Https://www.youtube.com/watch?v=h5PRvBpLuJs
3 Main methods:
(1) Use of the UART adapter to talk to debug parts, get to the device where we shouldn ' t is able to.
"UART is a universal serial data bus that is used for asynchronous communication. The bus bidirectional communication, can achieve full duplex transmission and reception. In the embedded design, the UART is used to communicate with the PC, including communication with the monitor debugger and other devices such as EEPROM. ”
"The mobile phone design and testing phase is used to control the CPU and the rest of the message transmission"
The video uses the UART to communicate directly with the hardware device (it feels like using the UART to trigger the function of debug, which can be followed by a debug command line), to gain control of the hardware, or to perform other desired operations.
If you start printer with the UART connected, printer will display the console menu:
You can choose the function you want on the console (you can also enter the shell command.) So it's free to play.
You can also use the UART to change the U boot settings, such as changing the login password, and then log in after the modification.
(2) Use EMMC, Sd-card like. Connect to EMMC to modify storage.
(3)
(Not to be continued!!) Cond! )
Here are a few comments on YouTube:
' It gives some the ability to make software that would otherwise is incapable of running due to limitations of the OS O R UI. It gives all access to the devices direct underlying OS (typically, if don't always, Linux). In the case of a end user it would give you the ability to run software written under this guise. For most users, this is meaningless. For some, the point is, they make a device using technology, and then lock out, that technology (ie:my cell phone Suppor TS all cell technologies, but they locked out the 4G LTE method, it's still there in teh hardware and hidden in the Softwa Re, by rooting it and installing a patch I can now use 4G LTE). Essentially, gives you control over your device, the only had limited control before. It ' s not for everybody. '
' I ' d think twice about putting a bunch of the IoT stuff in my home. Especially smart locks on the front door. They better has some super robust IT Security built into them if I ' m going to entertain the thought. '
Hack all the things:20 devices in minutes