Hacking Amazon's Eero 6 (part 1)
The blog post discusses hacking Amazon's eero 6 Wi-Fi device by disassembling it, identifying pins, and using tools like OpenOCD and Adafruit FT232H for communication. Detailed steps and insights are provided.
Read original articleThe blog post details the process of hacking Amazon's eero 6 (3rd gen 2020) Wi-Fi device, focusing on disassembly, identifying pins, brute forcing JTAG, and reading serial output. The author disassembles the device, identifies JTAG and serial pins, and uses a logic level shifter and Arduino Nano for communication. By soldering wires and setting up the wiring, the author successfully identifies JTAG and SWD pins. The blog explains the use of OpenOCD and a debug adapter like Adafruit FT232H to communicate with the device. The author configures OpenOCD for JTAG probing and successfully identifies the chip IDs. The process involves detailed steps such as setting up the debugger configuration, probing the JTAG interface, and creating a new configuration file based on the discovered TAP interface. The blog provides a comprehensive guide for hacking the eero 6 device, offering insights into the hardware and software tools required for the process.
Related
Agilent 2000a / 3000a Oscilloscope NAND Recovery
Anthony Kouttron salvaged a damaged Agilent oscilloscope, addressing physical and boot issues. He repaired an encoder, fixed cosmetic damages, and explored internal components, demonstrating technical prowess and troubleshooting skills.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
Daily Automated Testing for Milk-V Duo S RISC-V SBC (IKEA Tretakt, Apache NuttX)
The article discusses daily automated testing for Milk-V Duo S RISC-V SBC using IKEA TRETAKT and NuttX RTOS. Tests run via Home Assistant API, Google Assistant, and USB serial port. Future plans include software emulator testing.
Twonkie: A USB-PD sniffer/injector/sink based on Google's Twinkie open hardware
The GitHub URL details the Twonkie project, a USB-PD sniffer inspired by Google's Twinkie. It includes design, components, modifications, assembly instructions, replacement parts, and beginner tips. Inquiries for support are encouraged.
Ghosts in the (Macintosh) ROM (2012)
A group at NYC Resistor found hidden images in Apple Mac SE ROM from 1986. They decoded distorted data, revealing pictures and assembly code, extracting four images and hinting at audio data.
The fact that it's constantly trying to sell me a monthly subscription leaves a real bad taste in my mouth though. Hard to recommend.
(Would love it if someone did figure out how to get a shell on here and give me a bit more control).
So much for me expecting a usb loaded exploit or a hacked firmware
Related
Agilent 2000a / 3000a Oscilloscope NAND Recovery
Anthony Kouttron salvaged a damaged Agilent oscilloscope, addressing physical and boot issues. He repaired an encoder, fixed cosmetic damages, and explored internal components, demonstrating technical prowess and troubleshooting skills.
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
Daily Automated Testing for Milk-V Duo S RISC-V SBC (IKEA Tretakt, Apache NuttX)
The article discusses daily automated testing for Milk-V Duo S RISC-V SBC using IKEA TRETAKT and NuttX RTOS. Tests run via Home Assistant API, Google Assistant, and USB serial port. Future plans include software emulator testing.
Twonkie: A USB-PD sniffer/injector/sink based on Google's Twinkie open hardware
The GitHub URL details the Twonkie project, a USB-PD sniffer inspired by Google's Twinkie. It includes design, components, modifications, assembly instructions, replacement parts, and beginner tips. Inquiries for support are encouraged.
Ghosts in the (Macintosh) ROM (2012)
A group at NYC Resistor found hidden images in Apple Mac SE ROM from 1986. They decoded distorted data, revealing pictures and assembly code, extracting four images and hinting at audio data.