Author Archive
The following is part 4 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 4: Analyzing the Firmware Dumps Background Information In our last post we wrote a Depthcharge script to extract the… » Read More
The following is part 3 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 3: Filesystem Extraction Background Information In our previous post we did a teardown of each board to familiarize ourselves… » Read More
The following is part 2 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 2: Hardware Teardown & Board Familiarization Background Information In our last post we talked about Depthcharge and ADB which… » Read More
The following is a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 1: Introduction and Overview As malware and botnets have become more prevalent in recent years, one can’t help but wonder, “Are any… » Read More
Target Access
June 21st, 2024 by Brian
When you are reverse engineering a satellite internet system and the product is (rightfully) hermetically sealed to prevent moisture and other entry, you have to be creative about how you open it without damaging the circuitry inside. One sacrificial lamb to start the process and then we are off and running! Long sides of the… » Read More