the I stands for a Y because the developer already developed the extra Y.
edit: god damn it made sense when I was thinking in french, but as soon as I posted it I realized it didn't make any sense in English, guess I'll go develop an IoT device now.
I have had the Newest.Technology system since they were initially released (over 2 years). I love the ease of use and they work well. Batteries last a long time too. I have added cameras as needed. I love the 2 way communication with this one.
Exactly what I was searching for, a well detailed CCTV firmware reversing tutorial. Hey Ninja, I really like your work and your way of explanation, Please Upload more videos, please make it a bit frequent like 1v/month.
So if you buy one of these used, you should flash the official firmware. Apart from that, not restricting firmware flashing is not a big deal, since flashing it requires physical access to the camera anyway, and having the ability to flash a custom firmware means one can make custom security updates after the camera is discontinued and no longer receives official updates.
" not restricting firmware flashing is not a big deal" if this was the only way to install firmware, that might be true, BUT, it can also be upgraded remotely, without touching the camera. i dont know if that has any extra security or not.
But I believe its also possible to disable the firmware upgrade feature completely or even fake it. Flashing Official firmware will not work in that case.
@statinskill yes but I prefer devices where I can install my own firmware than devices that are locked on the manufacturer firmware.
You need physical access to the device to install the firmware, well and the fact that you can install a custom firmware and sell it, it's true for everything, imagine a keyboard, what stops you from taking it apart and putting an hardware keylogger in it? Or even a device with all sorts of protections, in the end you can just modify the hardware.
But if you have the possibility to flash a custom firmware, is not a problem, because you just don't trust the firmware of the Chinese manufacturer (that surely contains vulnerabilities or backdoors) and just flash your own. Problem solved.
This is EXACTLY what I was looking for when I bought this camera. I hate that the default firmware doesn't allow video streaming via the Wise app without an internet connection [via LAN]. So finally I have a means to circumvent their servers while still attaining live video footage.
We don't need to see the baby-monitors when we're out of the house.
Can we quickly laugh at how stupid their way of stopping telnetd is? Instead of uninstalling it and or removing it from the rcS file, instead, they just kill it (And not even stop the service, just use killall.)
Based on where the killall is from, I'm guessing the telnetd was a backup access point for testing. If the camera starts up, but can't load the camera app for some reason, it won't kill the telnet daemon, and they can log in to figure out what broke.
@Arnaud MEURET No, but taking advantage of it in this instance would still require either an already compromised or non-functioning device. There have been worse backdoor incidents.
Ideally, they'd have removed it or disabled it, but after they had an already working image, they may not have wanted to mess around too much with it, especially since, as I said above, taking advantage of that isn't generally achievable remotely.
That was so easy to watch and learn, no extra and unnecessary steps, no stupids and distractive ads. simple and awesome iot exploit. Keep up the good work
Really fantastic video, well done. Your explanations and visuals are easy to follow, and we can all tell that you have a good understanding of what you're doing.
Through all the video I was like '' ok that's very theoretical, how would you install the firmware in real life's and the you gave the example at the last second and my blood turned cold 😱
Still very limited and marginal. No one can do it in large scale because Amazon would get rid of you after sending back 1000 cameras. But yeah, creepy!
@László Tenki It would be perfect for a semi-targettted attack on someone by simply selling them a camera on ebay. You could just set up an ebay account that sell compromised cameras and no one would figure it out unless you sell one to an IT guy.
Having a secure firmware upgrade process is important, but it comes with a downside that few manfacturers are kind enough to mitigate. Sure, unauthorized users rely upon insecure firmware update processes to install backdoors, but they're also what authorized users often rely on, to install mods. But this is a tiny minority of customers, weighed against the far greater number of customers who would benefit from the extra security. And unfortunately, it's a tiny enough minority that most companies won't consider it worth the extra R&D for providing a secure alternative authentication method for use by the owner, even when they wouldn't otherwise have any reason to go out of their way to lock the owner out.
Great job on this! I actually have one of these hacked cameras to use a security cam (but keep it off of the wyze network). Crazy how simple it is to hack the firmware and can't wait to see more. Might be time for me to start hacking some of my IoT devices. Makes me a bit nervous of how vulnerable my network might be though!
I loved this video! i plan on picking up a camera to play around with myself! Im glad I'm not the only one who thought "what if it has been backdoored and returned to the wild" you're a legend man!
This is awesome, I can perfectly use tooling such as jefferson right now for firmware modification. To split up flash image partitions, I am simply using dd though and cat things together again.
Edit: Since it looks like jefferson is for extraction only, I'll stick with mounting the rootfs through the mtd + jffs2 kernel modules, which is a bit of work and annoyance, but solved. =) I will still keep jefferson in mind for extraction-only/analysis use-cases though, makes sense also to have something portable. Thank you!
Awesome video! Exactly the type of hands-on example I love to see/learn from.
6 likes
C. Darwin2021-02-04 19:40:47 (edited 2021-02-04 19:43:30 )
Amazing video. I love the "hack" where you get it into ram where there was more space. I was just wondering though: The need to store the extra binary was to get the reverse shell, but if bash was there, could you then use that instead? I do really like you went the NC way, because I learned a lot about what to do if the situation arose. Amazing!
I really liked the style of this video, because it was "just right" for the knowledge I have. You explained it very well and with not too much or too less informations. thx!
Yeah-the level of knowledge we have is much lower then we think we have!.Try explaining this to someone or to replicate it..You will need to watch this video 100 times over :)
1 like
Alex Scarbro2021-05-18 10:36:52 (edited 2021-05-18 10:37:10 )
This could all be avoided if the customer had all cameras on their own network (vLAN) with no internet access and no access to the main network. But this was a very informative detailed video.
