#06 - Startup Scripts & The Quest For Root - Hardware Hacking Tutorial

  Рет қаралды 19,807

Make Me Hack

Make Me Hack

Күн бұрын

Пікірлер: 49
@craig4197
@craig4197 2 жыл бұрын
Just watched you for two hours straight. The moment where you got root through that lengthy hack was inspiring and impressive! Count me in as a subscriber! Not to mention, you've somehow tied into my previous experience with capturing handshakes and brute-forcing... Amazing!
@januszsowa805
@januszsowa805 16 күн бұрын
Your english is very clear and you explain everything very well. Watched all episodes already and working on another router - going back to the videos as they are full of knowledge
@riskydissonance
@riskydissonance 2 жыл бұрын
6 episodes in and still amazing content 👌!
@ReallyLee
@ReallyLee Жыл бұрын
Thank you very much. You have a broad range of experience and that experience shows in the clarity of your explanations. Your Italian and English is just fine to my ears. I have been using find and grep for many years, but without the confidence and clarity that you communicate. I am planning a disassembly project involving a laser printer and thanks for modeling how to go in there and thanks for telling a few things not to do.
@stephenhookings1985
@stephenhookings1985 2 жыл бұрын
No idea why the KZbin algorithm took so long to recommend your channel. Glad that it did.
@salix_qmeou
@salix_qmeou Жыл бұрын
You are Amazing, Valerio!!! Congrats on making this concise, didactic and useful material for us, I have 100% certain that a lot of people that don't comment on this series have the same feeling that I'm feeling right now. I'm Brazilian and I'm not confident about my English speaking as well but I can understand you perfectly, You're amazing!!!
@typedeaf
@typedeaf 2 жыл бұрын
Nice! Tip: 'H' is NOT a silent letter. 'elp', 'ow', 'ardware', etc. These can be hard to decipher sometimes.
@douglasheld
@douglasheld Жыл бұрын
21:38 This will work, but I will often use a more explicit way to cover filenames with spaces: find . -type f | while read FILE; do grep -l factory "$FILE" ; done The pseudo-logic is 1) produce a listing of files; 2) read each full line output and capture as a variable I named FILE; 3) start a do->done sequence for each $FILE variable captured. It is a little more verbose but this allows me to follow and to modify the command iteratively, without relying on xargs's ability to parse the inputs the way I expect it to.
@ThomasEnder_pt
@ThomasEnder_pt 3 жыл бұрын
Amazing Sir.. your English is vey good to understand and the whole process is clearly talked about. One suggestion I have is to talk a little more about the eeprom and partitions, what pages and blocks are, what the hex stands for and shows and what a filesystem is. Many people with knowledge have no idea how to read an eeprom or convert the binary to usable information. Other than that you are doing a PERFECT job
@TheElectronicDilettante
@TheElectronicDilettante 2 жыл бұрын
Thanks for all the great videos. Super informative. Your English is fine. You speak it better than most native speakers I know. Keep it up!!
@rahulmeena4527
@rahulmeena4527 Жыл бұрын
well I am not bored after watching 6 episodes of the series.
@joemajortech2657
@joemajortech2657 2 жыл бұрын
first of all, as long time in research to get more information about embedded devices , i found your channel and help me more really. i follow ur schannel to knows a many info, many thanks.👍👍
@finnbin1
@finnbin1 3 жыл бұрын
Amazing content... .MUCH better than 99.99999% of other youtube linux videos... really informative....
@hugolyppens2754
@hugolyppens2754 2 жыл бұрын
Fantastic video. I am going to watch this entire series and use the knowledge to unbrick my LG TV (also MIPS embedded same Linux version). I would like to contribute that you can pass -exec grep XXX '{}' ';' to the find command, so the grep is executed for each found file, instead of piping to xargs where you had have to worry about file names with spaces in them.👍
@BlauskaerM
@BlauskaerM 4 жыл бұрын
Fantastic video! I can add that I'm working on a embedded product at the moment that is using systemd as the init process. So its starting to showing up in the embedded world. Your series is amazing and after 7 years as an embedded developer I have learned a lot from you.Thank you very much.
@MakeMeHack
@MakeMeHack 4 жыл бұрын
Hello Erik Viktorsson, thank you for your appreciation and support, and thank you for the information about systemd. In the video, I said that "I have never seen, YET, systemd in an embedded device", good to know that it's starting to show up in some newer devices, it has a larger footprint and it is more complex, but it is more powerful and has more features like parallelized architecture and faster boot times, daemon tracking, hotplug capable, etc.
@gael5773
@gael5773 Жыл бұрын
your video are really amazing. If all the videos on the subject were as detailed and clear, it's really visible that you know your subject well. I can only hope that in the future you will do more video on hardware and software hacking since the last one was posted 2 years ago 👍👍👍 Le tue spiegazioni sono veramente molto chiare è interessante, continui così 👌 my farebbe molto piacere vedere più video del genere
