IoT Hacking - Polycom Conference Phone - Firmware Extraction

Sdílet
Vložit
  • čas přidán 14. 04. 2024
  • In this video we discuss the device firmware extraction of a Polycom conference phone device.
    XGecu T56 universal programmer site:
    autoelectric.cn/EN/TL866_main....
    Wine wrapper for XGecu software:
    github.com/radiomanV/TL866
    IoT Hackers Hangout Community Discord Invite:
    / discord
    🛠️ Stuff I Use 🛠️
    🪛 Tools:
    XGecu Universal Programmer: amzn.to/4dIhNWy
    Multimeter: amzn.to/4b9cUUG
    Power Supply: amzn.to/3QBNSpb
    Oscilloscope: amzn.to/3UzoAZM
    Logic Analyzer: amzn.to/4a9IfFu
    USB UART Adapter: amzn.to/4dSbmjB
    iFixit Toolkit: amzn.to/44tTjMB
    🫠 Soldering & Hot Air Rework Tools:
    Soldering Station: amzn.to/4dygJEv
    Microsoldering Pencil: amzn.to/4dxPHwY
    Microsoldering Tips: amzn.to/3QyKhrT
    Rework Station: amzn.to/3JOPV5x
    Air Extraction: amzn.to/3QB28yx
    🔬 Microscope Setup:
    Microscope: amzn.to/4abMMao
    Microscope 0.7X Lens: amzn.to/3wrV1S8
    Microscope LED Ring Light: amzn.to/4btqiTm
    Microscope Camera: amzn.to/3QXSXsb
    About Me:
    My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
    - Soli Deo Gloria
    💻 Social:
    twitter: / nmatt0
    linkedin: / mattbrwn
    github: github.com/nmatt0/
    #hacking #iot #cybersecurity #reverseengineering #firmware
  • Věda a technologie

Komentáře • 120

  • @joedalecki7327
    @joedalecki7327 Před 2 měsíci +65

    I work for Poly, formerly Polycom and now part of HP, and I found this pretty interesting as well. Cool stuff.

    • @jibjibam
      @jibjibam Před 2 měsíci +4

      Sad to see giants of real videoconferencing turning into Microsoft's puppies.

    • @ClosestNearUtopia
      @ClosestNearUtopia Před měsícem +2

      I dont, but still I think it was interesting…

  • @whodaFru4551
    @whodaFru4551 Před 2 měsíci +28

    Great content! I like to see real and non-staged footage. Its authentic and just shows the raw and sometimes tedious process with all the mistakes and fuckups which are part of hacking and important for learning and improving.

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +11

      I hate video editing so it's a win-win!

  • @marlinderwall8873
    @marlinderwall8873 Před měsícem +12

    Thanks for making videos like this. My son is going to college soon to be an electrical engineer and these types of videos show interesting practical applications of what he's been studying in his electronics books.

  • @Nexxxeh
    @Nexxxeh Před měsícem +2

    I love the style of the videos. Showing working around problems giving a realistic look at practical work. Easy to follow, without being dumbed down. Love this.

  • @ItsAuver
    @ItsAuver Před 2 měsíci +7

    You know it's a great week when we get two Matt Brown uploads in one week 😍

  • @cristonlevato2255
    @cristonlevato2255 Před 2 měsíci +3

    Great content. I am researching on IoT hacking to get in the domain and your videos are both fun and informative for me (and probably for other people like me). Waiting for the next episodes on this device and your future projects. Keep up!

  • @guillaumelavoie1544
    @guillaumelavoie1544 Před měsícem

    Incredible, love to see how you explore problems and how flexible your solutions are! Thanks for showing your work!

  • @WangLees
    @WangLees Před 2 měsíci +2

    Keep up the great work Matt!
    We need more people sharing knowledge like you do :)

  • @jsaenzMusic
    @jsaenzMusic Před měsícem +2

    Man.....SO happy I found your channel! Amazing!!!

  • @heyyyitsjosh
    @heyyyitsjosh Před měsícem

    I love your channel. I didn’t make it through the computer engineering program at my university. But I still enjoy this kind of stuff a lot and your channel gives me inspiration to still keep learning. Thanks for making this

  • @spacewolfjr
    @spacewolfjr Před 2 měsíci +14

    The T56 is a great tool but I think growing a big greasy mustache is probably more useful in the long run.

    • @alexpascal5403
      @alexpascal5403 Před 2 měsíci

      I like grease. I also like Greece ironically. My favorite think tho is greasy Greeks. 🤔

  • @0xbitbybit
    @0xbitbybit Před 2 měsíci +3

    Great stuff, keep showing the process, been having a few issues finding file systems myself with some of the stuff I've been looking at so very eager to see how you get on and what you try next :)

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +3

      Won't be a filesystem on this one. It's a microcontroller so it's just a bunch of code/data

    • @0xbitbybit
      @0xbitbybit Před 2 měsíci

      @@mattbrwn Ah really? Interesting! So what does that mean, straight into Ghidra for some reversing? Does that mean the web server is running directly on the microcontroller? 🤔

  • @futureconsequence5374
    @futureconsequence5374 Před 2 měsíci

    Dang bro u a straight up genius! your comprehension levels are impressive!

  • @levvayner4509
    @levvayner4509 Před měsícem +1

    Very nice. Im building an open source framework for IoT and was just thinking if I should invest the time to configure encryption at rest by default. You convinced me :)

  • @SinyaAmathea
    @SinyaAmathea Před 2 měsíci

    Super interesting! Keep up the great work :D

  • @spacewolfjr
    @spacewolfjr Před 2 měsíci +10

    +1 to using string -- I once ran that against a piece of malware and identified the employee who created it.. they had left some debug flags enabled and it displayed the path to some of the files including the C:\Users\

  • @garridomonfrero
    @garridomonfrero Před 2 měsíci +2

    Nice video I would love to see in the next videos about exploiting the firmware, what are you looking for, how to attack the services without falling into looking for published CVEs, but rather to discover new bugs or what things we should investigate either technical or knowledge to exploit such things at the application level, once extracted the firmware.

    • @in70x
      @in70x Před měsícem +1

      You generally just use binwalk and try and mount FS on loop back Dev then you can explore the file system (usually it’s squash but binwalk can handle that). Then you can re-host or disassemble what you want but most people pillage the files for secrets that are generally out in the open…. - Credential - MIT Vuln Researcher Person

  • @M.W.777
    @M.W.777 Před měsícem +1

    Nifty!
    Thanks for sharing

  • @spacewolfjr
    @spacewolfjr Před 2 měsíci

    That's a dope furnace you have there!

  • @Benimen106
    @Benimen106 Před 2 měsíci +2

    Please do more IoT hacking videos, im starting a course of IoT embedded systems around august and would like to get a cheat start with the help of your videos, which are really good.

  • @feff6754
    @feff6754 Před 2 měsíci +1

    Great video!

  • @HollyTroll
    @HollyTroll Před 2 měsíci +1

    great video, thanks for your effort.
    question: why were the credentials, certificates, and logs part of the extracted firmware?

  • @frogz
    @frogz Před 2 měsíci +2

    never thought these could be useful other than the amplifier/speaker being reclaimedf for other projects

  • @ChakaHamilton
    @ChakaHamilton Před 2 měsíci +2

    The XML files are how you configure Voip Phone. See if you can find the provisioning manual and accompanying software to figure out what's in each file. I suspect the files are encrypted and you may need the software or key to decrypt them.

  • @pablopoo
    @pablopoo Před 2 měsíci +2

    nice lab!👌

  • @mohamadasriabdulazid4784
    @mohamadasriabdulazid4784 Před měsícem

    You should get one of those hot tweezers. With that you can use those solder braid as a brush, to brush away the solder from the chip without worring to deform the pin.

  • @muddkipp_1
    @muddkipp_1 Před 2 měsíci

    Awesmazing channel yo..❤❤

  • @pedroveloso9707
    @pedroveloso9707 Před 2 měsíci +4

    hi, Matt a little trick is to before remove nand , is make 1 pass using lead solder.... them hot air, this way less heat in pcb.
    tip 2 ..kkkk dont use qtip to clean ics.. it left all crap around (15.17) and it will avoid contact, use a a small brush like a old tooth brush

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +1

      Yeah I do that sometimes and definitely should have done that here to speed things up.

    • @Spudz76
      @Spudz76 Před měsícem

      Also there are high temp cleaning pads for things such as dab pipes made of a sort of fabric that are zero-fuzz, absorbent, and don't care how hot things are.

  • @tritnaha1345
    @tritnaha1345 Před 2 měsíci +1

    How's the firmware off these compared to those of Avaya? I did a little exploring on the Avaya J-series of phones and they employ some pretty creative ways of securing things.

