Hacking The Mojo C-75 - Intercepting Network Traffic

7,055
0
Published 2024-05-29
The Mojo C-75 is a professional grade Wi-Fi router. In this video, we will show the interception of cleartext and encrypted network traffic coming from the device.

mitmrouter github repo:
github.com/nmatt0/mitmrouter

sslsplit:
www.roe.ch/SSLsplit

IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A

🛠️ Stuff I Use 🛠️

🪛 Tools:
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4dSbmjB
iFixit Toolkit: amzn.to/44tTjMB

🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx

🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb

About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.

- Soli Deo Gloria

💻 Social:
twitter: twitter.com/nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/

#hacking #iot #cybersecurity #righttorepair #jailbreak

All Comments (21)
  • Wow, this was just great. A little bit of hardware, a little bit of Linux, reverse engineering, and lots of networking?? Man, this series is like a jackpot! Thank you so much!
  • @jagga-jagga
    It is so refreshing to see a bright, young man in his element in a sea of social media brainrot. Thank you for the videos, Matt!
  • @dothex
    Bro I love your channel. Alot of your videos helped me get me setup for cert in security, and I can't thank you enough.
  • @stefanschz7589
    bro I've found your channel a few days ago! I highly recommend everyone to subscribe to this channel IMMEDIATELY! as it's AWESOME! I am over 30 and this topic is something that I always wanted to learn about but I haven't had time (life problems). You explain things perfectly and I thank you for that! Greetings from Europe! Bright future is ahead of you!
  • @XYZ56771
    Great content Matt! And, please keep sprinkling counter measures throughout the video so we get a glimpse on the good practices too.
  • @micahrunyon2743
    Are you planning on reverse engineering the protocol? If so a video from you using ghidra would be so cool.
  • @0xbitbybit
    Shoutout to your partner who is obviously okay with letting you make so many videos 🙏 I'm assuming you spend your evenings making them! You probably spend even more time than just making the videos, with editing etc. as well. Loving that setup for intercepting traffic for IoT devices 🙌
  • One of the best channels on youtube right now. Keep it up big bro.
  • @dannnnnno
    Your channel is gold keep it up! Don’t change your formula, it’s perfect in my opinion
  • @6LordMortus9
    You are doing what I wanted to do 30 yrs ago! :) And you're explaining it in a way that people can understand. Thank you for sharing your knowledge and procedures.
  • @gomberfu
    Fantastic content Matt. Been watching your channel since you started and I am learning so much. Please keep it up, it is always a good day when another video lands!!
  • @almc8445
    You’re doing awesome work by uploading these videos, well presented and very information dense 😁
  • @stanstrum
    I would like to ask if you have heard of Spotify's decision to brick all "Car Thing" devices at the end of this year. If it piques your interest, I would love to see a video by you that could allow the owners to continue using their devices rather than having to take them to e-waste centers en masse. Thanks for the great content.
  • Awesome content very well presented. It's a little bit over my head, but your explanations enable me to follow along just fine. Thank you!
  • @dareelcatskull
    Really enjoy your channel! I would love to learn more about Android since so many cheap devices use it now. Lot's of great hardware held back!
  • @BLiNKx86
    Great video! I love this kind of stuff.
  • The sensord is the app that capture wifi traffic like in monitor mode. since Mojo aka Airtight is doing IDS on wifi, they sample raw wifi packets to detect if there are rogue AP connected to the LAN by a clever scheme of packet injection, they patented the idea so you can see in the patent database how they did it. But here the C-75 seems to run in router mode not AP mode so the sensor mode is probably not enabled. There is nothing wrong sending mac address in clear over the internet, they probably send the id of the device to a central server/cloud for registration. I thought your video would extract what ever key there is and decrypt the TLS session.
  • @theskelet4r
    Another great video Matt, Question for you. The MITM tool you are using and have setup. Is there anything stopping you from using this setup to proxy TLS handshakes within other protocols or would it just work with web traffic? I am currently working on a project involving SQL and the TDS protocol which runs on 1433.