tl;dr: this is a series of posts about embedded firmware hacking and reverse engineering of a IoT device, a TomTom Runner GPS Smartwatch. Slidedecks of this work will be available here when I complete this series.
...
I will show you how I hacked a TomTom Runner GPS Smartwatch, by:--Finding a memory corruption vulnerability exploitable via USB and possibly bluetooth (if paired);
--Taking advantage of said vulnerability to gain access to its encrypted firmware;
--Doing all this without ever laying a screwdriver near the device (no physical tampering).After reading about the epic hacking of the Chrysler Jeep by Charlie Miller and Chris Valasek, and getting to watch their talk at Defcon this year (seriously, go watch it if you haven't already), I felt really jealous because I wanted to be able to do that, so I got to work.
(Score: -1, Offtopic) by Anonymous Coward on Wednesday November 18 2015, @09:44PM
ArchLinux: We're out of control fucking dogs!! [dailymail.co.uk]