Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I found an amazon basics color changing smart light bulb attached to a lamp my neighbor threw in the apartment dumpster.

I found an amazon basics color changing smart light bulb attached to a lamp my neighbor threw in the apartment dumpster.

Scheduled Pinned Locked Moved Uncategorized
88 Posts 31 Posters 287 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ftg@mastodon.radioF ftg@mastodon.radio

    @MLE_online
    Oh cool. A new ESP32 board source.
    It's even on a desolderable module.
    And ESP32 is more hackable than the Silabs EFR32 in IKEA Trodfri's.
    At least until I port the Gekkokapula firmware to the module I pulled form one and get on 2.4GHz FM with one.

    mle_online@social.afront.orgM This user is from outside of this forum
    mle_online@social.afront.orgM This user is from outside of this forum
    mle_online@social.afront.org
    wrote on last edited by
    #76

    @ftg I'm not getting anywhere with connecting to the module, however. I've got it wired up to an FTDI device, but esptools fails to connect to it, and I don't know why

    realgene@hachyderm.ioR 1 Reply Last reply
    0
    • steter@mastodon.stevesworld.coS steter@mastodon.stevesworld.co

      @MLE_online @RueNahcMohr Cool. Cheaper than making an assembly line. Neat use for it.

      steter@mastodon.stevesworld.coS This user is from outside of this forum
      steter@mastodon.stevesworld.coS This user is from outside of this forum
      steter@mastodon.stevesworld.co
      wrote on last edited by
      #77

      @MLE_online Someone could sniff the bluetooth to see what it sends/receives, then create code for phone or PC (if it has bluetooth installed) to mimic transfers. Such a person would probably want a working app to watch, so they know which data each command sends/receives. Without that, it would be difficult. Unless the bulb came with an API, which should make it very easy.

      1 Reply Last reply
      0
      • mle_online@social.afront.orgM mle_online@social.afront.org

        @ftg I'm not getting anywhere with connecting to the module, however. I've got it wired up to an FTDI device, but esptools fails to connect to it, and I don't know why

        realgene@hachyderm.ioR This user is from outside of this forum
        realgene@hachyderm.ioR This user is from outside of this forum
        realgene@hachyderm.io
        wrote on last edited by
        #78

        @MLE_online @ftg
        There's probably a requirement to pull a particular pin down at power on to enable the ROM loader.

        1 Reply Last reply
        0
        • mle_online@social.afront.orgM mle_online@social.afront.org

          Ok, it's controlling a BP1838 3 channel dimmable LED driver chip: https://datasheet4u.com/datasheets/BPS/BP1638CJ/1495890

          If someone out there is smart and wants to try throwing some code together to see if it will work outside of the amazon ecosystem, let me know and I'll try loading it onto the ESP32

          bytex64@awesome.gardenB This user is from outside of this forum
          bytex64@awesome.gardenB This user is from outside of this forum
          bytex64@awesome.garden
          wrote on last edited by
          #79

          @MLE_online You could probably just throw tasmota32.factory.bin on there but I can’t see anything that says it supports the BP1838. http://ota.tasmota.com/tasmota32/release/

          1 Reply Last reply
          0
          • snoopj@hachyderm.ioS snoopj@hachyderm.io

            @MLE_online I'd be surprised if they took effort to lock people out, but I guess it's possible that they use a blanket approach with code signing, since it *does* represent attack surface

            mhkohne@mastodon.socialM This user is from outside of this forum
            mhkohne@mastodon.socialM This user is from outside of this forum
            mhkohne@mastodon.social
            wrote on last edited by
            #80

            @SnoopJ @MLE_online Even if they set the 'no read' bit, what matters is the processor's approach to it. Some processors will still let you clear that bit (and thus wipe the on-board flash), while others won't, making the stupid thing e-waste (I'm scowling at you to Infineon). I've not done esp32, so I don't know their approach.

            1 Reply Last reply
            0
            • ruenahcmohr@infosec.exchangeR This user is from outside of this forum
              ruenahcmohr@infosec.exchangeR This user is from outside of this forum
              ruenahcmohr@infosec.exchange
              wrote on last edited by
              #81

              @projectgus @MLE_online From what I see, its an esp32. which, IS halarious.

