Hacking The Mojo C-75 - Root Shell via Firmware Modification

14,656
0
2024-05-20に共有
The Mojo C-75 is a professional grade Wi-Fi router. In this video, we modified the extracted firmware to update the root password hash in the /etc/shadow file to a password we know. Then we reattach the flash chip to the PCB and get a root shell.

mkfs.jffs2 man page:
man.archlinux.org/man/mkfs.jffs2.1.en

XGecu Software Mirror:
github.com/Kreeblah/XGecu_Software

XGecu Wine USB Driver DLL:
github.com/radiomanV/TL866/tree/master/wine

IoT Hackers Hangout Community Discord Invite:
discord.com/invite/vgAcxYdJ7A

🛠️ Stuff I Use 🛠️

🪛 Tools:
XGecu Universal Programmer: amzn.to/4dIhNWy
Multimeter: amzn.to/4b9cUUG
Power Supply: amzn.to/3QBNSpb
Oscilloscope: amzn.to/3UzoAZM
Logic Analyzer: amzn.to/4a9IfFu
USB UART Adapter: amzn.to/4dSbmjB
iFixit Toolkit: amzn.to/44tTjMB

🫠 Soldering & Hot Air Rework Tools:
Soldering Station: amzn.to/4dygJEv
Microsoldering Pencil: amzn.to/4dxPHwY
Microsoldering Tips: amzn.to/3QyKhrT
Rework Station: amzn.to/3JOPV5x
Air Extraction: amzn.to/3QB28yx

🔬 Microscope Setup:
Microscope: amzn.to/4abMMao
Microscope 0.7X Lens: amzn.to/3wrV1S8
Microscope LED Ring Light: amzn.to/4btqiTm
Microscope Camera: amzn.to/3QXSXsb

About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.

- Soli Deo Gloria

💻 Social:
twitter: twitter.com/nmatt0
linkedin: www.linkedin.com/in/mattbrwn/
github: github.com/nmatt0/

#hacking #iot #cybersecurity #righttorepair #jailbreak

コメント (21)
  • @Lifeless11111
    One advice i have for you when soldering , is lower your soldering temperature, its way too high , thats why u knock off that resistor so easily. Also you run the risk of just taking off pads at that temperature. I usually just have my soldering station at around 300c for this small thermal mass jobs. Great video btw
  • @marcosscriven
    I absolutely love that you didn't edit out the agonising wait on booting up to confirm it worked. Great videos as always. Thanks.
  • This was a great vid. The soldering is doable, the firmware mod is doable too. The important bits are explained well. And bonus points for using Vim. Thank you.
  • So many things to say. 1. love the videos. it's refreshing to have a old youtube style walk through including and explaining mistakes. 2. I appreciate you reading and using comment suggestions like zooming in on the command line.
  • @NyahStuff
    A bit of advice when soldering those types of chips with more than 6 pins: I've found it easiest to do when there isn't any solder applied to the pads beforehand - what I do is I put a blob of flux in the middle to just hold the chip in place and then carefully go around and manually apply solder to each pin with the soldering iron once the chip is aligned. Maybe also loog into getting a pointier tip for the soldering iron for that. Cheers for the great content!
  • @DrXJ
    Some people are just going through products because they have money.. others go throug them like.. "hey, let's go meet your makers and find out what they didn't tell you... you could do." 😂
  • @roguesecurity
    Really loved the section where you covered improper soldering let to flash chip not being recorgnized. When working with hardware modifications, there are truly many potential points of failure - such as chips not being soldered correctly, components getting damaged from overheating during the soldering/desoldering process, firmware corruption, other PCB components on PCB getting dislodged etc etc. This type of work undoubtedly demands a tremendous amount of hardwork and patience. Great work, Matt, and thank you for sharing this. I really enjoy your videos.
  • @j_r_-
    Loving the hacking series. we can re-use/re-purpose old devices
  • @Hyp3rb34m
    Great Job! Looking forward to the next one to see what you found in the network traffic; as we used to do some crazy things specifically around spectrum jamming/etc
  • I love your style of presentation and the information with/of all the failed attempts. Very instructive and good to follow. Lerned a lot over the time with your videos. Thanks for sharing. I'm already looking forward to the continuation :)
  • Digging your videos Matt!! Thanks for taking the time to make them!
  • @TechieGanesh
    Hey matt, just wanna say I absolutely love your videos! <3
  • @inq752
    one of the best channels. keep pumping out the content in same format
  • @Alfred-Neuman
    Now, let's try to find where they installed the backdoor on this system! ;D
  • @jake7112
    Great content, love your stuff man. Keep it up! Looking forward to seeing that traffic you mentioned
  • @Rilch
    This stuff is really interesting! Thanks for another cool video! Look forward to the next one one this device :D
  • @foobar9761
    Very interesting stuff, do please continue!
  • @RickDkkrd
    Good stuff, thanks for putting the whole process together