How to Get Root Access to Your Sleep Number Bed
This guide explains how to gain root access to a Sleep Number bed hub, bypassing the company's servers. It involves connecting a UART device, modifying boot variables, adding files, and setting up a local network control server using Python. Risks include voiding warranties.
Read original articleThis guide provides detailed steps on gaining root access to a Sleep Number bed hub, voiding the warranty in the process. The motivation behind this exploration was to bypass Sleep Number's servers and access the local network. By connecting a UART device to the board, modifying boot environment variables, and adding specific files, users can achieve root access. The process involves editing boot environment variables, inserting a flash drive with a specific file, and configuring SSH access. Additionally, instructions are provided for creating a local network control and monitoring server using Python on the hub. The guide includes hardware requirements, UART connections, and commands to execute for setting up the server. Users are cautioned about the risks involved, including voiding warranties and potential system damage.
Related
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
XZ backdoor: Hook analysis
Kaspersky experts analyzed the XZ backdoor in OpenSSH 9.7p1, revealing hidden connections, SSH authentication bypass, and remote code execution capabilities. The backdoor manipulates RSA keys, uses steganography, and executes commands.
Android Secret Security Codes You Need to Know
Android users can access hidden settings using secret security codes for tasks like wiping the device, running diagnostics, checking hardware info, and more. Caution is advised to prevent performance issues.
Netboot (PXE) Armbian on an Orange Pi Zero 3 from SPI with NFS Root Filesystem
Guide on netbooting Orange Pi Zero 3 with Armbian for Kubernetes experimentation on SBC cluster. Setup involves SPI, u-boot, TFTP, NFS servers, static IP, PoE switch, u-boot updates, TFTP config, and console access.
Hacking Amazon's Eero 6 (part 1)
The blog post discusses hacking Amazon's eero 6 Wi-Fi device by disassembling it, identifying pins, and using tools like OpenOCD and Adafruit FT232H for communication. Detailed steps and insights are provided.
No internet required. No Linux powered microcontroller required. My bed couldn't get hacked. I slept in comfort.
Kinda interested just to see what the parameters of this are like. Is it using PubkeyAuth or just password? Is it tunnelling home via ip or dns?
If everything is just right, I can imagine the setup for the most hilarious DNS hijack in human history.
In the immortal words of Homer Simpson. Bed goes up. Bed goes down.
Of all the possible timelines, we live in the dumbest. What was wrong with a plain old bed without 1GB of RAM and a full OS running on it?! It is the same everywhere. Finding a washing machine that was not WiFi-connected was a chore and I dread doing it again in ten years.
As a person who's broken into O(1000) "smart" devices (for fun and for profit both), I do not want them in my house, and avoiding them is getting harder due to insanity like this linux-running bed! Please make it stop!
Then I got to a picture of an apparently real "Number Sleep Hub" and my mind was blown. WTF are we in a timeline so weird that there are two companies making water cooled beds, one is called Eight Sleep and the other is Sleep Number? It's like the RNG for this instance had a bad seed.
I slept on inflatable mattresses for years, until the company making them started outsourcing to China and the seams on the internal baffles broke on two mattresses.
People, stop spreading this BS.
Just like those stickers that say "warranty void if removed" are not legally enforceable, nothing "automatically" invalidates your product's warranty except misuse or poor maintenance.
If your Smart Bed stops working, you having poked around in the controller does not relieve the manufacturer from their warranty obligations (including implied warranty.) The onus is on them to prove that you damaged it, subjected it to "unreasonable" use, or did not properly maintain it.
You fry the bed's brain trying to hook up a JTAG when you accidentally bridge 5V to a 3.3V logic circuit? That's on you.
The controller fails because the power supply blows? The fact that you installed a JTAG header, googly eyes, and painted it pink is irrelevant. They need to fix your shit.
Even if you modify the firmware, it's on them to prove your modifications caused the failure.
Would you expect to have your laptop's warranty invalidated because you use it to game (which generates lot of heat)? Of course not. How about if you install Firefox? Or install Linux? Again, of course not. So why do you think the rules change just because a device is "dumber"?
* sleep number beds have sensors in them that detect heart rate
* they do this by detecting pressure differences in the air mattress
* these are effectively microphones, right? and quite sensitive
First, probe header pins and test points (rows of pads not meant for components) before probing around other components.
PSA: If you're designing a PCB for hand-testing, save money by eliminating connectors with tag connect plug of nails. They're also compatible with automated board testing.
This kind of luxury will always be reserved to the wealthiest in society, and its availability dependent on the relentless exploitation of land and human beings.
W. T. F. !?
Related
Hacking eInk Price Tags (2021)
Hackers repurpose eInk electronic shelf labels (ESLs) into photo frames or status displays by customizing firmware. Detailed exploration of hacking challenges, including Marvell chip analysis, bootloader functions, memory storage, communication protocols, and debugging methods.
XZ backdoor: Hook analysis
Kaspersky experts analyzed the XZ backdoor in OpenSSH 9.7p1, revealing hidden connections, SSH authentication bypass, and remote code execution capabilities. The backdoor manipulates RSA keys, uses steganography, and executes commands.
Android Secret Security Codes You Need to Know
Android users can access hidden settings using secret security codes for tasks like wiping the device, running diagnostics, checking hardware info, and more. Caution is advised to prevent performance issues.
Netboot (PXE) Armbian on an Orange Pi Zero 3 from SPI with NFS Root Filesystem
Guide on netbooting Orange Pi Zero 3 with Armbian for Kubernetes experimentation on SBC cluster. Setup involves SPI, u-boot, TFTP, NFS servers, static IP, PoE switch, u-boot updates, TFTP config, and console access.
Hacking Amazon's Eero 6 (part 1)
The blog post discusses hacking Amazon's eero 6 Wi-Fi device by disassembling it, identifying pins, and using tools like OpenOCD and Adafruit FT232H for communication. Detailed steps and insights are provided.