Hacking the Arlo Q Security Camera: Bootloader Reverse Engineering
Matt Brown
@mattbrwnAbout
Iโm Matt Brown, Founder & Principal Consultant at Brown Fine Security, where I lead IoT penetration testing to secure connected devices for enterprises. With over 10 years in IoT security, I specialize in finding and fixing vulnerabilities in hardware, firmware, and systems. What I Do: Conduct thorough IoT pentests, testing device interfaces, firmware, and networks, delivering clear reports with risk scores and fixes. My Edge: Expert in chip-off firmware extraction, firmware chip readers, and BGA reballing for precise analysis and modification. Track Record: Won the 2023 Most Valuable Hacker award at HackerOneโs H1-213 and found zero-day vulnerabilities in Amazon IoT devices. Sharing Knowledge: Run a YouTube channel with 100K+ subscribers, featuring videos like โHacking a Motorola Automatic License Plate Reader.โ Brown Fine Security offers tailored, standards-driven IoT pentesting. Connect with me to discuss securing your IoT ecosystem. Visit brownfinesecurity.com. Soli Deo Gloria
Video Description
In this video, we continue hacking on the Arlo Q security camera. Today we reverse engineer the extracted firmware to better understand how the bootloader security is implemented. unsalted sha256 bootloader password hash: dd62e7962d63044fd1b190091930939affb172e578bb941728bd4e4478250641 IoT Hackers Hangout Community Discord Invite: https://discord.com/invite/vgAcxYdJ7A ๐ ๏ธ Stuff I Use ๐ ๏ธ ๐ช Tools: XGecu Universal Programmer: https://amzn.to/4dIhNWy Multimeter: https://amzn.to/4b9cUUG Power Supply: https://amzn.to/3QBNSpb Oscilloscope: https://amzn.to/3UzoAZM Logic Analyzer: https://amzn.to/4a9IfFu USB UART Adapter:https://amzn.to/4dSbmjB iFixit Toolkit: https://amzn.to/44tTjMB ๐ซ Soldering & Hot Air Rework Tools: Soldering Station: https://amzn.to/4dygJEv Microsoldering Pencil: https://amzn.to/4dxPHwY Microsoldering Tips: https://amzn.to/3QyKhrT Rework Station: https://amzn.to/3JOPV5x Air Extraction: https://amzn.to/3QB28yx ๐ฌ Microscope Setup: Microscope: https://amzn.to/4abMMao Microscope 0.7X Lens: https://amzn.to/3wrV1S8 Microscope LED Ring Light: https://amzn.to/4btqiTm Microscope Camera: https://amzn.to/3QXSXsb About Me: My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems. - Soli Deo Gloria ๐ป Social: twitter: https://twitter.com/nmatt0 linkedin: https://www.linkedin.com/in/mattbrwn/ github: https://github.com/nmatt0/ #iot #hacking #bootloader #reverseengineering #firmware
No Recommendations Found
No products were found for the selected channel.



