              1 Reply Last reply
              0
              • mle_online@social.afront.orgM mle_online@social.afront.org

                @scribblesonnapkins @SnoopJ I wouldn't know how to do any of that

                scribblesonnapkins@mastodon.socialS This user is from outside of this forum
                scribblesonnapkins@mastodon.socialS This user is from outside of this forum
                scribblesonnapkins@mastodon.social
                wrote on last edited by
                #82

                @MLE_online @SnoopJ
                It's not as complicated as it sounds. Is it something you want to explore?

                1 Reply Last reply
                0
                • ruenahcmohr@infosec.exchangeR This user is from outside of this forum
                  ruenahcmohr@infosec.exchangeR This user is from outside of this forum
                  ruenahcmohr@infosec.exchange
                  wrote on last edited by
                  #83

                  RE: https://social.afront.org/@MLE_online/116116635764812056

                  @projectgus @MLE_online

                  Link Preview Image
                  Infosec Exchange

                  favicon

                  (infosec.exchange)

                  1 Reply Last reply
                  0
                  • mle_online@social.afront.orgM mle_online@social.afront.org

                    It looks like it's specifically one of these

                    Link Preview Image
                    ACK Solution

                    Espressif offers an easy way for users to build Alexa-connected devices with Espressif’s Alexa Connect Kit (ACK) hardware and software.

                    favicon

                    Espressif Systems (www.espressif.com)

                    R This user is from outside of this forum
                    R This user is from outside of this forum
                    rcgj_oxphys@floss.social
                    wrote on last edited by
                    #84

                    @MLE_online In case it's of interest to anyone reading this: the datasheet indicates these can be locked down using eFuse bits that "can't be unset" (paraphrase) I would expect these to be set on an IoT device (tho' some of the products I've seen written about here… yeesh. so you never know)

                    I didn't find info for ESP32 about resetting these, but for AVR chips this has reportedly been possible, with some detail here: https://web.archive.org/web/20210506151334/https://sites.google.com/site/pbykec/projects/index/hvsp
                    hopefully it gives some helpful clues.

                    1 Reply Last reply
                    0
                    • snoopj@hachyderm.ioS snoopj@hachyderm.io

                      @scribblesonnapkins @MLE_online it looks like the kind of fault injection you're thinking of was performed on a cousin chip, I would guess the secure boot is pretty much the same across the family of chips and would be susceptible to the same attack:

                      Link Preview Image
                      Espressif ESP32: Bypassing Secure Boot using EMFI

                      Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training.

                      favicon

                      (raelize.com)

                      pretty neat, I like that write-up quite well

                      scribblesonnapkins@mastodon.socialS This user is from outside of this forum
                      scribblesonnapkins@mastodon.socialS This user is from outside of this forum
                      scribblesonnapkins@mastodon.social
                      wrote on last edited by
                      #85

                      @SnoopJ @MLE_online That's one way. There are also fast dips and spikes in the power rails and glitches of other forms.

                      You can also make micro probes and with the chip decapped probe the chip directly. Those fuses have been know to be made at larger feature sizes.

                      1 Reply Last reply
                      0
                      • mle_online@social.afront.orgM mle_online@social.afront.org

                        @maehw That seems promising. I'm not really sure where to start though

                        maehw@chaos.socialM This user is from outside of this forum
                        maehw@chaos.socialM This user is from outside of this forum
                        maehw@chaos.social
                        wrote on last edited by
                        #86

                        @MLE_online You'd need to find UART TX/RX + GND + BOOT signal for serial bootloader access. And a USB/serial converter on your PC. But I don't really want to drag you into that rabbit hole. Still got an IoT device on my desk myself. 😄

                        1 Reply Last reply
                        0
                        • ruenahcmohr@infosec.exchangeR This user is from outside of this forum
                          ruenahcmohr@infosec.exchangeR This user is from outside of this forum
                          ruenahcmohr@infosec.exchange
                          wrote on last edited by
                          #87

                          @projectgus @MLE_online the question might be - did they leave an arduino boot loader on it. I'm thinking yes.

                          1 Reply Last reply
                          0
                          • mle_online@social.afront.orgM mle_online@social.afront.org

                            @vxo @botvolution You should explain what AB 2047 is for people who don't know what that is.

                            The lawmaker proposing that bill is also proposing to require drivers licenses for ebike. She's on a roll with stupid ideas right now

                            vxo@digipres.clubV This user is from outside of this forum
                            vxo@digipres.clubV This user is from outside of this forum
                            vxo@digipres.club
                            wrote on last edited by
                            #88

                            @MLE_online
                            Does she have the "Karen" haircut?
                            @botvolution

                            1 Reply Last reply
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups