Hacking an AT&T 4G Router For Fun and User Freedom
AT&T doesn't want their customers to modify their own devices. In this video, I show how hardware hackers can take back control of their devices through the process of firmware extraction and firmware analysis. Specifically, we take a look at the CDS-9010 LTE router and extract the superadmin credentials via the UART U-Boot interface.
AT&T Forum Questions:
- https://forums.att.com/conversations/other-phones-devices/dataremote-9070-web-administration-panel-access/6006d5f4127141623b1f6ead
- https://forums.att.com/conversations/att-fiber-equipment/i-need-help/5ecea8ed48339337196a41f9
IoT Hackers Hangout Community Discord Invite:
https://discord.gg/f4hPG4VEby
๐ ๏ธ Stuff I Use ๐ ๏ธ
๐ช Tools:
Multimeter: https://amzn.to/4b9cUUG
Power Supply: https://amzn.to/3QBNSpb
Oscilloscope: https://amzn.to/3UzoAZM
Logic Analyzer: https://amzn.to/4a9IfFu
USB UART Adapter: https://amzn.to/4aaCOGt
iFixit Toolkit: https://amzn.to/44tTjMB
๐ซ Soldering & Hot Air Rework Tools:
Soldering Station: https://amzn.to/4dygJEv
Microsoldering Pencil: https://amzn.to/4dxPHwY
Microsoldering Tips: https://amzn.to/3QyKhrT
Rework Station: https://amzn.to/3JOPV5x
Air Extraction: https://amzn.to/3QB28yx
๐ฌ Microscope Setup:
Microscope: https://amzn.to/4abMMao
Microscope 0.7X Lens: https://amzn.to/3wrV1S8
Microscope LED Ring Light: https://amzn.to/4btqiTm
Microscope Camera: https://amzn.to/3QXSXsb
About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.
- Soli Deo Gloria
๐ป Social:
twitter: https://twitter.com/nmatt0
linkedin: https://www.linkedin.com/in/mattbrwn/
github: https://github.com/nmatt0/
#hacking #iot #cybersecurity #righttorepair #jailbreak
Posted May 12
click to rate
Share this page with your family and friends.