@PriyankaGupta-yt5bp
@PriyankaGupta-yt5bp 2 ай бұрын
very very interesting video, easy to understand and follow, thank you so much for giving your time :)
@pitchpitch8172
@pitchpitch8172 4 жыл бұрын
Best neighbour ever... thanks for all your efforts making this serie of videos ... have you ever worked on car ECU's? think it is the the same as your Router, i mean embedded?
@ryanitchon
@ryanitchon 2 жыл бұрын
Your English is not bad at all. Thanks for this content.
@edgeeffect
@edgeeffect 4 жыл бұрын
That was interesting.... you just mentioned "hashcat" a few times, I installed it and was surprised to see it had a dependency on Clang... which sent me off on a "diversion" to en.wikipedia.org/wiki/OpenCL .... very interesting!! I always grep files from find without xargs: find -type f -exec grep -H factory {} \; This series in EXCELLENT! Molte Bene!
@strategyoracle
@strategyoracle 4 жыл бұрын
Really looking forward to the reverse engineering that we'll see next of these binaries!
@MakeMeHack
@MakeMeHack 4 жыл бұрын
Hello Peter Upfold, thank you for your interest! still a couple of episodes about building the emulation environment and then we will start with the reverse engineering. In the meantime, I published something about the reverse engineering of the Gemtek Router on GitHub at: github.com/digiampietro/hacking-gemtek.
@jkl872
@jkl872 4 жыл бұрын
This is really interesting and well explained. Thank you!
@karimd7926
@karimd7926 4 жыл бұрын
This channel is underrated. It's like GOT now and I have been hacking a device that annoyed me but unfortunately killed it. No worries I bought a second hand one. Is it possible to contact you directly before this becomes too popular lol? I have specific questions about a similar device I have (fortunately dlink provides source code for it but I still can't do what I want)
@MakeMeHack
@MakeMeHack 4 жыл бұрын
Hi Karim, thank you again for your continued support. Sure, you can contact me directly at valerio@digiampietro.com, I am happy to receive emails about this channel; by the way my email is listed also in the "About" section of this channel.
@michalisp.6318
@michalisp.6318 4 жыл бұрын
Your English is not hard to understand at all. Amazing content, thank you for sharing
@triularity
@triularity 3 жыл бұрын
@25:50 - Two possibilities: 1) "Security" through obscurity. 2) The left hand doesn't know what the right hand is doing.
@GiovanniMaino
@GiovanniMaino Жыл бұрын
Complimenti per i tuoi video sto imparando tantissimo!
@abandxz
@abandxz 3 жыл бұрын
Please help with gemtek WLTFQT-144, im able to access UART but can not type anything there. any sugestion?
@quadirather
@quadirather Жыл бұрын
to the point focus video pin pointing core thing amazing information from Italian engineer.
@mr.dragonstar2387
@mr.dragonstar2387 3 жыл бұрын
Amazing! Very good explained tutorial. Thanks!
@matitalatina
@matitalatina 4 жыл бұрын
Thank you. This is so entertaining and informative!
@MakeMeHack
@MakeMeHack 4 жыл бұрын
Hi matitalatina, thank you for your continued appreciation and support.
@garypaulson5202
@garypaulson5202 2 жыл бұрын
Excellent video!
@vengug7303
@vengug7303 2 жыл бұрын
Hello sir how to get .hex file to . Exe file please guide me....
@briankimathi5033
@briankimathi5033 3 жыл бұрын
You're the best. Thank you
@perinoveriza1658
@perinoveriza1658 4 жыл бұрын
Excellent teacher 👍
@22koga
@22koga 3 жыл бұрын
i wish you where my neighbor you could probably change this hardware id in a second without having to mess with the hard strap
@IntgrtdCrcut
@IntgrtdCrcut 2 жыл бұрын
Love that!
@antonioc760
@antonioc760 Жыл бұрын
Bravissimo.
@starlinkpk
@starlinkpk 3 жыл бұрын
fantastic work
@cralx2k
@cralx2k 4 жыл бұрын
WOW. Thanks Sir....
@nixonnelson5181
@nixonnelson5181 3 жыл бұрын
I love it!
@J01220
@J01220 3 жыл бұрын
Thank you
@MyLets14
@MyLets14 3 жыл бұрын
Good Content
@haytamnori596
@haytamnori596 3 жыл бұрын
gpon zte f680 root plz
@abder5453
@abder5453 3 жыл бұрын
F**CKING AMAZING ... (y)
@2JZC-n4n
@2JZC-n4n Жыл бұрын
Russias old man
#07 - How To Emulate Firmware With QEMU - Hardware Hacking Tutorial
44:50
#05 - How To Get The Root File System - Hardware Hacking Tutorial
33:20
Wait… Maxim, did you just eat 8 BURGERS?!🍔😳| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 9 МЛН
Happy birthday to you by Secret Vlog
00:12
Secret Vlog
Рет қаралды 6 МЛН
Hack everything: re-purposing everyday devices - Matt Evans
50:39
Linux.conf.au 2012 -- Ballarat, Australia
Рет қаралды 807 М.
#04 - How To Get The Firmware - Hardware Hacking Tutorial
34:08
Make Me Hack
Рет қаралды 169 М.
#03 - How To Find The JTAG Interface - Hardware Hacking Tutorial
27:52
#02 - How To Find The UART Interface - Hardware Hacking Tutorial
23:47
18 Commands That Will Change The Way You Use Linux Forever
29:50
Akamai Developer
Рет қаралды 1,2 МЛН
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡
18:41
Flashback Team
Рет қаралды 586 М.
IoT Hacking - Netgear AC1750 NightHawk - UART Root Shell
41:23
Matt Brown
Рет қаралды 33 М.
Samy Kamkar's Crash Course in How to Be a Hardware Hacker
28:07