@ant0inet I'm not the only one😍 I made the same joke a few weeks ago, I don't think that many people got it lol
Likes to develop and break embedded things🐧
Electrical engineer by training, currently working as an embedded software developer. Interested in all things electronics, microcontrollers, computers, open source, security, and Linux
@ant0inet I'm not the only one😍 I made the same joke a few weeks ago, I don't think that many people got it lol
@marcel @syt Sinngemäss ja. Das werksseitig installierte Zertifikat ist von der "Yealink Manufacturing CA" ausgestellt mit einer Laufzeit von 10 Jahren. Zusätzlich gibt es auf dem Gerät die erwähnte "Equipment Manufacturing CA", mit der sich das Gerät selbst Zertifikate ausstellen kann. Wir haben bis jetzt keine Anzeichen dafür gefunden, dass sich die Zertifikate ausgestellt von den zwei CAs bezüglich Berechtigungen unterscheiden. Ich nehme an, dass das zur Absicherung so entschieden wurde, für den Fall wenn z.B. das werksseitige Zertifikat abgelaufen ist.
Korrektur: die CA auf dem Gerät heisst "Equipment Issuing CA".
@Xilokar Cool, just let me know.
Ah of course, that's the smart way, nice! Weird that there are still vulnerable devices floating around more than half a year after disclosure...
@Xilokar Very cool! Did you end up dumping the same version? Did my tool work? I would love to have a chat sometime about your insights and your thoughts about the (presumed) system architecture. Feel free to PM me if you're interested!
Some people have asked and I saw some demand in my logs, so I added an RSS feed to my blog (https://stefan-gloor.ch)
https://stefan-gloor.ch/rss.xml
Let me know if there are any problems!
@PiiiepsBrummm Not easily no, there are signature checks in place. But something might be possible with some more effort and time, I merely scratched the surface here
@HopelessDemigod Good idea :)
@azonenberg Oof! Guess I was lucky!
@BLucke Gibts das schon irgendwo zum Nachlesen?
🪥 Reverse Engineering der Oral-B iO: Firmware & Hardware im Überblick!
🔧 HW: PSoC4, CC2642, 128×64 OLED, W25Q64JV (GALEP-5), J-Link
💻 SW: Ghidra + Python-Skripte, Bitmap-Header-Suche (0x80 00 40 00), Entropie-Checks
➡️ Einblicke in Zerlegen, Flash-Dump & automatisierte Grafikauslese!
#ReverseEngineering #EmbeddedSystems #Firmware #PSoC4 #Ghidra #HardwareHacking #IoT #Python
@martin Interesting!
@jn Not sure, I didn't ask. Might be something to try :)
Yes, old-school ARM9. Random fact: the Ti Nspire calculators also all have a ARM926EJ afaik.
@zeewox I didn't ask, might be something to try :) I think GPL violations are quite common in these kinds of things
@bougiewonderland Not yet :)
@Ymity Thank you!