Hacking the Arlo Q Security Camera: Bootloader Reverse Engineering

  Рет қаралды 18,707

Matt Brown

Matt Brown

Күн бұрын

Пікірлер: 69
@jakesec633
@jakesec633 Жыл бұрын
Hey Matt, loved the video as per usual. I’ve cracked the hash for the boot loader, the password is: ngpriv106
@fusseldieb
@fusseldieb Жыл бұрын
Wow, that was fast! How did you manage that?
@neb_setabed
@neb_setabed Жыл бұрын
Damn that was quick, nice job!
@Knolraab
@Knolraab Жыл бұрын
I am interested to know too. Sharing is caring
@schrenk-d
@schrenk-d Жыл бұрын
Nice. Looks fairly simple.. I'd imagine you had some GPU power to get done so quickly. While you likely wouldn't find this string in a rainbow table, the combination of 9 lowercase letters and 0-9 gives us 9^36 iterations to get through. Modern CPUs and GPUs could knock that around quickly. Few hours at most.
@mattbrwn
@mattbrwn Жыл бұрын
Absolute Legend!
@AlexKiraly
@AlexKiraly 11 ай бұрын
What a goldmine of a channel!
@SiAdiaMu
@SiAdiaMu 3 ай бұрын
true i just found his channel yesterday and it's very educating to watch !!
@malucullus9100
@malucullus9100 Жыл бұрын
I know the hash has been cracked now, but if you wanted to get into the older firmware without having to do a chip-off you could also have tried interrupting the boot process a few times, ideally with a reset. This would simulate the crashing firmware that this sort of A/B deployment is supposed to protect against and may have caused the boot loader to fail back to the old version.
@azus5576
@azus5576 10 ай бұрын
It has? In what video does he do that? I couldn't find that hash in those pre-computed lookup tables and using leaked password lists didn't work either. I doubt he could brute-force that hash
@azus5576
@azus5576 10 ай бұрын
nvm, I missed the fixed comment somehow
@kmsec1337
@kmsec1337 Жыл бұрын
Bruh this is top quality content. Thank you so much 🙏
@hallisern
@hallisern Жыл бұрын
Great video Matt, amazing explanations. Very easy to follow and understand!
@charlesdorval394
@charlesdorval394 5 ай бұрын
Damn man you're good! I like how you show your discovery process, so much awesome tricks!
@ersonthemesa
@ersonthemesa Жыл бұрын
Thanks Matt....Great video.
@LucaCostantino1
@LucaCostantino1 7 ай бұрын
Hi @mattbrwn... Just discovering your channel now... Where are you on part 4 of this serie?? :D Awesome videos, keep it up!
@mattbrwn
@mattbrwn 7 ай бұрын
Device got bricked.
@LucaCostantino1
@LucaCostantino1 6 ай бұрын
@@mattbrwn That's a shame! I was really looking forward for more! Thanks!
@xrafter
@xrafter 6 ай бұрын
​@@mattbrwn WHAT THE BRICK!
@ChimeFix
@ChimeFix 6 ай бұрын
​@@mattbrwn😢
@rbw9692
@rbw9692 5 ай бұрын
I would sponsor a new one just to see the video!
@kiyotaka31337
@kiyotaka31337 Жыл бұрын
Thanks for the videos I learned a lot from your videos.
@bassimyounis5803
@bassimyounis5803 Жыл бұрын
Hey Matt thanks for the video. How did you know that the hash was unsalted? Was it in a previous video?
@mattbrwn
@mattbrwn Жыл бұрын
Good question! I discussed it in the first video. The bootloader prints out the password hash of what you enter for a password attempt. So I was able to type "password" in, hit enter, and confirm that the password matched the unsalted sha256 hash of "password"
@xrafter
@xrafter 6 ай бұрын
​@@mattbrwn What a legend!
@Ski4974
@Ski4974 Жыл бұрын
Did you end up making the 3rd video in this ARLO Q series?
@mattbrwn
@mattbrwn Жыл бұрын
Unfortunately my device got bricked so I wasn't able to make the next video.
@Ski4974
@Ski4974 Жыл бұрын
@@mattbrwn That's too bad, how did that happen? 😯
@Autokey_Security_Services
@Autokey_Security_Services Жыл бұрын