  • @Macj707
    @Macj707 Před měsícem +1

    wow bad ass I just found your channel.. this great I am in!

  • @user-mp9um5qj3u
    @user-mp9um5qj3u Před 2 měsíci +1

    I always wanted to learn these hacking and low level things but currently learning web dev. Maybe one day i will learn these things which i always wanted to do. 🎉

  • @gordslater
    @gordslater Před 2 měsíci +1

    I subscribed after 25 seconds of this vid lol

  • @self_taught_stuff
    @self_taught_stuff Před měsícem +1

    to clean the chip before putting it into the reader, you can just dip the whole chip into alcohol... way faster and better than cleaning it with qtips.
    to clean the solder of the pins, you can put the solder wick on the table and put the pins on it, then run the soldering tip over them, i find it easier and safer that way (you wont bend the pins).

  • @justinhealey-htcohio3798
    @justinhealey-htcohio3798 Před 2 měsíci

    Awesome!
    Just out of curiosity, have you ever considered attempting to extract firmware on raspberry pi & the closed source MIPI CSI-2 Camera ISP?
    It would be great if that could all be exposed & made compatible with other image sensors

  • @slincolne
    @slincolne Před 2 měsíci

    Interesting. You could use openssl to decode the various certificates into a human friendly version for more details. Also - the 20 pin connector that you pointed out at the start of the video looks like a JTAG header. - one way to check would be to see if half of them (one row) should be joined to ground.

  • @king_james_official
    @king_james_official Před měsícem

    about the strings thing you were talking about. wouldn't it search for the nul byte too? like a few characters and then a nul byte

  • @lambertax
    @lambertax Před měsícem

    Hardware management : catastrophic (dirty iron, not enough heat, seems Chinese flux,...)
    Software management : perfect
    Remains very interesting! Thanks

  • @zataritamods7499
    @zataritamods7499 Před 2 měsíci

    In regards to the q-tip fuzz getting hooked on the pins. My girlfriend uses these special type of cotton swabs called "glob mops" for cleaning her...medicinal tools.
    They're like normal cotton swabs, but they're packed really densely, and one end is packed to a fine point. May be useful for something like that 🤔

  • @jaybrooks1098
    @jaybrooks1098 Před měsícem

    think that connector is just a accessory connector. the jtag or serial will be pads near the soc. usually in a group that looks like enough pins.

  • @in70x
    @in70x Před měsícem +1

    Damn didn’t even know about the t56 I do it the old fashioned way but I just bought one

  • @lukakostic9820
    @lukakostic9820 Před 2 měsíci

    Awesome.

  • @tritnaha1345
    @tritnaha1345 Před 2 měsíci +1

    What about using OFRAK or Cutter to look into what you've got ahold of?

  • @user-hh9db5nx8t
    @user-hh9db5nx8t Před 2 měsíci +1

    that stuff is so interesting :O how u found out this is possible?

  • @tihomirborovski5661
    @tihomirborovski5661 Před 2 měsíci

    Most likely the pin header is for connecting JTAG. It could be possible to dump the FLASH and even debug the device using that port and no need to do any hardware job. All you need is a tool like PEEDI, BDI2000 or BDI3000.

  • @hoteny
    @hoteny Před 2 měsíci +3

    5:07 i didnt even know heating a rom would be safe for the data inside… well im not an electrical engineer or anything so yeah i just like these and one day want to extract data from a chip inside my childhood toy (probably midi and soundfont)

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +5

      These components are heated to these temperatures when they are originally attached in the factory. Most component datasheets will document the proper temperature curves for heating and cooling the chip but I usually just go for it. :D

  • @phr3ui559
    @phr3ui559 Před 2 měsíci +1

    what equipment do you use

  • @user-lr3vb1hd3n
    @user-lr3vb1hd3n Před 2 měsíci

    comment in support!

  • @spacewolfjr
    @spacewolfjr Před 2 měsíci

    I like your microscope, is that one of those ones from Ali Express? I almost bought one a few years ago that Strange Parts recommended but decided to buy some extra meatballs for my spaghetti instead.

    • @mattbrwn
      @mattbrwn  Před 2 měsíci

      microscope is a AmScope SM-4NTP 7X-45X

  • @larryslobster7881
    @larryslobster7881 Před měsícem

    6:38 ultrasonic cleaner, life changer

  • @cocusar
    @cocusar Před 2 měsíci +1

    Pretty good! One question for you: does this nand flash contain any kind of FTL? because I'd assume they'll NOT write to it like in a linear fashion, they must arrange blocks in some way.

