<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>hack on irq5 test</title><link>https://irq5-7854a1fdb9f4.pages.dev/tag/hack/</link><description>Recent content in hack on irq5 test</description><language>en-us</language><lastBuildDate>Mon, 10 Aug 2020 23:53:00 +0000</lastBuildDate><atom:link href="https://irq5-7854a1fdb9f4.pages.dev/tag/hack/feed/" rel="self" type="application/rss+xml"/><item><title>Custom Firmware for the Xiaomi AX3600 Wireless Router</title><link>https://irq5-7854a1fdb9f4.pages.dev/2020/08/custom-firmware-for-the-xiaomi-ax3600-wireless-router/</link><pubDate>Mon, 10 Aug 2020 23:53:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2020/08/custom-firmware-for-the-xiaomi-ax3600-wireless-router/</guid><description>&lt;p>As I have &lt;a href=https://irq5-7854a1fdb9f4.pages.dev/2020/07/xiaomi-aiot-wireless-router-ax3600-review/ rel=noopener>mentioned in the review&lt;/a>, the stock firmware on the &lt;strong>Xiaomi AX3600 wireless router&lt;/strong> is extremely limiting. On top of that, the firmware is also locked to install only authorized updates from the manufacturer.
If you have been following the blog, you will know that I like &lt;a href=https://irq5-7854a1fdb9f4.pages.dev/tag/asuswrt/ rel=noopener>the flexibility that ASUSWRT provides&lt;/a> for customizing my router.&lt;/p>&lt;p>While there is currently an on-going effort to try and port vanilla OpenWRT for this router,
I suspect that might take some time.
In this post, I describe how to workaround the lousy firmware and configure the router with the advanced features I need.&lt;/p>&lt;h1 id=router-disassembly>Router Disassembly&lt;/h1>&lt;p>It is recommended to have UART access handy, in case something bad happens and you need to recover your router,
or if you want access to U-Boot, the bootloader.
This would require you to crack open your router, so you might only want to do this if necessary.
&lt;strong>Feel free to skip this section if you are not interested in the hardware, or don&amp;rsquo;t need low-level access.&lt;/strong>&lt;/p>&lt;p>&lt;picture>&lt;source srcset=/posts/2020/img/50192590117_c462cfd63a_7171.jpg.webp type=image/webp>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2020/img/50192590117_c462cfd63a_7171.jpg alt="router top view, with cover opened" width=1023 height=682>&lt;/picture>&lt;/p>&lt;p>You need to unscrew 5 screws, 4 of which are hidden under the rubber feet, and one under the center sticker label.
In the disassembled top view photo here, you can see the screw holes at the corners, as well as a missing chunk in the center of the heatsink for the mating screw post, directly aligned with the AIoT antenna and indicator LEDs.&lt;/p>&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2020/08/custom-firmware-for-the-xiaomi-ax3600-wireless-router/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Extending ASUSWRT Functionality, Part 2</title><link>https://irq5-7854a1fdb9f4.pages.dev/2018/12/extending-asuswrt-functionality-part-2/</link><pubDate>Fri, 28 Dec 2018 00:11:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2018/12/extending-asuswrt-functionality-part-2/</guid><description>&lt;p>Following up from &lt;a href=https://irq5-7854a1fdb9f4.pages.dev/2012/12/hacking-functionality-into-asuswrt-routers/ rel=noopener>my earlier post&lt;/a>, Asus has released faster and beefier routers.
But perhaps the more important change here is that they have moved from MIPS in the RT-N56U to ARM in newer routers.
I have also upgraded to the &lt;strong>RT-AC68U&lt;/strong> for better reception and hopefully to fix the poor battery life experienced by my Android tablet.&lt;/p>&lt;p>&lt;picture>&lt;source srcset=/posts/2018/img/asus-routers.jpg.webp type=image/webp>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2018/img/asus-routers.jpg alt="the Asus N56U and AC68U routers, side by side" width=1023 height=682>&lt;/picture>&lt;/p>&lt;p>After upgrading, I noticed that the method I described back then no longer works.
