tl;dr: this is a series of posts about embedded firmware hacking and reverse engineering of a IoT device, a TomTom Runner GPS Smartwatch. Slidedecks of this work will be available here when I complete this series.
...
I will show you how I hacked a TomTom Runner GPS Smartwatch, by:--Finding a memory corruption vulnerability exploitable via USB and possibly bluetooth (if paired);
--Taking advantage of said vulnerability to gain access to its encrypted firmware;
--Doing all this without ever laying a screwdriver near the device (no physical tampering).After reading about the epic hacking of the Chrysler Jeep by Charlie Miller and Chris Valasek, and getting to watch their talk at Defcon this year (seriously, go watch it if you haven't already), I felt really jealous because I wanted to be able to do that, so I got to work.
(Score: 2) by DeathMonkey on Thursday November 19 2015, @05:50PM
Phoenix666 did not hack a smartwatch, find memory corruption, etc. This is a quote from an article where those things were done by someone else.
Hmmmm, if only there was some sort of quoting feature that would indicate that a block of text was from the source article....