IoT Hacking - Polycom Conference Phone - First Steps

SdĂ­let
VloĹľit
  • ÄŤas pĹ™idán 11. 04. 2024
  • In this video we discuss the first steps I take when approaching an IoT device pentest and demonstrate on a Polycom conference phone.
    IoT Hackers Hangout Community Discord Invite:
    / discord
    🛠️ Stuff I Use 🛠️
    🪛 Tools:
    XGecu Universal Programmer: amzn.to/4dIhNWy
    Multimeter: amzn.to/4b9cUUG
    Power Supply: amzn.to/3QBNSpb
    Oscilloscope: amzn.to/3UzoAZM
    Logic Analyzer: amzn.to/4a9IfFu
    USB UART Adapter: amzn.to/4dSbmjB
    iFixit Toolkit: amzn.to/44tTjMB
    đź«  Soldering & Hot Air Rework Tools:
    Soldering Station: amzn.to/4dygJEv
    Microsoldering Pencil: amzn.to/4dxPHwY
    Microsoldering Tips: amzn.to/3QyKhrT
    Rework Station: amzn.to/3JOPV5x
    Air Extraction: amzn.to/3QB28yx
    🔬 Microscope Setup:
    Microscope: amzn.to/4abMMao
    Microscope 0.7X Lens: amzn.to/3wrV1S8
    Microscope LED Ring Light: amzn.to/4btqiTm
    Microscope Camera: amzn.to/3QXSXsb
    About Me:
    My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
    - Soli Deo Gloria
    đź’» Social:
    twitter: / nmatt0
    linkedin: / mattbrwn
    github: github.com/nmatt0/
    #hacking #iot #cybersecurity #privacy #wireshark
  • VÄ›da a technologie

Komentáře • 28

  • @ChakaHamilton
    @ChakaHamilton PĹ™ed 2 mÄ›sĂ­ci +4

    I love that you are Ethically Hacking and didn't out sensitive information about the company. Thoroughly enjoyed this video.

  • @TheChillieboo
    @TheChillieboo PĹ™ed 2 mÄ›sĂ­ci +6

    this is sick! i love your delivery, not just telling us the method but the logic behind it aswell, very cool

  • @foobar8894
    @foobar8894 PĹ™ed 2 mÄ›sĂ­ci +8

    An interesting find because it seems this unnamed company did make some effort to protect their ethernet ports against random devices. But they may just have handed you the keys.

  • @roguesecurity
    @roguesecurity PĹ™ed 2 mÄ›sĂ­ci +6

    Nice one. Waiting for the next part

  • @Plowing
    @Plowing PĹ™ed 2 mÄ›sĂ­ci +2

    was just checkin your channel the other day to see if you had uploaded. Glad to see you back man!

  • @jkruges
    @jkruges PĹ™ed 2 mÄ›sĂ­ci +2

    Yesss, always get excited for your videos

    • @jkruges
      @jkruges PĹ™ed 2 mÄ›sĂ­ci

      Keep up the good work!

  • @Log4Jake
    @Log4Jake PĹ™ed 2 mÄ›sĂ­ci

    Very very nice video, this is a great video to demonstrate to people who don't understand what IOT and hardaware hacking are!

  • @andrewmurray5255
    @andrewmurray5255 PĹ™ed 2 mÄ›sĂ­ci +1

    excellent content! Subed for the next installment + more hacking and pentesting. đź‘Śđź‘Ś

  • @0xbitbybit
    @0xbitbybit PĹ™ed 2 mÄ›sĂ­ci +2

    Yesss more videos!

  • @feff6754
    @feff6754 PĹ™ed 2 mÄ›sĂ­ci +2

    Great videos! 🎉

  • @Decimation001
    @Decimation001 PĹ™ed 2 mÄ›sĂ­ci +2

    If the firmware is Linux, you could try to experiment with the /etc/hosts file. For example, you could map the update domain to your own and have fun with that. Or just rewrite the entire webserver

    • @mattbrwn
      @mattbrwn  PĹ™ed 2 mÄ›sĂ­ci

      just found out its not Linux. will discuss in the 3rd video. its some really old RTOS. Very weird stuff.

  • @memejeff
    @memejeff PĹ™ed mÄ›sĂ­cem

    Great stuff.

  • @Hacsev
    @Hacsev PĹ™ed 2 mÄ›sĂ­ci +2

    Really glad you are doing this. Grandstream phone next maybe?

    • @mattbrwn
      @mattbrwn  PĹ™ed 2 mÄ›sĂ­ci

      If I could get my hands on one of those devices I would definitely be interested.

    • @programorprogrammed
      @programorprogrammed PĹ™ed 2 mÄ›sĂ­ci +1

      Send him one

  • @stan78530
    @stan78530 PĹ™ed 2 mÄ›sĂ­ci

    Finally back đź’Ş

  • @techkenX
    @techkenX PĹ™ed 2 mÄ›sĂ­ci +1

    YES more vidoes LFG

  • @programorprogrammed
    @programorprogrammed PĹ™ed 2 mÄ›sĂ­ci +1

    Good one bud

  • @TradieTrev
    @TradieTrev PĹ™ed 2 mÄ›sĂ­ci

    Stupid question Matt, could you setup your own 802.1x server with that address on the config but craft the packets to accept and authenticate all? Also does it have any serial pins where they uploaded the firmware from the factory.

    • @mattbrwn
      @mattbrwn  PĹ™ed 2 mÄ›sĂ­ci +1

      I was also wondering if I could setup a 802.1x server. Might look into that

  • @user-hk6pu8nt1s
    @user-hk6pu8nt1s PĹ™ed mÄ›sĂ­cem

    So what your saying is, info from a company could still be on these voip devices which is dier if an i.t. specialist forgot to factory reset can be useful to an attacker? These voip devices are always sent to third party recycling contractors who come in and pick up these busniess voip hardware.

  • @user-nf3jr3wl9v
    @user-nf3jr3wl9v PĹ™ed 2 mÄ›sĂ­ci

    Hi Matt, can you share how you got into embedded systems and security. I am really interested and not sure where to start. Should I learn a certain programming language and how can I get some devices?

    • @mattbrwn
      @mattbrwn  PĹ™ed 2 mÄ›sĂ­ci

      I think the key is to have a genuine interest in technology. like all of it. Networking, Operating Systems, Programming, Web Apps, etc.
      If you want to play around with devices find a local thrift store (e.g. goodwill) and buy some cheap used wifi routers and try to extract firmware, find debug ports, etc.

    • @user-nf3jr3wl9v
      @user-nf3jr3wl9v PĹ™ed 2 mÄ›sĂ­ci

      @@mattbrwn thank you so much!

  • @userrrr32
    @userrrr32 PĹ™ed 2 mÄ›sĂ­ci

    9:41 wtf was that noise?

  • @user-hk6pu8nt1s
    @user-hk6pu8nt1s PĹ™ed mÄ›sĂ­cem

    On a geekbar the board says 94.0 V with rf like resistors big blue and black one with a crystal oscillator? Why would a vaoe have that? Geekbar, Lost Mary, and Spacebar. USB microcontroller, i dunno if its for fast charging...i highly doubt it.