    • @mattbrwn
      @mattbrwn  Před 2 měsíci

      Not sure but I think all the flash readers read the data block by block so it reads in order.

    • @cocusar
      @cocusar Před 2 měsíci

      @@mattbrwn Yeah, I thought the actual blocks and how they're divided was the responsibility of the OS, I assume it might be possible for you to find contiguous blocks without any problem. However, with your findings about the cross site injection, that kinda voids the need to figure out how that works. Worst case scenario you can go back to what it was before!

  • @ngrader
    @ngrader Před 2 měsíci

    18:35 Apparently spansion was purchased by cypress semiconductor, big stock merger. according to wikipedia.

  • @alexpascal5403
    @alexpascal5403 Před 2 měsíci

    Nice video. You remind me of my little sister. 👩 ..but she couldn’t solder the way you do.❤❤

  • @johncsuti6118
    @johncsuti6118 Před měsícem

    You don't see a file system as the device uses TFTP provided by the network to run the firmware from the ram directly.
    Cisco VOIP phones do the same thing. They call the (MAC ADDRESS).xml then call there model number.bin to run the .xml is stored on the device while the .bin is downloaded every time. Upon boot up they check the .xml vs the TFTP for consistency.

  • @isheamongus811
    @isheamongus811 Před 2 měsíci +3

    No clean means that the flux is not conductive - if you don't clean, you won't short anything (but a bad connection is more likely)
    Right?

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +1

      Ahhh that makes more sense! Thanks!

  • @nv1t
    @nv1t Před 2 měsíci +2

    any reason why you don't dump while in circuit? you could use a 360 clip or similar. Less stress on desoldering.

    • @gabethomas4000
      @gabethomas4000 Před 2 dny

      Clips are finicky unless you're just doing an 8 pin

    • @nv1t
      @nv1t Před dnem

      ​@@gabethomas4000 depends...i think desoldering and resoldering is more finicky, than getting a clip on :) i have dump tsop48 nand flashes, with no problem in both ways. Desoldering, putting into a reader, resoldering, took longer and more potential problems.

  • @larsmojo
    @larsmojo Před 2 měsíci

    XGecu T56 + clamp adapter is part of my lap as well - but I find it more usefull to use an adapter where you simply solder it on.(via hotair) No need to clean the chip. No bad connections. However I only found a tsop48 adapter - anyone found one for tsop56?

  • @gergopap7207
    @gergopap7207 Před 2 měsíci +1

    Hi,
    what adapter do you put the chip in?

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +2

      Xgecu T56

    • @gergopap7207
      @gergopap7207 Před 2 měsíci +1

      ​@@mattbrwnThanks, but I was thinking of the green one, where you put the chip directly? Or is it a full set? Where can I order the complete set? :) Thank you.

    • @gergopap7207
      @gergopap7207 Před 2 měsíci

      Thank you! I found it! I see! :)

  • @twitch54304
    @twitch54304 Před 2 měsíci

    I see you also use amtek flux. I’m guessing that’s what that was by the blurry syringe with the blue label

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +1

      yep its amtech flux

  • @inq752
    @inq752 Před měsícem

    But for real, you should do some in-depth video of how to properly modify firmware

  • @frosty1433
    @frosty1433 Před měsícem

    Fyi you should probably blur raw certs too. They are just as secret as a password.

  • @lost4468yt
    @lost4468yt Před měsícem

    You can definitely get solder braid that doesn't leave a residue? Just don't buy the cheapest of the cheap.

  • @68f100ranger
    @68f100ranger Před 2 měsíci +1

    the file system is likely on the processor itself, Its called SoC. there are ways to read those usually.

    • @309electronics5
      @309electronics5 Před 23 dny

      It could also be that it downloads its own firmware on boot via tftp

  • @DJ-Manuel
    @DJ-Manuel Před měsícem

    Put some solder ontop of the solderbraid (between the iron and braid) to help the heat transfer. Thank me later…

  • @petereacmen716
    @petereacmen716 Před 2 měsíci +1

    IIRC those Polycom conference room phones run VxWorks

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +1

      yeah it definitely seems like an RTOS of some kind. will be discussing that more in video 3 ;)

    • @foobar8894
      @foobar8894 Před 2 měsíci

      @@mattbrwn I'll admit i'm only thinking of this just now and not during the previous video, but running nmap OS detection could have been useful. That might have given you a hint about what to expect.