Secure firmware upgrades are a massive problem with stripping owners abilities to use their device how they want to. If I own the device I should be able to install whatever firmware I want.
If the device is returned and then later given out to a new customer, they should be flashing known good firmware onto it and confirming that it is present.
I was able to get into a Faleemi outdoor camera with this exact same method (except they have an option to only update the rootfs so I only needed to repack the squash file with no UBoot header). Works like a charm, and with telnet/wget I can update my camera remotely with my custom firmware. Thank you so much for my first IoT hack! I was also able to get a UART terminal to it on the hardware side.
I had a friend whose mom purchased a cheap Walmart IoT camera.
This camera has two-way communication features and makes an alert when the owner rings in. One time it made the alert sound but no audio on the other end. They literally believed it was caused by ghosts as the camera ". . . doesn't connect to the internet, it goes through my mom's phone."
How it started: Aw yeah but if someone has physical access what's the big deal? Security is almost always at a loss once you have physical access. I'd rather be able to tinker with and mod my devices.
How it's going: Hooooooly heck, I am now terrified of everything that ever was or ever has been.
Found your channel watching the new Game and Watch hacks and enjoying the content library, this video was awesome to watch and might try to do this myself on my own Wyze cam.
Great video! Is there a way to repack the JFS2 directory like you did with the squashfs folders? I took a look at jefferson but the docs only mention the ability to extract.
You can re-pack the JFFS2 filesystem by using mkfs.jffs2. The problem I'm running into is that the repacked filesystem (no modification) is larger than the original so my offsets are wrong when I go to re-pack the bin file. I'm not terribly skilled in Python so I'm trying to figure out how to mod the wyze_extractor script to build the image properly using a modified JFFS2 filesystem. Hopefully I'll be able to post my fixes here, as I'm working on a mod for my own purposes.
Thank you for this video. Tell me, please, is it possible to edit files within a SBN (signed binary) file and then repack with this method? I can open the archive and see the files inside but I'm not sure how to repack it.
I've said it before and I'll say it again: The Internet of Things is a terrible idea.
If a device can connect to the internet and it isn't a full-blown computer (or something that can act like one without voiding the warranty, like a smartphone), don't use it. Don't let it anywhere near you. There's no telling what it'll do. A camera could spy on you. A fridge could be bricked. Heck, electronics can outright explode under the right circumstances and with a malicious enough attack.
Another thing to do is to engineer a completely new board for that camera. One that runs the original firmware, except on the SOC there is another hidden core that taps into the wifi and the camera sensor. Perhaps even add one of those very interesting radios I read about the other day, and exfiltrate images from up to 7Km away. Now not everybody can afford a santa's work shop where all kinds of nifty things are made, such as certain upgrades for routers and the like, but it is still food for thought. The added benefit is you could leave the manufacturer provided backdoors dormant, perhaps add a feature to disable them remotely.
I once bought a shady cam on Amazon just for the fun of it and did a port scan, found out they simply had the Telnet port open with no root password set so yeah... I'd love to flash a custom firmware on the camera since the hardware itself is nice but it doesn't provide RTSP (open Telnet port wouldn't be much of an issue just in my local LAN and behind a separate VLAN) but it seems like that my camera has almost no Google entries at all :(
Most of the cheap imported Chineseum landfill we lovingly call H.264 DVR equipment, contains (from factory) insecure firmware and/or malicious code concealed within the supporting viewer software. Combined with non secure http servers, these inferior CCTV DV recorder camera systems (intended for domestic use) make for interesting covert viewing and yet another digital playground to abuse for any bored hacker. 🤣
It's been a few years, but I believe I used to use squashfs as the system image on the good ol' T-Mobile G1 (HTC Dream), the first Android device. But I thought it wasn't read-only once mounted as I used to manipulate the system partition all the time... I may be mistaken tho, that was 2009
Where does the reverse shell point to initially? If you were to run PWD for example. Is it just the home dir of the user? (In the case of the video the user would be root)
Hi, could you make a video about reading a bluetooth headphones firmware? I wonder how and if it's even possible. My ubuntu can't see it while they're connected via usb cable and I'm not that smart (yet) to get a custom connection via bluetooth.
Could you extract the firmware for Vstarcam cameras? They're not available online and the updater inside the camera only downloads a diff of what needs to be updated. I tried extracting from the flash using a raspberry pi but it didn't work. These cameras are one of the most sold on aliexpress and I can't find a way to telnet to them. Their RTSP server keeps crashing and I wanted to write a custom script to restart this server. Would be nice if you managed to crack these cameras. Thanks!
Firewall! Disallow internet access for any new device on your network (until you trust it), problem solved!! I remember when I purchased some HikVision cameras and they were so chatty to somewhere in China. I was nervous so I created a firewall rule that basically have them no access to l internet.
Would you please help a noob (little knowledge in navigation with Linux) how to check if any suspicious activity is going on on the devices (CCTV) - for instance how to check if any of the cameras or devices connected in my network having connections established outside of my network? How do I distinguish if the connection is due to cloud functionality (aka mobile access) or due to a malicious SW running in background. Thanks to every comment on this.
and again we learned... if you actually want privacy, don't get stuff that connects to the internet. at the end you're trusting some company and their devices. don't start crying when someone leaks footage from one of the twenty cameras that you have pointing at yourself. it's a real risk and we all take it.
but hey, everyone NEEDS heating that is controlled by the smartphone and stuff like that, right?
