. Not to say I want you to turn it into some kind of awful TikTok channel, it's just that the information density could be higher imo.
1:32 "yOU Can see..." lol edit: while watching this, something came to mind. i want to explore this in a chroot now. what architecture is this cpu? can you maybe release the stock rootfs? would love to tinker around with it!
you are covered. Love your videos.
If new squashroot is different size does newfw.bin not have either leftover data or truncated data? Would a more complete newfw.bin not require two calls to dd with new count for the 1st and offset for 2nd?
This is a really awesome video, I would definitely love to see more of the process, like how you go about reversing the binaries you found or analyzing traffic as the device is being used
Really interesting stuff, brilliantly presented. Thanks!
yoooo droppin str8 heat!!
There's a "PEM private key" file. Is it encrypted and does it correspond to any of those PEM Certificates?
I love this channel! I've been into computers since DOS (that ages me), never attempted firmware mods like this but was heavily into decompiling and programming software as a hobby. I appreciate your simple explaining of not only procedures but why you are doing them. Keep it up and your channel will skyrocket!
As always great video
This was awesome. I love learning how to manipulate binary files. That's something I never got that deep into. Seeing these tools in action and having a reference to go back to is making me want to do more experimenting. Thank you!
can you do a firmware modification on a mikrotik device. they have a custom openwrt somehow look and work more stable
Been watching your vids since you started and they've all been very informational but the quality and format have become excellent. Thank you !
Nice video ! Quick question, in case you don't have a chip reader (or the ability to unsolder the memory chip), if you can anyway get a shell easily at boot, how would you extract files from that UART connection ? In this example /bin/cloud-iot. Thx
Ohh that's a good question! If there are any utilities that can transfer files (curl, netcat, etc) you can use them to exfil files off the running device. This is a good video idea
@@mattbrwn Yup, I suppose sometimes you even need to transfer such utilities from your host to the target device. AFAIC, file transfer over netcat is always syntactically painful
FYI: it looks like binwalk v3 has already been pushed to the arch repos, so unless you need your special fork you should be able to use the rust version with the main binary. It looks like you incidentally used v3 in the new binary without noticing when you ran the extract. Wonderful video as always.
Yep! I just have the old one installed also so I can compare findings. I already made one commit to the rust version and needed to see the delta with the old tool.
You explain the whole process of working with hardware in a very understandable way, its not too caught up in details. The way you walk people through it makes it so easy to understand the basics of working with hardware which for me atleast was the most intimidating part. Since watching the channel I've been able to do a chip off firmware extraction, get a uart shell with my flipperzero as a bridge and locate a vulnerability in a router. It might not sound like a lot if you're watching this guy's videos but this is from someone with zero hardware experience or formal education. Big ups to Matt for being an excellent teacher🙏
This is awesome to hear!! 🫶
really enjoyed the video, live that you explained every step of the way there great job! would love a vid where you explain a more general approach or one where you just explain where you find out what works and what wont work for certain chips or where you find you information
Nice video, Noob question, is it necessary to desolder the chip for reading / flashing? I've seen these clip-on soic cables.
I prefer to try that first, "usually" it works fine, however sometimes injecting power to the flash chip pins will make the CPU or other chips "wake up" and then that can get in the way because then multiple things will be barking commands at the flash chip. Sometimes you can get the CPU to hang using tactics similar to the bootloader glitch like ground some of its address lines so it hangs trying to hit RAM or such (or some SoC chips have a reset pin which will hold the CPU in reset, which is better than glitching it), and then it will leave the flash DI/DO pins alone (floating) so the programmer (CH341 or similar) can use them without interference.
IOT = idiotic obtuse trash
Why are you not connecting the tx and rx to the test points on the pcb that are nearby the chip (4 round ones) ??
Some devices don't have those, and showing how to do this regardless of specific device or board layout is more useful. Of course hunting around for test pads that end up at the SoC pins is always an "extra credit" option.
TY well done video! I'd be interested in seeing where those custom binaries call out /bin/cloud-iot etc... what , if any, data is shared out with the tplink servers .
Great video, as always 👍 You could have used the break out Pads instead of the pins, not as fiddly😉
Are your start and stop bits for UART set correctly?
Isn't that a 3V flash chip? Minipro claims it's using 5V. Usually not something that'll kill the chip right away though, and maybe just a beta version artefact. (I ran 3.3V myself to a 1.8V flash recently and it survived so ..)
yay for open source! good vid too ;-)
I saw telnet daemon listening on loopback interface (127.0.0.1), so you could also run it on all interfaces and access shell remotely instead of using UART. I wonder if there is any form of ssh server available there which could be used instead of telnet.
Many times there is no space, even for something light like dropbear. Gotta have room for their custom bloatware cloud apps. :)
PCbite probes are new to me. Thanks for mentioning them. I previously tried a pogo pin array which I got to work but the pin spacing was never quite right.
good informative content , thank you !
Awesome job thanks for the tips shared in the video nice job