TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Reverse Engineering IoT Devices

52 点作者 wolframio将近 8 年前

1 comment

throwaway2016a将近 8 年前
From the article:<p>&gt; The fact that this bulb is not using TCP&#x2F;IP based protocol for communication makes it little hard to reverse engineer, I mean c’mon if it was suppose to be on my home network, things would be bit easier isn’t it, I can just use it’s MAC or IP to sniff and dump packets in a PCAP file to be later analyzed with Wireshark, it could have been cryptic but easy to sniff, Basically a Man in the Middle sort of thing, even a simple CLI tcpdump would also work<p>I like having everything controlled from one app and proprietary apps drive me nuts. This is how I reverse engineered most of the things in my house (including the alarm system). It works surprisingly well.