NetCat compiled for MIPS should be under 100Kb, no need for a 1.5Mb busybox binary. Good alternative for busybox is toybox (still about 800Kb compiled for MIPS) also has nc.
a good video after another and another and another ... good job! Open a patreon if you need a little motivation to upload more frequently. I would sign up just like I'm on the LiveOverflow patreon...
Can I ask how did you learn so much about Linux and other commands that you have used and python ? Please mention any resources that you used while learning.
Honestly - I've been using UNIX/Linux just for a long time as my daily driver. Nowadays there is a ton of great introductory material on the net, same for Python. A lot of the embedded knowledge also comes from having written own embedded firmwares etc - I think knowing how to build something drastically helps with taking it apart :)
I have an 'IMOU Ranger - 2 ' IP camera , it got bricked while upgrading it's firmware to the latest version which was followed by a powercut while upgrading. I searched online for its official firmware file but couldn't found one. Any help would be appreciated....
The latest firmware package for the V2 seems to be packed exactly the same way, so I would expect that it still works. I don't have a V3 to test with (yet).
God, I got a problem in the first step. I ran "binwalk -t ****.bin", and then there were a lot of zlib compressed data. I just don't know how to address it. Anyone could help? Really appreciate.
"shameless plug", not sure why but I laughed my ass off at that haha
1 like
western vibes2020-05-13 16:36:02 (edited 2020-05-13 16:36:46 )
I am dumb i couldn't understand the packing part a bit. Do you have any course online? Or any resources that would help. I come from web and Network exploitation background am getting into firmware reversing and stuffs i couldn't understand a bit while packing the firmware. :(
can you help please-getting this error when i tried to extract using binwalk -e "WARNING: Extractor.execute failed to run external extractor 'jefferson -d 'jffs2-root' '%e'': [Errno 2] No such file or directory: 'jefferson': 'jefferson', 'jefferson -d 'jffs2-root' '%e'' might not be installed correctly"
man, you are a genius. i can only wish to know a half of a half of what you know. can you do some alexa hacking? my brother in law have one and i would love to do some pranks to him
One day i will be expert like you are... Can you help me what should i learn how much should i learn and focus on what things. Plz make motivation video and failure video of you. So i can say my self after falure wait a min failure is success key.. So please make video on that
I have an old DVR that I am not using, and the firmware was just a tarball. When the device boots, its starts telnetd, and then it never stops it unlike your camera that your showing. And? Can you guess the Root password to the DVR? Its win1dows
Was anyone able to get Jefferson up and running? I went to the github page and followed the steps but was unable to get the python lzma installed. Im on a fresh install of kali.
I am trying to learn aboutfirmware and stuff like that and am trying to do this with the foscam firmware 11_37_2_65 when I use binwalk on it it shows a zip archive and a romfs filesystem but I cannot find out how to modify the rom fs filesystem can anyone help and tell me how I can modify it?
binwalk output 20 0x14 Zip archive data, at least v2.0 to extract, compressed size: 740120, uncompressed size: 1547720, name: linux.bin
740270 0xB4BAE End of Zip archive, footer length: 22
740292 0xB4BC4 romfs filesystem, version 1 size: 1003200 bytes, named "rom 52601301"
file output after using the extractor tool romfs: romfs filesystem, version 1 1003200 bytes, named rom 52601301.
Wyze is the shadiest shit on Amazon I mean how can you buy that and be totally complicent with knowing that the Chinese have the ability to spy on you.
Whoever disliked this is either an idiot or they accidentally clicked the wrong button. Great video man and it would be good to see more videos like this that give us novices guidance in exploiting devices. It’s also good that you’ve shown it with a device we have access too, so yeh much appreciated 👍
but i think there is a lot more going on in the show... i mean, in reality it is pretty much what is shown in the video, but who would watch a show about it? except for strange nerds, that watch videos like this one ;)
nothing really if you're not malicious. It just concrete proof of how (relatively) easy it is to backdoor them. If you're malicious, you could then sell the backdoored cameras. Not sure what you'd do with the backdoor, but I'm sure people with malicious intents can figure out something to do with it.
Remember kids. The S in IoT stands for security.
1725 likesReplies (13)
eri bUt ThErE iS nO s In IoT
74 likeseri and the R for reliability, M for maintenance, U for upgradeability.
66 likesOk deploy my IOTs please! :-)
4 likes@Andreas Delleske sounds like you'd prefer some RUM
21 likesWell when you flash your own firmware to add security vulnerables...
12 likesthe I stands for a Y because the developer already developed the extra Y.
8 likesedit:
god damn it made sense when I was thinking in french, but as soon as I posted it I realized it didn't make any sense in English, guess I'll go develop an IoT device now.
And the I in IoT stands for Moron.
1 like@Sizlo Mc Donnerbogen When the OEM does not implement the slightest of the security measures (checksumming, signing...) to prevent you to...
2 likesSold.
1 likewell technically, IoT stands for Internet of Things, so there is kind of an S lol
1 likeThis is one of my favorite jokes of all time
0 likesWhat does the H stand for?
0 likes@Herv3 tell me
0 likesI have had the Newest.Technology system since they were initially released (over 2 years). I love the ease of use and they work well. Batteries last a long time too. I have added cameras as needed. I love the 2 way communication with this one.
12 likesExactly what I was searching for, a well detailed CCTV firmware reversing tutorial. Hey Ninja, I really like your work and your way of explanation, Please Upload more videos, please make it a bit frequent like 1v/month.
145 likesSo if you buy one of these used, you should flash the official firmware. Apart from that, not restricting firmware flashing is not a big deal, since flashing it requires physical access to the camera anyway, and having the ability to flash a custom firmware means one can make custom security updates after the camera is discontinued and no longer receives official updates.
