Author Archive

The following is part 4 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 4: Analyzing the Firmware Dumps Background Information In our last post we wrote a Depthcharge script to extract the… » Read More

The following is part 3 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 3: Filesystem Extraction Background Information In our previous post we did a teardown of each board to familiarize ourselves… » Read More

The following is part 2 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 2: Hardware Teardown & Board Familiarization Background Information In our last post we talked about Depthcharge and ADB which… » Read More

The following is a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 1: Introduction and Overview As malware and botnets have become more prevalent in recent years, one can’t help but wonder, “Are any… » Read More

When you are reverse engineering a satellite internet system and the product is (rightfully) hermetically sealed to prevent moisture and other entry, you have to be creative about how you open it without damaging the circuitry inside. One sacrificial lamb to start the process and then we are off and running! Long sides of the… » Read More