Hacking a Smart Camera: IoT Hacking With Andrew Bellini (Part 4)

preview_player
Показать описание
Part 4 of our smart camera hacking series has arrived! Andrew Bellini gets a shell - and despite not being able to crack the root hash, he successfully patches the firmware to bypass the login altogether. See how he lands a direct root shell in this short. 👀 Make sure you subscribe to our channel to see more smart device hacking features like this!

Ideas on smart devices we should hack in future shorts? Let us know!

#shorts #hackingtutorial #iotsecurity #iot #smartcamera #hardwarehacking

📱Social Media📱
___________________________________________

💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:

Hacker Books:

My Build:

My Recording Equipment:

Рекомендации по теме
Комментарии
Автор

And this is why we always say they you can't protect a device if physical access is gained.

jeffrbake
Автор

uboot shell was accesible. So you could have just added "init=/bin/sh" to bootargs variable and you would be having a root shell. Much much simpler :)

kassenbon
Автор

when all parts done, put them all in one video on the channel so i can save it for later

adulsalam
Автор

Do you have a list of all the hardware used in this mini-series? I understood all of this, though I do not have the means to try it practically yet

HelloworldXY
Автор

Honestly this sort of stuff is way better as a full video than short form content

scellyyt
Автор

Now I know where the lock picking lawyer disappeared to....😅

dylanmonaghan
Автор

About 34 years ago I used to do this. But I'd just patch the passwd file to have a hash of a password that I knew. (There was a (common!) configuration error that would allow anyone on the internet to patch /etc/passwd without requiring credentials).

rewolff
Автор

"wrote to the rom" is so cursed

undergroundmonorail
Автор

why didn't you overwrite the password hash with a known value?

gnandor
Автор

I like the series and I'm glad it keeps popping up, but I go to your channel and I don't find any regular videos like it. Sort of hard to justify a subscription in that case.

theslawek
Автор

armv5... that 929 core is certainly starting to show it's age.

toxicpsion
Автор

You're so cool! This is crazy impressive, seriously, really wish I had these skills. I actually understood almost everything talked about it the video, still I'm happy about that.

crazierthorn
Автор

I didn't understand all of it. Is this included in Harware hacking course?

daredevil_orchid
Автор

This is really really fascinating. I know one can do anything with root access, but what are some meaningful examples

SirasPK
Автор

bro what's the mic and audio software? is it good for teaching (engineering, maths etc)

prtygrl
Автор

What kind of processor was this using??

GerryPrompt
Автор

ok, now what you can do in that shell?

BartekOO
Автор

Tried exactly this with my cam - no boot shell- actually no effect at all

MiDo-byib
Автор

how are those cables called? i need 4 for an uart connection. is it possible with crocodrillw clip cables?

panchopepe
Автор

@TCMSecurityAcademy
#TCMSecurityAcademy
How do I identify the makware left behind from a hacker for my S23 Ultra and Motorola Power G smartphone devices?

Thank you in advance.

SoFreshSoClean