Someone also noticed this, as they
&lt;a href=http://koolshare.cn/thread-105955-1-1.html rel=noopener target=_blank class=external>translated key portions of my post&lt;/a> into Chinese,
while pointing out some of the steps that didn’t work.&lt;/p>&lt;p>In this post, I&amp;rsquo;ll summarize the key changes required to get it working again.&lt;/p>&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2018/12/extending-asuswrt-functionality-part-2/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Decoding BCARD Conference Badges</title><link>https://irq5-7854a1fdb9f4.pages.dev/2013/04/decoding-bcard-conference-badges/</link><pubDate>Sat, 13 Apr 2013 01:28:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2013/04/decoding-bcard-conference-badges/</guid><description>&lt;p>Last month, I had the opportunity to fly halfway around the world to attend &lt;em>RSA Conference 2013&lt;/em>. Everyone was given a lanyard and badge which contains your information entered during registration. When you visit booths, they can then scan your badge to collect your information and follow up by sending you spam.&lt;/p>&lt;p>&lt;picture>&lt;source srcset=/posts/2013/img/rsa-conf-pass.jpg.webp type=image/webp>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2013/img/rsa-conf-pass.jpg alt="RSA conference pass" width=640 height=427>&lt;/picture>&lt;/p>&lt;p>The scanner varies across different booths, but mostly it&amp;rsquo;s an Android device that ran a custom software. Since it had a large NXP logo, let&amp;rsquo;s try to read it with the &lt;a href="https://play.google.com/store/apps/details?id=com.nxp.taginfolite" rel=noopener target=_blank class=external>NFC TagInfo app&lt;/a>. Looks like the tag identifies itself as a NDEF message but the data is gibberish.&lt;/p>&lt;p>&lt;picture>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2013/img/bcard_taginfo.png alt="Data in the BCARD as decoded by TagInfo" width=720 height=1034 class="half noinvert">&lt;/picture>&lt;/p>&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2013/04/decoding-bcard-conference-badges/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Hacking Functionality into ASUSWRT Routers</title><link>https://irq5-7854a1fdb9f4.pages.dev/2012/12/hacking-functionality-into-asuswrt-routers/</link><pubDate>Mon, 10 Dec 2012 00:10:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2012/12/hacking-functionality-into-asuswrt-routers/</guid><description>&lt;p>This weekend, I spent some time to replace my aged Linksys WRT54G wireless router, which is running DD-WRT. The WRT54G is slow by today&amp;rsquo;s wireless standards and since I sync my iOS devices wirelessly, the speed was getting quite unbearable. When I bought my Macbook Pro in 2007, it already has draft 802.11n support and fast-forward to 2012, my iPad (1st generation) and iPhone 5 both support the 5GHz band.&lt;/p>&lt;p>The &lt;strong>ASUS RT-N56U&lt;/strong> wireless router ranks up there on wireless performance, and the &amp;ldquo;feature&amp;rdquo; I was really after was a router that can run an alternative firmware such as Tomato or DD-WRT. The really good news is, I figured out how to get the functionality I wanted while still using the official ASUS firmware.&lt;/p>&lt;p>&lt;picture>&lt;source srcset=/posts/2012/img/asus-top.jpg.webp type=image/webp>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2012/img/asus-top.jpg alt="ASUS router photo" width=1024 height=683>&lt;/picture>&lt;/p>&lt;p>For proper reviews and better photos, you might want to check out these other reviews:&lt;/p>&lt;ul>&lt;li>SmallNetBuilder: &lt;a href=http://www.smallnetbuilder.com/wireless/wireless-reviews/31436-asus-rt-n56u-black-diamond-dual-band-gigabit-wireless-n-router-reviewed rel=noopener target=_blank class=external>ASUS RT-N56U Black Diamond Dual-Band Gigabit Wireless-N Router Reviewed&lt;/a>&lt;/li>&lt;li>FoxNetwork: &lt;a href=http://www.foxnetwork.ru/index.php/en/component/content/article/82-asus-rt-n56u.html rel=noopener target=_blank class=external>ASUS RT-N56U or hardware NAT acceleration&lt;/a>&lt;br>(I quite like their professionally taken product photos and their reverse-engineering work)&lt;/li>&lt;/ul>&lt;p>Read on to find my short review, as well as how you can run your own programs on the router without using a third-party firmware.&lt;/p>&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2012/12/hacking-functionality-into-asuswrt-routers/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Mac Battery Firmware Hacking</title><link>https://irq5-7854a1fdb9f4.pages.dev/2011/11/mac-battery-firmware-hacking/</link><pubDate>Sun, 20 Nov 2011 16:36:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2011/11/mac-battery-firmware-hacking/</guid><description>[youtube=http://www.youtube.com/watch?v=bc1EU5GTbLE]
Charlie Miller reverse engineers the Mac battery firmware updater, sniffs battery communications on the SMBus, writes an IDA processor plugin (in IDAPython) for the CoolRISC 816 processor in the bq20z80, and mucks around with the its firmware.