121 likesReplies (8)
And hope that a return doesn't get repacked as new
22 likes" not restricting firmware flashing is not a big deal"
12 likesif this was the only way to install firmware, that might be true,
BUT, it can also be upgraded remotely, without touching the camera. i dont know if that has any extra security or not.
It's a big deal because I can tamper with that camera and then sell it on ebay. Then as luck will have it that camera winds up somewhere important.
15 likes@statinskill but then the app won't work anymore.
0 likes@statinskill also because now it is in the local network, any other not so secure home device can be hacked
3 likes@ThiloTech Did he modify anything that would make the app no longer work ?
3 likesBut I believe its also possible to disable the firmware upgrade feature completely or even fake it. Flashing Official firmware will not work in that case.
3 likes@statinskill yes but I prefer devices where I can install my own firmware than devices that are locked on the manufacturer firmware.
12 likesYou need physical access to the device to install the firmware, well and the fact that you can install a custom firmware and sell it, it's true for everything, imagine a keyboard, what stops you from taking it apart and putting an hardware keylogger in it? Or even a device with all sorts of protections, in the end you can just modify the hardware.
But if you have the possibility to flash a custom firmware, is not a problem, because you just don't trust the firmware of the Chinese manufacturer (that surely contains vulnerabilities or backdoors) and just flash your own. Problem solved.
This is EXACTLY what I was looking for when I bought this camera. I hate that the default firmware doesn't allow video streaming via the Wise app without an internet connection [via LAN]. So finally I have a means to circumvent their servers while still attaining live video footage.
60 likesWe don't need to see the baby-monitors when we're out of the house.
Take a look at the access log of your server :)
963 likesReplies (6)
"GET /Awesome_video_dude_Keep_up_the_great_work
832 likesHah, love it! Thanks man!
@stacksmashing awesome that the message got to you :) Really enjoyed the video. Hope you have some more planned ^^
187 likes/slow clap.
91 likeshaha thats awesome
22 likes@xOr Vega sent a GET request to his server saying "/Awesome_video_dude_Keep_up_the_great_work"
23 likesahahhhh
1 likeThe 19 dislikes are smart camera manufacturers
234 likesReplies (2)
@fivethreeone stop blaming everything on bots probably lol, maybe people tap on it by mistake. Happenes to me sometimes too.
2 likesThe 75 people only like cat videos
0 likesCan we quickly laugh at how stupid their way of stopping telnetd is? Instead of uninstalling it and or removing it from the rcS file, instead, they just kill it (And not even stop the service, just use killall.)
224 likesReplies (5)
Based on where the killall is from, I'm guessing the telnetd was a backup access point for testing. If the camera starts up, but can't load the camera app for some reason, it won't kill the telnet daemon, and they can log in to figure out what broke.
78 likes@AcornAnomaly Shouldn’t make it into prod FW though
9 likes@Arnaud MEURET No, but taking advantage of it in this instance would still require either an already compromised or non-functioning device. There have been worse backdoor incidents.
5 likesIdeally, they'd have removed it or disabled it, but after they had an already working image, they may not have wanted to mess around too much with it, especially since, as I said above, taking advantage of that isn't generally achievable remotely.
maybe is used for support from the company
1 likeme thinks they be lazy
1 likeThat was so easy to watch and learn, no extra and unnecessary steps, no stupids and distractive ads. simple and awesome iot exploit. Keep up the good work
4 likesReally fantastic video, well done. Your explanations and visuals are easy to follow, and we can all tell that you have a good understanding of what you're doing.
15 likesWow this was really interesting to see a demonstration by someone willing to explain the thinking process along the way. This is very inspiring!
2 likesThrough all the video I was like '' ok that's very theoretical, how would you install the firmware in real life's and the you gave the example at the last second and my blood turned cold 😱
230 likesReplies (4)
same for me haha
5 likesStill very limited and marginal. No one can do it in large scale because Amazon would get rid of you after sending back 1000 cameras. But yeah, creepy!
1 like@László Tenki It would be perfect for a semi-targettted attack on someone by simply selling them a camera on ebay. You could just set up an ebay account that sell compromised cameras and no one would figure it out unless you sell one to an IT guy.
2 likesBuy bulk, flash it all and sell as thrid party on Amazon .
0 likesHaving a secure firmware upgrade process is important, but it comes with a downside that few manfacturers are kind enough to mitigate. Sure, unauthorized users rely upon insecure firmware update processes to install backdoors, but they're also what authorized users often rely on, to install mods. But this is a tiny minority of customers, weighed against the far greater number of customers who would benefit from the extra security. And unfortunately, it's a tiny enough minority that most companies won't consider it worth the extra R&D for providing a secure alternative authentication method for use by the owner, even when they wouldn't otherwise have any reason to go out of their way to lock the owner out.
1 likeIt's good to see this channel is still alive, I love your content! Thank you for sharing your knowledge, hope to see more updates in the future
4 likesGreat job on this! I actually have one of these hacked cameras to use a security cam (but keep it off of the wyze network). Crazy how simple it is to hack the firmware and can't wait to see more. Might be time for me to start hacking some of my IoT devices. Makes me a bit nervous of how vulnerable my network might be though!
4 likesGreat note about zero padding the modified filesystem image before you bundle it to keep it the same size as the original!
1 likeI loved this video! i plan on picking up a camera to play around with myself! Im glad I'm not the only one who thought "what if it has been backdoored and returned to the wild" you're a legend man!
0 likesThis is awesome, I can perfectly use tooling such as jefferson right now for firmware modification. To split up flash image partitions, I am simply using dd though and cat things together again.
