TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Adventures in Reverse Engineering Smart Bulb Firmware

12 pointsby nikitalover 8 years ago

4 comments

fsdfdsdffdfdfdover 8 years ago
dfsfdsf
fsdfdsdffdfdfdover 8 years ago
bxcb
mrlambchopover 8 years ago
My first pass at this would be to put something like Charles between the wifi AP and the internet and taken a look at what was going on. After understanding the protocol, then would it be a lot easier to look for an OTA FW exploit or mitm attacks around the string manipulation functions used to communicate to the outside.
评论 #12742403 未加载
apiover 8 years ago
Traceroute to cloud.yeelight.com seems to go to China.<p>Your light bulbs are talking to a cloud service in China.<p><a href="https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;can-wi-fi-let-you-see-people-through-walls&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;can-wi-fi-let-you-see-people-throu...</a><p>Nope.