All the source code and presentation materials are provided.
[via Dangerous Prototypes]</description></item><item><title>Enable iOS 5 Multitasking Gestures on iPad 1</title><link>https://irq5-7854a1fdb9f4.pages.dev/2011/10/enable-ios-5-multitasking-gestures-on-ipad-1/</link><pubDate>Sun, 16 Oct 2011 22:29:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2011/10/enable-ios-5-multitasking-gestures-on-ipad-1/</guid><description>Now that iOS 5 has been released, it&amp;rsquo;s easy to enable multitasking gestures on the iPad 1, using the same trick as before for display mirroring.
Edit the /System/Library/CoreServices/Springboard.app/K48AP.plist file and add a boolean key multitasking-gestures in the capabilities dict, and set its value to true. You can add both display mirroring and multitasking gestures to the iPad 1 using this method.
That&amp;rsquo;s it!
Alternatively you can use Cydia or redsn0w to do this for you.&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2011/10/enable-ios-5-multitasking-gestures-on-ipad-1/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Apple's RAOP is Cracked</title><link>https://irq5-7854a1fdb9f4.pages.dev/2011/04/apples-raop-is-cracked/</link><pubDate>Mon, 11 Apr 2011 23:34:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2011/04/apples-raop-is-cracked/</guid><description>For a long time now, apps can stream high-quality audio to an Airport Express or an Apple TV using the RAOP protocol. However, the reverse cannot be done due to the fact that the protocol uses asymmetric encryption, which means the private key is baked into the firmware of the Apple (or Apple-licensed) device.
Finally, someone has done something about it. James Laird dumped the ROM of his Airport Express and extracted the private key.&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2011/04/apples-raop-is-cracked/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Removing read-only protection from MS Word</title><link>https://irq5-7854a1fdb9f4.pages.dev/2010/08/removing-read-only-protection-from-ms-word/</link><pubDate>Wed, 04 Aug 2010 21:02:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2010/08/removing-read-only-protection-from-ms-word/</guid><description>&lt;p>Recently I needed to fill up some form for submission, in soft copy. The template file provided was a MS Word document, but for some really stupid reason it was marked read-only. When I tried to edit the document, this helpful sidebar appeared.&lt;/p>&lt;p>&lt;picture>&lt;img src=https://irq5-7854a1fdb9f4.pages.dev/posts/2010/img/word_unprotect_dialog.png alt="Screenshot of Word asking for password" width=273 height=359 class=noinvert>&lt;/picture>&lt;/p>&lt;p>When I clicked the &amp;ldquo;Stop protection&amp;rdquo; button I was prompted for a password. I didn&amp;rsquo;t want to waste time trying to recreate this whole form, nor do I wish to hand-write it.&lt;/p>&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2010/08/removing-read-only-protection-from-ms-word/#more">Continue reading…&lt;/a>&lt;/p></description></item><item><title>Reverse-engineering the Clicker</title><link>https://irq5-7854a1fdb9f4.pages.dev/2010/07/reverse-engineering-the-clicker/</link><pubDate>Tue, 06 Jul 2010 16:51:00 +0000</pubDate><guid>https://irq5-7854a1fdb9f4.pages.dev/2010/07/reverse-engineering-the-clicker/</guid><description>A few semesters back, our school started trial runs to use these &amp;ldquo;clickers&amp;rdquo; as well. At that time I was thinking of cracking it open to see what makes it tick, as well as evil plans like trying to impersonate other clickers or sniffing what other people&amp;rsquo;s responses were.
I only managed to peel back a bit of the plastic in front, but since the clicker was brand-new and I had to return it in a good condition, I didn&amp;rsquo;t dare to proceed any further than that.&lt;p>&lt;a href="https://irq5-7854a1fdb9f4.pages.dev/2010/07/reverse-engineering-the-clicker/#more">Continue reading…&lt;/a>&lt;/p></description></item></channel></rss>