2 likesEdit: Since it looks like jefferson is for extraction only, I'll stick with mounting the rootfs through the mtd + jffs2 kernel modules, which is a bit of work and annoyance, but solved. =) I will still keep jefferson in mind for extraction-only/analysis use-cases though, makes sense also to have something portable. Thank you!
Awesome video! Exactly the type of hands-on example I love to see/learn from.
6 likesAmazing video. I love the "hack" where you get it into ram where there was more space. I was just wondering though: The need to store the extra binary was to get the reverse shell, but if bash was there, could you then use that instead? I do really like you went the NC way, because I learned a lot about what to do if the situation arose. Amazing!
0 likesNo doubt, you've already had countless people recommending the Wyze Cam V3. The low light image capability seems very good.
0 likesWhat it doesn't have is RTSP, and Wyze doesn't seem very anxious to provide that capability.
But it's a swell cam.
I really liked the style of this video, because it was "just right" for the knowledge I have. You explained it very well and with not too much or too less informations. thx!
5 likesReplies (1)
Yeah-the level of knowledge we have is much lower then we think we have!.Try explaining this to someone or to replicate it..You will need to watch this video 100 times over :)
1 likeWhat an fantastic video!
0 likesExcellent content and perfect pace.
Really good video with good explanations! Love it dude! Keep up the good work!
1 likeWould this work on the newer v3's? Awesome video and explanation. I'm looking to set one up as a weather webcam for weather underground.
1 likeGreat tutorial, lots of new utilities I have never heard of before
0 likesThis could all be avoided if the customer had all cameras on their own network (vLAN) with no internet access and no access to the main network. But this was a very informative detailed video.
0 likesI really hope this isn't so easy to do for other devices!
0 likesGenerally speaking I do believe systems should allow users to load arbitrary firmware. Just OTA updates should be signed or at least loaded via TLS
0 likesNice video, keep up the good work! But are you planning on uploading more regularly? And do you have any plans in doing more Ghidra related videos?
2 likesThat was a lot easier than it should've been lol..
101 likesSecure firmware upgrades are a massive problem with stripping owners abilities to use their device how they want to.
0 likesIf I own the device I should be able to install whatever firmware I want.
If the device is returned and then later given out to a new customer, they should be flashing known good firmware onto it and confirming that it is present.
A German Engineer. Nothing more to say :) Ah, wait. A German Reverse Engineer :)) Well done.
70 likesYou should make more such videos, you have the potential to grow your channel
3 likesThis was really interesting, do you have any plans on uploading more IOT videos?
5 likesThis is seriously impressive. How long did this take?
0 likesGhidra Ninja - It's been a while. I love your work and want to see more. Thanks of the video.
8 likesI was able to get into a Faleemi outdoor camera with this exact same method (except they have an option to only update the rootfs so I only needed to repack the squash file with no UBoot header). Works like a charm, and with telnet/wget I can update my camera remotely with my custom firmware. Thank you so much for my first IoT hack! I was also able to get a UART terminal to it on the hardware side.
0 likesThanks for the tip! Gonna try and modify an init script, pack the squashfs and update the camera. Should be similar to your model
0 likesI'm going to start checking the firmware on every device I buy from now on. On the plus side it will keep me from buying too many things :D.
1 likei just found your content yesterday, and I am HOOKED. Keep up the awesome work :)
0 likesI had a friend whose mom purchased a cheap Walmart IoT camera.
0 likesThis camera has two-way communication features and makes an alert when the owner rings in. One time it made the alert sound but no audio on the other end. They literally believed it was caused by ghosts as the camera ". . . doesn't connect to the internet, it goes through my mom's phone."
How it started: Aw yeah but if someone has physical access what's the big deal? Security is almost always at a loss once you have physical access. I'd rather be able to tinker with and mod my devices.
0 likesHow it's going: Hooooooly heck, I am now terrified of everything that ever was or ever has been.
Your videos are amazing, please never stop posting videos, I am now a student of yours.
0 likesFound your channel watching the new Game and Watch hacks and enjoying the content library, this video was awesome to watch and might try to do this myself on my own Wyze cam.
0 likesinteresting to see the miio client on there, same thing is running on my vacuum. Thanks for the very informative video
0 likesGreat video! Is there a way to repack the JFS2 directory like you did with the squashfs folders? I took a look at jefferson but the docs only mention the ability to extract.
0 likesReplies (1)
You can re-pack the JFFS2 filesystem by using mkfs.jffs2. The problem I'm running into is that the repacked filesystem (no modification) is larger than the original so my offsets are wrong when I go to re-pack the bin file. I'm not terribly skilled in Python so I'm trying to figure out how to mod the wyze_extractor script to build the image properly using a modified JFFS2 filesystem. Hopefully I'll be able to post my fixes here, as I'm working on a mod for my own purposes.
1 likeGood security practice to reinstall the firmware on used devices I suppose.
0 likesThank you for this video. Tell me, please, is it possible to edit files within a SBN (signed binary) file and then repack with this method? I can open the archive and see the files inside but I'm not sure how to repack it.
0 likesI've said it before and I'll say it again: The Internet of Things is a terrible idea.
0 likesIf a device can connect to the internet and it isn't a full-blown computer (or something that can act like one without voiding the warranty, like a smartphone), don't use it. Don't let it anywhere near you. There's no telling what it'll do. A camera could spy on you. A fridge could be bricked. Heck, electronics can outright explode under the right circumstances and with a malicious enough attack.
Another thing to do is to engineer a completely new board for that camera. One that runs the original firmware, except on the SOC there is another hidden core that taps into the wifi and the camera sensor. Perhaps even add one of those very interesting radios I read about the other day, and exfiltrate images from up to 7Km away.
