<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Embedded Systems on System Overlord</title><link>https://systemoverlord.com/tags/embedded-systems.html</link><description>Recent content in Embedded Systems on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sun, 21 May 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/embedded-systems/index.xml" rel="self" type="application/rss+xml"/><item><title>Pi Zero as a Serial Gadget</title><link>https://systemoverlord.com/2017/05/21/pi-zero-as-a-serial-gadget.html</link><pubDate>Sun, 21 May 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/05/21/pi-zero-as-a-serial-gadget.html</guid><description>&lt;p&gt;I just got a new Raspberry Pi Zero W (the wireless version) and didn&amp;rsquo;t feel like
hooking it up to a monitor and keyboard to get started. I really just wanted a
serial console for starters. Rather than solder in a header, I wanted to be
really lazy, so decided to use the USB OTG support of the Pi Zero to provide a
console over USB. It&amp;rsquo;s pretty straightforward, actually.&lt;/p&gt;</description></item><item><title>Belden Garrettcom 6K/10K Switches: Auth Bypasses, Memory Corruption</title><link>https://systemoverlord.com/2017/05/19/belden-garrettcom-6k-10k-switches-auth-bypasses-memory-corruption.html</link><pubDate>Fri, 19 May 2017 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2017/05/19/belden-garrettcom-6k-10k-switches-auth-bypasses-memory-corruption.html</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Vulnerabilities were identified in the Belden GarrettCom 6K and 10KT (Magnum) series
network switches. These were discovered during a black box assessment and
therefore the vulnerability list should not be considered exhaustive;
observations suggest that it is likely that further vulnerabilities exist.
It is strongly recommended that GarrettCom undertake a full whitebox security
assessment of these switches.&lt;/p&gt;
&lt;p&gt;The version under test was indicated as: 4.6.0. Belden Garrettcom released
an advisory on 8 May 2017, indicating that issues were fixed in 4.7.7:
&lt;a href="https://www.belden.com/hubfs/support/security/bulletins/Belden-GarrettCom-MNS-6K-10K-Security-Bulletin-BSECV-2017-8.pdf?hsLang=en"&gt;https://www.belden.com/hubfs/support/security/bulletins/Belden-GarrettCom-MNS-6K-10K-Security-Bulletin-BSECV-2017-8.pdf?hsLang=en&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a local copy of an &lt;a href="http://seclists.org/fulldisclosure/2017/May/65"&gt;advisory posted to the Full Disclosure mailing list&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Playing with the Patriot Gauntlet Node (Part 2)</title><link>https://systemoverlord.com/2015/06/20/playing-with-the-patriot-gauntlet-node-part-2/</link><pubDate>Sat, 20 Jun 2015 22:13:50 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/06/20/playing-with-the-patriot-gauntlet-node-part-2/</guid><description>&lt;p&gt;Despite the fact that it&amp;rsquo;s been over 2 years since I posted &lt;a href="https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/"&gt;Part 1&lt;/a&gt;, I got bored and decided I should take another look at the &lt;a href="http://www.amazon.com/gp/product/B008KW61XK/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B008KW61XK&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20&amp;amp;linkId=YX2FFFV7XA7LVSVW"&gt;Patriot Gauntlet Node&lt;/a&gt;. So I go and grab the latest firmware from Patriot&amp;rsquo;s website (V21_1.2.4.6) and use the same binwalk techniques described in the first post, I extracted the latest firmware.&lt;/p&gt;
&lt;p&gt;So, the TL;DR is: It&amp;rsquo;s unexciting because Patriot makes no effort to secure the device. It seems that their security model is &amp;ldquo;if you&amp;rsquo;re on the network, you own the device&amp;rdquo;, which is pretty much the case. Not only can you enable telnet as I&amp;rsquo;ve discussed before, there&amp;rsquo;s even a convenient web-based interface to run commands: http://10.10.10.254:8088/adm/system_command.asp. Oh, and it&amp;rsquo;s not authenticated. Even if you set an admin password (which is hidden at http://10.10.10.254:8088/adm/management.asp).&lt;/p&gt;</description></item><item><title>Playing with the Patriot Gauntlet Node (Part 1)</title><link>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</link><pubDate>Tue, 05 Feb 2013 07:54:05 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</guid><description>&lt;p&gt;I recently picked up a &lt;a href="http://www.amazon.com/gp/product/B008KW61XK/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B008KW61XK&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Patriot Gauntlet Node&lt;/a&gt; just to take a look at it. Playing with the device, it seemed to be a pretty straightforward wireless SoC with a hard drive interface. Many, if not most, of these embedded SoCs use Linux as their operating system, so I decided to go a bit further and see what was going on.&lt;/p&gt;
&lt;p&gt;I headed over to the Patriot website and downloaded the firmware for the
Gauntlet Node, unzipped the file, and ran &lt;a
href="https://github.com/ReFirmLabs/binwalk"&gt;binwalk&lt;/a&gt; against it. (Binwalk is an awesome tool that essentially runs 'file' with a special magic file against every possible byte offset to find the parts of a firmware image.)&lt;/p&gt;</description></item></channel></rss>