Running Custom Code on a Google Home Mini (Part 2)

Posted on Tue 28 July 2020 in Projects • Tagged with Reverse Engineering, Linux, Exploit, Fuzzing

Introduction

After the work detailed in part 1, altering the content of the NAND Flash of the Google Home Mini with ease is now possible.

Despite this very privileged access, because of Google's secure boot implementation, running arbitrary code on the CPU of the device isn't possible using simple and …


Continue reading

A "Remote" Vulnerability

Posted on Fri 01 June 2018 in Projects • Tagged with Reverse Engineering, Electronics, Exploit, SDR

Introduction

A couple of months ago, I spent a couple of time fiddling around my ISP-provided residential gateway. This gateway is actually not just a gateway. It's more like a mix between a set-top Box and a gateway. Additionally to access the Internet, the end-user can also use it to …


Continue reading

Reverse Engineering & Exploitation of a "Connected Alarm Clock"

Posted on Sun 10 September 2017 in Projects • Tagged with Reverse Engineering, Linux, Exploit

Introduction

I received the Aura, a device advertised as a "Connected Alarm Clock". This device in itself is quite cool and uses different sounds and color patterns to help the user fall asleep and wake him up during light stages of his sleep cycles.

The Aura

Soon I was interested …


Continue reading