IoT Hacking - Polycom Conference Phone - First Steps
VloĹľit
- čas přidán 11. 04. 2024
- In this video we discuss the first steps I take when approaching an IoT device pentest and demonstrate on a Polycom conference phone.
IoT Hackers Hangout Community Discord Invite:
/ discord
🛠️ Stuff I Use 🛠️
🪛 Tools:
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4dSbmjB
iFixit Toolkit: amzn.to/44tTjMB
đź« Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx
🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
đź’» Social:
twitter: / nmatt0
linkedin: / mattbrwn
github: github.com/nmatt0/
#hacking #iot #cybersecurity #privacy #wireshark - Věda a technologie
I love that you are Ethically Hacking and didn't out sensitive information about the company. Thoroughly enjoyed this video.
this is sick! i love your delivery, not just telling us the method but the logic behind it aswell, very cool
An interesting find because it seems this unnamed company did make some effort to protect their ethernet ports against random devices. But they may just have handed you the keys.
Nice one. Waiting for the next part
was just checkin your channel the other day to see if you had uploaded. Glad to see you back man!
Yesss, always get excited for your videos
Keep up the good work!
Very very nice video, this is a great video to demonstrate to people who don't understand what IOT and hardaware hacking are!
excellent content! Subed for the next installment + more hacking and pentesting. đź‘Śđź‘Ś
Yesss more videos!
Great videos! 🎉
If the firmware is Linux, you could try to experiment with the /etc/hosts file. For example, you could map the update domain to your own and have fun with that. Or just rewrite the entire webserver
just found out its not Linux. will discuss in the 3rd video. its some really old RTOS. Very weird stuff.
Great stuff.
Really glad you are doing this. Grandstream phone next maybe?
If I could get my hands on one of those devices I would definitely be interested.
Send him one
Finally back đź’Ş
YES more vidoes LFG
Good one bud
Stupid question Matt, could you setup your own 802.1x server with that address on the config but craft the packets to accept and authenticate all? Also does it have any serial pins where they uploaded the firmware from the factory.
I was also wondering if I could setup a 802.1x server. Might look into that
So what your saying is, info from a company could still be on these voip devices which is dier if an i.t. specialist forgot to factory reset can be useful to an attacker? These voip devices are always sent to third party recycling contractors who come in and pick up these busniess voip hardware.
Hi Matt, can you share how you got into embedded systems and security. I am really interested and not sure where to start. Should I learn a certain programming language and how can I get some devices?
I think the key is to have a genuine interest in technology. like all of it. Networking, Operating Systems, Programming, Web Apps, etc.
If you want to play around with devices find a local thrift store (e.g. goodwill) and buy some cheap used wifi routers and try to extract firmware, find debug ports, etc.
@@mattbrwn thank you so much!
9:41 wtf was that noise?
On a geekbar the board says 94.0 V with rf like resistors big blue and black one with a crystal oscillator? Why would a vaoe have that? Geekbar, Lost Mary, and Spacebar. USB microcontroller, i dunno if its for fast charging...i highly doubt it.