Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Wednesday November 18 2015, @09:38PM   Printer-friendly
from the hacking-of-things-device dept.

tl;dr: this is a series of posts about embedded firmware hacking and reverse engineering of a IoT device, a TomTom Runner GPS Smartwatch. Slidedecks of this work will be available here when I complete this series.
...
I will show you how I hacked a TomTom Runner GPS Smartwatch, by:

        --Finding a memory corruption vulnerability exploitable via USB and possibly bluetooth (if paired);
        --Taking advantage of said vulnerability to gain access to its encrypted firmware;
        --Doing all this without ever laying a screwdriver near the device (no physical tampering).

After reading about the epic hacking of the Chrysler Jeep by Charlie Miller and Chris Valasek, and getting to watch their talk at Defcon this year (seriously, go watch it if you haven't already), I felt really jealous because I wanted to be able to do that, so I got to work.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by DeathMonkey on Thursday November 19 2015, @05:50PM

    by DeathMonkey (1380) on Thursday November 19 2015, @05:50PM (#265422) Journal

    Phoenix666 did not hack a smartwatch, find memory corruption, etc. This is a quote from an article where those things were done by someone else.
     
    Hmmmm, if only there was some sort of quoting feature that would indicate that a block of text was from the source article....

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2