a collection of writeups and tools related to ~embedded device ~hacking
Go to file
Conor Horan-Kates fb89237506 cleanup
2017-03-12 17:13:34 -07:00
cujo fixing typo 2017-02-20 11:50:36 -08:00
hootoo updating the Hootoo writeup with some WIP IPCam notes 2016-07-19 07:04:53 -07:00
lametric cleanup 2017-03-12 17:13:34 -07:00
lg_webOS mostly minor cleanup changes 2017-01-28 16:20:36 -08:00
lib useful tools, probably should be part of ctf 2016-11-28 19:17:47 -08:00
mifi mostly minor cleanup changes 2017-01-28 16:20:36 -08:00
rav-filehub fixing markdown 2016-07-08 21:11:36 -07:00
revolabs-flx_uc_1000 adding a script to create a cpio 2017-02-21 17:43:39 -08:00
ubiquiti/mfi now fixing the file 2017-03-06 13:05:28 -08:00
.gitignore everything except actually rooting the device 2017-03-12 17:12:58 -07:00
README.md everything except actually rooting the device 2017-03-12 17:12:58 -07:00

h4ck

a collection of writeups and tools related to ~embedded device ~hacking

shiny devices are fun, finding and poking holes in their interface is a lot of fun

devices

name description url
CUJO purposeful MiTM device for internet 'security' cujo
LG webOS HTTP phone home is never a good idea lg-webOS
HooToo TripMate series there are lots of problems, some end up at root access hootoo
Lametric Time WiFi/internet enabled clock/LED display, unnecessary services exposed, root access obtainable lametric
Philips Hue device communication insecure, Ruby library/CLI to control via REST HTTP hued
RAV FileHub a HooToo by any other name.. but with a twist rav-filehub
RevoLabs flx UC1000 more than just brute forcing the PIN revolabs-flx_uc_1000
Ubiquiti mFi mPower root access trivially obtained, credential leakage, unnecessary services exposed ubiquiti/mFi