Just watched you for two hours straight. The moment where you got root through that lengthy hack was inspiring and impressive! Count me in as a subscriber! Not to mention, you've somehow tied into my previous experience with capturing handshakes and brute-forcing... Amazing!
@januszsowa80516 күн бұрын
Your english is very clear and you explain everything very well. Watched all episodes already and working on another router - going back to the videos as they are full of knowledge
@riskydissonance2 жыл бұрын
6 episodes in and still amazing content 👌!
@ReallyLee Жыл бұрын
Thank you very much. You have a broad range of experience and that experience shows in the clarity of your explanations. Your Italian and English is just fine to my ears. I have been using find and grep for many years, but without the confidence and clarity that you communicate. I am planning a disassembly project involving a laser printer and thanks for modeling how to go in there and thanks for telling a few things not to do.
@stephenhookings19852 жыл бұрын
No idea why the KZbin algorithm took so long to recommend your channel. Glad that it did.
@salix_qmeou Жыл бұрын
You are Amazing, Valerio!!! Congrats on making this concise, didactic and useful material for us, I have 100% certain that a lot of people that don't comment on this series have the same feeling that I'm feeling right now. I'm Brazilian and I'm not confident about my English speaking as well but I can understand you perfectly, You're amazing!!!
@typedeaf2 жыл бұрын
Nice! Tip: 'H' is NOT a silent letter. 'elp', 'ow', 'ardware', etc. These can be hard to decipher sometimes.
@douglasheld Жыл бұрын
21:38 This will work, but I will often use a more explicit way to cover filenames with spaces: find . -type f | while read FILE; do grep -l factory "$FILE" ; done The pseudo-logic is 1) produce a listing of files; 2) read each full line output and capture as a variable I named FILE; 3) start a do->done sequence for each $FILE variable captured. It is a little more verbose but this allows me to follow and to modify the command iteratively, without relying on xargs's ability to parse the inputs the way I expect it to.
@ThomasEnder_pt3 жыл бұрын
Amazing Sir.. your English is vey good to understand and the whole process is clearly talked about. One suggestion I have is to talk a little more about the eeprom and partitions, what pages and blocks are, what the hex stands for and shows and what a filesystem is. Many people with knowledge have no idea how to read an eeprom or convert the binary to usable information. Other than that you are doing a PERFECT job
@TheElectronicDilettante2 жыл бұрын
Thanks for all the great videos. Super informative. Your English is fine. You speak it better than most native speakers I know. Keep it up!!
@rahulmeena4527 Жыл бұрын
well I am not bored after watching 6 episodes of the series.
@joemajortech26572 жыл бұрын
first of all, as long time in research to get more information about embedded devices , i found your channel and help me more really. i follow ur schannel to knows a many info, many thanks.👍👍
@finnbin13 жыл бұрын
Amazing content... .MUCH better than 99.99999% of other youtube linux videos... really informative....
@hugolyppens27542 жыл бұрын
Fantastic video. I am going to watch this entire series and use the knowledge to unbrick my LG TV (also MIPS embedded same Linux version). I would like to contribute that you can pass -exec grep XXX '{}' ';' to the find command, so the grep is executed for each found file, instead of piping to xargs where you had have to worry about file names with spaces in them.👍
@BlauskaerM4 жыл бұрын
Fantastic video! I can add that I'm working on a embedded product at the moment that is using systemd as the init process. So its starting to showing up in the embedded world. Your series is amazing and after 7 years as an embedded developer I have learned a lot from you.Thank you very much.
@MakeMeHack4 жыл бұрын
Hello Erik Viktorsson, thank you for your appreciation and support, and thank you for the information about systemd. In the video, I said that "I have never seen, YET, systemd in an embedded device", good to know that it's starting to show up in some newer devices, it has a larger footprint and it is more complex, but it is more powerful and has more features like parallelized architecture and faster boot times, daemon tracking, hotplug capable, etc.
@gael5773 Жыл бұрын
your video are really amazing. If all the videos on the subject were as detailed and clear, it's really visible that you know your subject well. I can only hope that in the future you will do more video on hardware and software hacking since the last one was posted 2 years ago 👍👍👍 Le tue spiegazioni sono veramente molto chiare è interessante, continui così 👌 my farebbe molto piacere vedere più video del genere
@PriyankaGupta-yt5bp2 ай бұрын
very very interesting video, easy to understand and follow, thank you so much for giving your time :)
@pitchpitch81724 жыл бұрын
Best neighbour ever... thanks for all your efforts making this serie of videos ... have you ever worked on car ECU's? think it is the the same as your Router, i mean embedded?
@ryanitchon2 жыл бұрын
Your English is not bad at all. Thanks for this content.
@edgeeffect4 жыл бұрын
That was interesting.... you just mentioned "hashcat" a few times, I installed it and was surprised to see it had a dependency on Clang... which sent me off on a "diversion" to en.wikipedia.org/wiki/OpenCL .... very interesting!! I always grep files from find without xargs: find -type f -exec grep -H factory {} \; This series in EXCELLENT! Molte Bene!
@strategyoracle4 жыл бұрын
Really looking forward to the reverse engineering that we'll see next of these binaries!
@MakeMeHack4 жыл бұрын
Hello Peter Upfold, thank you for your interest! still a couple of episodes about building the emulation environment and then we will start with the reverse engineering. In the meantime, I published something about the reverse engineering of the Gemtek Router on GitHub at: github.com/digiampietro/hacking-gemtek.
@jkl8724 жыл бұрын
This is really interesting and well explained. Thank you!
@karimd79264 жыл бұрын
This channel is underrated. It's like GOT now and I have been hacking a device that annoyed me but unfortunately killed it. No worries I bought a second hand one. Is it possible to contact you directly before this becomes too popular lol? I have specific questions about a similar device I have (fortunately dlink provides source code for it but I still can't do what I want)
@MakeMeHack4 жыл бұрын
Hi Karim, thank you again for your continued support. Sure, you can contact me directly at valerio@digiampietro.com, I am happy to receive emails about this channel; by the way my email is listed also in the "About" section of this channel.
@michalisp.63184 жыл бұрын
Your English is not hard to understand at all. Amazing content, thank you for sharing
@triularity3 жыл бұрын
@25:50 - Two possibilities: 1) "Security" through obscurity. 2) The left hand doesn't know what the right hand is doing.
@GiovanniMaino Жыл бұрын
Complimenti per i tuoi video sto imparando tantissimo!
@abandxz3 жыл бұрын
Please help with gemtek WLTFQT-144, im able to access UART but can not type anything there. any sugestion?
@quadirather Жыл бұрын
to the point focus video pin pointing core thing amazing information from Italian engineer.
@mr.dragonstar23873 жыл бұрын
Amazing! Very good explained tutorial. Thanks!
@matitalatina4 жыл бұрын
Thank you. This is so entertaining and informative!
@MakeMeHack4 жыл бұрын
Hi matitalatina, thank you for your continued appreciation and support.
@garypaulson52022 жыл бұрын
Excellent video!
@vengug73032 жыл бұрын
Hello sir how to get .hex file to . Exe file please guide me....
@briankimathi50333 жыл бұрын
You're the best. Thank you
@perinoveriza16584 жыл бұрын
Excellent teacher 👍
@22koga3 жыл бұрын
i wish you where my neighbor you could probably change this hardware id in a second without having to mess with the hard strap