TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Adventures in Reverse Engineering Smart Bulb Firmware

12 点作者 nikital超过 8 年前

4 条评论

fsdfdsdffdfdfd超过 8 年前
dfsfdsf
fsdfdsdffdfdfd超过 8 年前
bxcb
mrlambchop超过 8 年前
My first pass at this would be to put something like Charles between the wifi AP and the internet and taken a look at what was going on. After understanding the protocol, then would it be a lot easier to look for an OTA FW exploit or mitm attacks around the string manipulation functions used to communicate to the outside.
评论 #12742403 未加载
api超过 8 年前
Traceroute to cloud.yeelight.com seems to go to China.<p>Your light bulbs are talking to a cloud service in China.<p><a href="https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;can-wi-fi-let-you-see-people-through-walls&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cnet.com&#x2F;news&#x2F;can-wi-fi-let-you-see-people-throu...</a><p>Nope.