Author Archive

The following is part 6 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post: Physical Exploit over SD Card Background Information In the previous post, we performed a cursory review of the filesystems… » Read More

Blog Post 5: Network Analysis and Exploit The following is part 5 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Background Information In our last post, we analyzed the filesystem to better understand how… » Read More

The following is part 4 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 4: Analyzing the Firmware Dumps Background Information In our last post we wrote a Depthcharge script to extract the… » Read More

The following is part 3 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 3: Filesystem Extraction Background Information In our previous post we did a teardown of each board to familiarize ourselves… » Read More

The following is part 2 of a 6-part series detailing the examination of the security of Set-Top Boxes. The research was conducted by Om and Jack, two of our interns this past summer. Enjoy! Blog Post 2: Hardware Teardown & Board Familiarization Background Information In our last post we talked about Depthcharge and ADB which… » Read More