    • @francistheodorecatte
      @francistheodorecatte Před 2 měsíci

      there are some Nortel models of these that run linux/unistim instead of vxworks/sip

    • @tritnaha1345
      @tritnaha1345 Před 2 měsíci

      ​@@francistheodorecattecorrect. Old unistim phones do. Newer ones are Android/Linux basically

  • @spacewolfjr
    @spacewolfjr Před 2 měsíci

    If those are PEM certs, I'm thinking it's the local (to the PolyCom) certificate store (like the trusted CAs).

    • @spacewolfjr
      @spacewolfjr Před 2 měsíci

      Annnd you just mentioned that, lol I should really watch to the end

  • @gabrielstangel919
    @gabrielstangel919 Před měsícem

    why 480p :(

  • @socialtraffichq5067
    @socialtraffichq5067 Před měsícem

    He's got the gloves on so no fingerprints

  • @twitch54304
    @twitch54304 Před 2 měsíci

    Can’t you tell by the “0000” if it’s an actual dot?

  • @user-mb5ng9nc2n
    @user-mb5ng9nc2n Před 2 měsíci

    plese lerning hacking licens router mikrotik

  • @nick9323
    @nick9323 Před 2 měsíci +2

    wtf u bluring, like someone will trace where the phone from and go hack them !?

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +3

      it was actually the nuclear launch codes.

  • @sharetripllc
    @sharetripllc Před měsícem

    .5 solder wick works better to remove tiny pins . Thank you I learn do you think China does what you just did

  • @TouYubeTom
    @TouYubeTom Před 2 měsíci

    picture quality is low, like smudged and blurry

    • @daniel777L
      @daniel777L Před 2 měsíci

      why dont you buy him a more expensive microscope? his optics are perfectly suitable to showing his method. be happy he filmed at all, pathetic ungrate

  • @miliniosarcol2452
    @miliniosarcol2452 Před 29 dny

    😢😢😢

  • @yukit119
    @yukit119 Před měsícem +1

    15:42 So much hair stuff in there why you dont clean it right?

    • @mattbrwn
      @mattbrwn  Před měsícem

      Because it works... This is engineering not art.

    • @yukit119
      @yukit119 Před měsícem

      @@mattbrwn oh okey, true if it works it works. But why need art to be clean?

    • @yukit119
      @yukit119 Před měsícem

      yes, but there is a possibility of a short circuit even if it works for you. Bad answer from you!

    • @king_james_official
      @king_james_official Před měsícem

      @@yukit119good luck shorting pins with cotton swab leavings ahhaha

    • @yukit119
      @yukit119 Před měsícem

      @@king_james_official in this case yes but its not only this HAHAHAHA kid

  • @IT10T
    @IT10T Před měsícem

    seems like social engineering is easier

  • @asnifuashifj91274
    @asnifuashifj91274 Před měsícem

    digital telephone devices existed wayy before the term IoT was invented. lets just call it what it is. great video though.

  • @jibjibam
    @jibjibam Před 2 měsíci

    Boş şeydi. Hamısı sökülməlidi.

  • @user-cg3tk7zi9r
    @user-cg3tk7zi9r Před 2 měsíci +2

    Thanks again for your content. They have truly helped me along being new to this (For me) hobby/passion. I do have a question on something I am working on. I dunno if you have a means in which i can contact you but if you do I would really appreciate any advice.

    • @mattbrwn
      @mattbrwn  Před 2 měsíci +1

      twitter DMs are best for that kind of stuff

    • @user-cg3tk7zi9r
      @user-cg3tk7zi9r Před 2 měsíci

      @@mattbrwn alright I'll download the app thank you

    • @rickeverett3304
      @rickeverett3304 Před 2 měsíci

      Av Pro that used these extensively…before cell phones with speaker functions. I just recycled three that were in an old tub. What purpose did you do this for, certainly not to salvage parts? Curious to how this helps anything since no one wants these anymore?

  • @IT-ud9tx
    @IT-ud9tx Před měsícem +1

    wow! when I saw that dot1x pem certificate my heart jumped. This is why all IT waste must be shredded, an "innocent" little phone just compromised someones network. Phone was probably factory reset by there IT staff too before it went into the trash.

  • @SuckMyGreasyPrick
    @SuckMyGreasyPrick Před měsícem

    ha, you blocked the username and password the first time, but I spotted them later on lol