Is it not possible for you to write your own known hash into the flash chip raw data dump or is this data retained in the armarello chip??
@mattbrwn
@mattbrwn Жыл бұрын
This should be possible. I'm working on this method for a future video.
@neon_Nomad
@neon_Nomad Жыл бұрын
Amazing as always !ganbatte!!
@markf8819
@markf8819 Жыл бұрын
Great video
@neon_Nomad
@neon_Nomad Жыл бұрын
Here i come hash cat.. guess the rainbow road was to easy a route
@jordantekelenburg
@jordantekelenburg Жыл бұрын
Is there more coming??
@Henrik229
@Henrik229 Жыл бұрын
Very interesting videos!
@NeverGiveUpYo
@NeverGiveUpYo Жыл бұрын
Really good content
@neon_Nomad
@neon_Nomad Жыл бұрын
Says it will take a month but im having trouble getting both cpu and GPU running at same time... I don't have much experience with hashcat so if anyone knows whats going wrong im using hashcat launcher
@markf8819
@markf8819 Жыл бұрын
What tools would you recommend for a beginner
@mattbrwn
@mattbrwn Жыл бұрын
I'm trying to put together a playlist about all my tools but that's a work in progress. For getting UART access you really just need a simple TTL-232R cable: ftdichip.com/products/ttl-232r-3v3/
@gersonsoares6628
@gersonsoares6628 Жыл бұрын
bom video matt: o bootloader é u-boot ?
@mattbrwn
@mattbrwn Жыл бұрын
No this is not uboot. Ambarella SoCs use a custom bootloader called amboot.
@ahmedsammoud1924
@ahmedsammoud1924 Жыл бұрын
Any updates on what happened with the arlo?
@neon_Nomad
@neon_Nomad Жыл бұрын
Hope all is alright
@mattbrwn
@mattbrwn Жыл бұрын
Haha thanks for asking! Doing good. Closing on a house so that's been taking a lot of my free time lately. Will post new videos after that is finished.
@bbjunkie
@bbjunkie Ай бұрын
The fact they patched the backdoor before rugging their customers is an even bigger FU / kick in the teeth to them. Not only are they pretty much bricking your camera but denying you the chance to modify it to stream to local storage 😡
@isheamongus811
@isheamongus811 Жыл бұрын
Maybe somthing like if (1=1) may work
@habiks
@habiks Жыл бұрын
Cool video . But GPIO simply means general purpose input / output pin. GPIO isn't any type of mechanism..
@same4047
@same4047 Жыл бұрын
Sir, i have been facings problems on my blutooth speaker, every time I turn it on it prompted heavy annoying sounds like "Bluetooth pairing is on" "usb mode" etc. How can we remove these prompts, or customise the blutooth device name. Also could we make a device which could connect to multiple bluetooth devices and simultaneously output all of them from one source/smartphone 🤔
@jabbawok944
@jabbawok944 7 ай бұрын
check out darieee . he does that kind of thing.
@tyronetyrone2652
@tyronetyrone2652 Жыл бұрын
@bomber78963
@bomber78963 Жыл бұрын
I'm guessing they beefed up their passwords after this recent CVE: nvd.nist.gov/vuln/detail/CVE-2016-10115 One option may be to fuzz the UART inputs? Perhaps something in the password check logic may have a bug
@mattbrwn
@mattbrwn Жыл бұрын
I thought this was going to be the case as well! check the pinned comment! someone cracked it already 😂
Hacking the Arlo Q Security Camera: Firmware Extraction
40:58
Matt Brown
Рет қаралды 25 М.
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Intro to Hardware Reversing: Finding a UART and getting a shell
12:07
Tony Gambacorta
Рет қаралды 905 М.
Hacking The Mojo C-75 - Chip-Off Firmware Extraction
40:11
Matt Brown
Рет қаралды 32 М.
A Better Way to Fearlessly Hacking Firmware for the First Time.
55:14
4G GPS Tracker Reverse Engineering - Hardware Analysis
18:39
Matt Brown
Рет қаралды 18 М.
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.