I received the Aura, a device advertised as a “Connected Alarm Clock”. This device in itself is quite cool and uses different sounds and color patterns to help the user fall asleep and wake him up during light stages of his sleep cycles.
Soon I was interested in doing some reverse engineering on it because:
- It was fun.
- I wanted to really own the device, I wanted to be able to run my own code on it.
This article describes my journey into the Aura, from firmware image grabbing to remote buffer overflow exploitation.