0 likesNow not everybody can afford a santa's work shop where all kinds of nifty things are made, such as certain upgrades for routers and the like, but it is still food for thought. The added benefit is you could leave the manufacturer provided backdoors dormant, perhaps add a feature to disable them remotely.
I once bought a shady cam on Amazon just for the fun of it and did a port scan, found out they simply had the Telnet port open with no root password set so yeah...
8 likesI'd love to flash a custom firmware on the camera since the hardware itself is nice but it doesn't provide RTSP (open Telnet port wouldn't be much of an issue just in my local LAN and behind a separate VLAN) but it seems like that my camera has almost no Google entries at all :(
Replies (2)
Since around three years I've been seeing you all over YouTube videos I watch. You have some fine taste haha.
4 likesThere is an official Wyze firmware that supports RTSP
0 likesSuch a great video! Very informational
1 likeMost devices have some sort of checksum of the firmware binary, how do you usually bypass that?
0 likesIt would be cool to have everything done by one python script.
1 likeReplies (1)
If I get one of these cameras I'm probably gonna do that. That way I can easily make new firmware for it without having to do all those steps.
0 likesthis is why I stick to IoT stuff with minimal risk of harm, like light bulbs
0 likesGood job on the video, hope u continue to make videos like this
2 likesit would be great if u do a backdoor on a router firmeware :D
0 likesMost of the cheap imported Chineseum landfill we lovingly call H.264 DVR equipment, contains (from factory) insecure firmware and/or malicious code concealed within the supporting viewer software. Combined with non secure http servers, these inferior CCTV DV recorder camera systems (intended for domestic use) make for interesting covert viewing and yet another digital playground to abuse for any bored hacker. 🤣
0 likesCan you do one similar reverse engineering on a Huawei 4G dongle , that could be a nice tutorial
2 likesI'm taking some courses in IOT, I still can't understand everything here but I'm enjoying it a lot
0 likesIt's been a few years, but I believe I used to use squashfs as the system image on the good ol' T-Mobile G1 (HTC Dream), the first Android device. But I thought it wasn't read-only once mounted as I used to manipulate the system partition all the time... I may be mistaken tho, that was 2009
0 likesAwesome Video! Keep up the good work!
1 likeVery good Job. I liked reverse Shell using netcat , i'm using reverse ssh , bit this is more easy
0 likesWhere does the reverse shell point to initially? If you were to run PWD for example. Is it just the home dir of the user? (In the case of the video the user would be root)
0 likesHow did he calculate the size of each section at 3:07
1 likeGreat to see you back. Hope you'll post more videos.
9 likesHi, could you make a video about reading a bluetooth headphones firmware? I wonder how and if it's even possible. My ubuntu can't see it while they're connected via usb cable and I'm not that smart (yet) to get a custom connection via bluetooth.
0 likesCould you extract the firmware for Vstarcam cameras? They're not available online and the updater inside the camera only downloads a diff of what needs to be updated. I tried extracting from the flash using a raspberry pi but it didn't work. These cameras are one of the most sold on aliexpress and I can't find a way to telnet to them. Their RTSP server keeps crashing and I wanted to write a custom script to restart this server. Would be nice if you managed to crack these cameras. Thanks!
2 likesFirewall! Disallow internet access for any new device on your network (until you trust it), problem solved!!
0 likesI remember when I purchased some HikVision cameras and they were so chatty to somewhere in China. I was nervous so I created a firewall rule that basically have them no access to l internet.
What's the method for downloading the firmware already install on the device to see if it has been compromised?
0 likesWould you please help a noob (little knowledge in navigation with Linux) how to check if any suspicious activity is going on on the devices (CCTV) - for instance how to check if any of the cameras or devices connected in my network having connections established outside of my network?
1 likeHow do I distinguish if the connection is due to cloud functionality (aka mobile access) or due to a malicious SW running in background. Thanks to every comment on this.
very cool i have always been thinking about repacking modified firmwares
0 likesAwesome. I actually have one of these sitting around.
18 likesand again we learned... if you actually want privacy, don't get stuff that connects to the internet. at the end you're trusting some company and their devices.
0 likesdon't start crying when someone leaks footage from one of the twenty cameras that you have pointing at yourself. it's a real risk and we all take it.
but hey, everyone NEEDS heating that is controlled by the smartphone and stuff like that, right?
NetCat compiled for MIPS should be under 100Kb, no need for a 1.5Mb busybox binary. Good alternative for busybox is toybox (still about 800Kb compiled for MIPS) also has nc.
0 likesReplies (1)
I’m sure this is just a poc
0 likesAmazing video :) Please make more
1 likeI would back up your channel on another platform like Bitchute or library. YouTube has been deleting channels like yours.
226 likesRemember that the I in IoT stands for insecurity.
0 likesa good video after another and another and another ... good job! Open a patreon if you need a little motivation to upload more frequently. I would sign up just like I'm on the LiveOverflow patreon...
0 likesCan I ask how did you learn so much about Linux and other commands that you have used and python ? Please mention any resources that you used while learning.
1 likeReplies (2)
Honestly - I've been using UNIX/Linux just for a long time as my daily driver. Nowadays there is a ton of great introductory material on the net, same for Python. A lot of the embedded knowledge also comes from having written own embedded firmwares etc - I think knowing how to build something drastically helps with taking it apart :)
4 likes@stacksmashing thanks for the response !
0 likesI have an 'IMOU Ranger - 2 ' IP camera , it got bricked while upgrading it's firmware to the latest version which was followed by a powercut while upgrading. I searched online for its official firmware file but couldn't found one. Any help would be appreciated....
0 likesGreat content bro 👍😀
1 likeWait a minute, you mean that those cheap IP cams don’t actually call home naturally ?! 😁
0 likesAmazing to see you back.Loved the video
1 likeWhy we cannot just use Binwalk to extract the content of the firmware ?
0 likesAwesome video!
1 likeWhat plain text http server did you use to get the cam to wget from? As i can't get passed that
0 likesThanks I believe my nosey neighbors watch me through my LED lights also .
1 likeWould building a new busybox with netcat included also be an option?
0 likesReplies (1)
It depends on how much the size of the firmware increases when the new busybox is compiled
0 likesif it had bash installed, you can do tcp / ip in pure bash
0 likesotherwise i'd have compiled a small C executable to do it for me.
Replies (1)
usually socat is included as a busybox binary as well, works as well
0 likesAwesome video 😍
0 likesSo don't buy low-end security equipment if you intend of having it connected to the internet?
0 likesGreat job :)
0 likesI love your videos!
0 likesany chance this still works with current V2 that are fully updated or new V3?
0 likesReplies (1)
The latest firmware package for the V2 seems to be packed exactly the same way, so I would expect that it still works. I don't have a V3 to test with (yet).
0 likesAnyone click on this and wonder why He needs so many cameras for his back door
1 likeI used the xiaomi fang hack firmware but it’s even less secure
0 likesthis just looks like magic to me
0 likesMight have to get a few of those cams now :D
2 likesHuh, I might try Binwalk to see if it can analyze the contents of my PS2 “disc backup”.
0 likeshow do you know all of that !! that's impressive
0 likesThis video is AMAZING. Thx
0 likesalso this telnetd might be accessible for a split second during boot, don't you think?
0 likesThis is so cool!
0 likesThank you that knowledge!
0 likesMan I feel like I'll never be smart enough for this, but I really want a career in cybersec
0 likesReplies (1)
never too late to start!
1 likeGod, I got a problem in the first step. I ran "binwalk -t ****.bin", and then there were a lot of zlib compressed data. I just don't know how to address it. Anyone could help? Really appreciate.
0 likes"shameless plug", not sure why but I laughed my ass off at that haha
1 likeI am dumb i couldn't understand the packing part a bit. Do you have any course online? Or any resources that would help. I come from web and Network exploitation background am getting into firmware reversing and stuffs i couldn't understand a bit while packing the firmware. :(
0 likesWhy will you backdoor it if you can brick it and let it unusable?
0 likescan you help please-getting this error when i tried to extract using binwalk -e "WARNING: Extractor.execute failed to run external extractor 'jefferson -d 'jffs2-root' '%e'': [Errno 2] No such file or directory: 'jefferson': 'jefferson', 'jefferson -d 'jffs2-root' '%e'' might not be installed correctly"
0 likesReplies (1)
It means that you don't have "Jefferson" installed: https://github.com/sviehb/jefferson
0 likesCan you give us link for IOT device,, ?
0 likes99.9% are clueless on where the reset button is located!
0 likes15:50 Thanks for the advice :)
0 likesReplies (1)
12:50 *
0 likesAmazing video...
1 likedude this channel teach a lot better youtube channel easy tips and learn everyday
0 likesNote to self: Reason to not buy and IP camera #478: IT CAN BE HACKED WITH MALICIOUS FIRMWARE!
0 likesDude, you are coding too fast( to furious?), like you are where writing a letter; you are embarrassing me.
Can you do it on a router too ?!
2 likesReplies (1)
Depends on which router.
0 likesBroke: "secure" firmware
0 likesBespoke: No firmware XD
#stateless #StateConsideredHarmful
I wish i was smart enough to do this
0 likesAmazing vid!
0 likesman, you are a genius. i can only wish to know a half of a half of what you know. can you do some alexa hacking? my brother in law have one and i would love to do some pranks to him
0 likesDude! Amazing!
0 likesThe oh s*** moment at the end... love it
1 likeI know a camera that's hacker proof. VHS analog cameras
0 likesWelcome Back! Finally a new video! 🙌
1 likeThat's the best YouTube sponsorship I've ever seen.... "this video is sponsored by ME" ;)
0 likescool video..👍👍👍
1 likeIs it save if nobody has hardware access?
0 likeswhy don't you use binwalk -e?
0 likesIve watched this twice and still don't have a clue whats happening haha
0 likesFrom the UK 🇬🇧. Great stuff
0 likesOne day i will be expert like you are...
0 likesCan you help me what should i learn how much should i learn and focus on what things.
Plz make motivation video and failure video of you.
So i can say my self after falure wait a min failure is success key..
So please make video on that
Can you do Wyze Cam v3 ?
0 likesTIL about binwalk. Mind blown.
1 likeThe end was real scary
0 likeson 3:13 why did you skipped the 0x80 lzma compressed section
0 likesI have an old DVR that I am not using, and the firmware was just a tarball. When the device boots, its starts telnetd, and then it never stops it unlike your camera that your showing. And? Can you guess the Root password to the DVR? Its win1dows
1 likeMay as well have been speaking Swahili to me... nice to see how stuff gets hacked though
0 likesInstead of using john the ripper why can't we just overwrite the shadow file and put hash of a known password , is that possible?
1 likeReplies (1)
You could absolutely do that!
1 likeWow...Just wow!
1 likeDoom on a wyze camera can't wait to see that
0 likesWas anyone able to get Jefferson up and running? I went to the github page and followed the steps but was unable to get the python lzma installed. Im on a fresh install of kali.
0 likesThis work on the new v3's?
