<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Patriot Gauntlet Node on System Overlord</title><link>https://systemoverlord.com/tags/patriot-gauntlet-node.html</link><description>Recent content in Patriot Gauntlet Node on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 20 Jun 2015 22:13:50 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/patriot-gauntlet-node/index.xml" rel="self" type="application/rss+xml"/><item><title>Playing with the Patriot Gauntlet Node (Part 2)</title><link>https://systemoverlord.com/2015/06/20/playing-with-the-patriot-gauntlet-node-part-2/</link><pubDate>Sat, 20 Jun 2015 22:13:50 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2015/06/20/playing-with-the-patriot-gauntlet-node-part-2/</guid><description>&lt;p&gt;Despite the fact that it&amp;rsquo;s been over 2 years since I posted &lt;a href="https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/"&gt;Part 1&lt;/a&gt;, I got bored and decided I should take another look at the &lt;a href="http://www.amazon.com/gp/product/B008KW61XK/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B008KW61XK&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20&amp;amp;linkId=YX2FFFV7XA7LVSVW"&gt;Patriot Gauntlet Node&lt;/a&gt;. So I go and grab the latest firmware from Patriot&amp;rsquo;s website (V21_1.2.4.6) and use the same binwalk techniques described in the first post, I extracted the latest firmware.&lt;/p&gt;
&lt;p&gt;So, the TL;DR is: It&amp;rsquo;s unexciting because Patriot makes no effort to secure the device. It seems that their security model is &amp;ldquo;if you&amp;rsquo;re on the network, you own the device&amp;rdquo;, which is pretty much the case. Not only can you enable telnet as I&amp;rsquo;ve discussed before, there&amp;rsquo;s even a convenient web-based interface to run commands: http://10.10.10.254:8088/adm/system_command.asp. Oh, and it&amp;rsquo;s not authenticated. Even if you set an admin password (which is hidden at http://10.10.10.254:8088/adm/management.asp).&lt;/p&gt;</description></item><item><title>Playing with the Patriot Gauntlet Node (Part 1)</title><link>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</link><pubDate>Tue, 05 Feb 2013 07:54:05 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/02/05/playing-with-the-patriot-gauntlet-node-part-1/</guid><description>&lt;p&gt;I recently picked up a &lt;a href="http://www.amazon.com/gp/product/B008KW61XK/ref=as_li_ss_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=B008KW61XK&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;Patriot Gauntlet Node&lt;/a&gt; just to take a look at it. Playing with the device, it seemed to be a pretty straightforward wireless SoC with a hard drive interface. Many, if not most, of these embedded SoCs use Linux as their operating system, so I decided to go a bit further and see what was going on.&lt;/p&gt;
&lt;p&gt;I headed over to the Patriot website and downloaded the firmware for the
Gauntlet Node, unzipped the file, and ran &lt;a
href="https://github.com/ReFirmLabs/binwalk"&gt;binwalk&lt;/a&gt; against it. (Binwalk is an awesome tool that essentially runs 'file' with a special magic file against every possible byte offset to find the parts of a firmware image.)&lt;/p&gt;</description></item></channel></rss>