1 likeI am trying to learn aboutfirmware and stuff like that and am trying to do this with the foscam firmware 11_37_2_65 when I use binwalk on it it shows a zip archive and a romfs filesystem but I cannot find out how to modify the rom fs filesystem can anyone help and tell me how I can modify it?
0 likesbinwalk output
20 0x14 Zip archive data, at least v2.0 to extract, compressed size: 740120, uncompressed size: 1547720, name: linux.bin
740270 0xB4BAE End of Zip archive, footer length: 22
740292 0xB4BC4 romfs filesystem, version 1 size: 1003200 bytes, named "rom 52601301"
file output after using the extractor tool
romfs: romfs filesystem, version 1 1003200 bytes, named rom 52601301.
Will the course be in German or English?
0 likesReally? It installs unsigned code? All on its own? Jesus.
0 likesthose few last words were completely unnecessary, but on the other hand, I hope that ppl who get successful, won't try it "on public"
0 likesso.....you need physical access to the camera....????
0 likesFinishes smashing camera on the backdoor of my house.
0 likes"I think I'm doing something wrong!"
Wyze is the shadiest shit on Amazon I mean how can you buy that and be totally complicent with knowing that the Chinese have the ability to spy on you.
0 likesWhoever disliked this is either an idiot or they accidentally clicked the wrong button. Great video man and it would be good to see more videos like this that give us novices guidance in exploiting devices. It’s also good that you’ve shown it with a device we have access too, so yeh much appreciated 👍
4 likesReplies (1)
Or they wanted to see disassembly and Ghidra.
0 likesOnce i backdoored my neighbour's security cam. He was backdooring his wife...
26 likesReplies (2)
Now you are "backdooring" us? (lying)
1 like@Coco Sloan boomer
0 likesAnd that's why you don't buy cheap Chinese security cameras
0 likesWhy do you have to repack the image, Don't you already have telnet access as root?
0 likesgod I wish I were this smart
0 likes👏👏👏
0 likeswhere do I learn rev eng??
0 likesAnd this is why you put cameras onto their own isolated LAN without internet.... :D
0 likesReplies (1)
How do you do that?what if the Camera uses an app?
0 likesTime to sell some backdoored Cameras. tnx >:)
0 likesmore like we hope to see YOU soon on this channel again. Whatever happened to wannacry part 2?
2 likesReplies (2)
Honestly: started it, found that without a debugger it really doesn’t make sense in parts, so hoping for the debugger release :)
1 like@stacksmashing does it uses something like mutable code or something like that? Is that why something like simple ollydbg or x64dbg won't work?
0 likesLike in Mr. Robot!
1 likeReplies (1)
but i think there is a lot more going on in the show... i mean, in reality it is pretty much what is shown in the video, but who would watch a show about it? except for strange nerds, that watch videos like this one ;)
0 likesi have one of these branded as Xiaomi? China just does whatever it wants hahaha
0 likesWhy do you have so many cameras, any plans on selling them online? :)
0 likesReplies (2)
As mentioned in the video I'm using them in my IoT security class - also they're so cheap everywhere else that it wouldn't make sense to do that :)
1 like@stacksmashing we sell them at my work and i want to urge people not to buy them so bad
0 likeshey i love you. this was a fun video to watch
1 likeCtfs be like 👍
0 likesgreat.
0 likesT.Hanks
1 likeWe need more videos xD
Subbed ;)
0 likesI can't attend to your class, can you sell me the recorded videos?
0 likesI don't understand.
0 likesWhat he win hacking the camera?
Replies (1)
nothing really if you're not malicious. It just concrete proof of how (relatively) easy it is to backdoor them.
1 likeIf you're malicious, you could then sell the backdoored cameras. Not sure what you'd do with the backdoor, but I'm sure people with malicious intents can figure out something to do with it.
внезапно ...
0 likesMirai be like: first time?
0 likesWant more videos
0 likesI feel like rami malek/elliot anderson now
0 likesholy shit.. he ruined buying stuff period.. jk.. so much to learn..
0 likesfinally !YAY
2 likesWHERE IS MY WANACRY PART 2?????????????
3 likesi feel like this guy doesn't smile
0 likesHow can I contact with you? @stacksmashing / Ghidra Ninja
0 likesWhy this script is running telnetd and then kills it, it has no sense
0 likesmy_mind == boom
1 likeWelcome back-
2 likesnice
1 likenice
0 likeswhy nc instead of socat where you have ssl capabilities now your rshell is plaintext
1 likebin mir absolut sicher, dass du aus dem deutschsprachigem raum bist. dieser akzent ist so einzigartig hahah :D
0 likesReplies (4)
Ich nix verstehen😇
0 likes@stacksmashing
0 likesi thought your mother language is german. you sound like a german person is speaking english haha
War ein Witz, ich bin Deutsch :)
1 like@stacksmashing (x
0 likesismart12 for the password? Hah.
0 likesI am 12 and what is smart?
Yay! :)
2 likesNinja Indeed
1 likeReplies (2)
@Ghidra Ninja what do I need to do or study to be like you?
0 likesMay be ninja, but not ghidra.
0 likesTo improve, just do work. Either engineering or reverse engineering. There's no guide to becoming a master, only a beginner.
By any chance you don't live in Stuttgart?
0 likesHeck ya new vid
1 likePleeeease, bem more quick... The content is good but I can't almost watch all
0 likesYour english sounds german. Where are you from?
0 likesDude where is wanacry part2?
1 likeWhy did I get this recommended?
0 likesYikes you use a mac yucky
1 likeReplies (1)
¯\_(ツ)_/¯
0 likes