[ 0.000000] ********************************************************** [ 0.000000] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 0.000000] ** ** [ 0.000000] ** trace_printk() being used. Allocating extra memory. ** [ 0.000000] ** ** [ 0.000000] ** This means that this is a DEBUG kernel and it is ** [ 0.000000] ** unsafe for produciton use. ** [ 0.000000] ** ** [ 0.000000] ** If you see this message and you are not debugging ** [ 0.000000] ** the kernel, report this immediately to your vendor! ** [ 0.000000] ** ** [ 0.000000] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 0.000000] **********************************************************
So, flock cameras are android 8.1 dev kits with debug kernels, unlocked bootloader, and full shell access ... In prod.
the mini usb port can do OTG to an extent or be an adb port depending on the dip switch. When it's in ADP mode, it's a crapshoot on the USB device id, and usb_modeswitch doesn't do anything.
Using adb, one can push/pull at will. Granted it's not a root shell, and su isn't installed, but holding buttons on power up can get you fastboot.
It's android 8.1, and plenty of su zip files can be applied.
The buttons... Power and volume down. Just enough to be useful in fastboot.
I plan on dumping the flock specific APK files and attempting a decompiling. Maybe hard coded API keys :blobupsidedown:
[2854059.422692] usb 1-1.1: New USB device found, idVendor=05c6, idProduct=f000, bcdDevice= 3.18 [2854059.422708] usb 1-1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [2854059.422715] usb 1-1.1: Product: Android [2854059.422721] usb 1-1.1: Manufacturer: Android [2854059.422726] usb 1-1.1: SerialNumber: [redacted] [2854059.427519] usb-storage 1-1.1:1.0: USB Mass Storage device detected [2854059.428200] scsi host4: usb-storage 1-1.1:1.0
Android Bootloader - UART_DM Initialized!!! [0] welcome to lk
[10] platform_init() [10] target_init() [80] SDHC Running in HS400ES mode [90] WARNING: All phase passed.The selected phase may not be optimal [100] Done initialization of the card
The back housing contains a momentary push button with led ring One internal cellular antenna One sma type antenna for the other cellular connection The weird 7 pin power data connection with only 6 pins connected
What I really want to see is where the image processing extracts the license plate text and try to pull some bobby tables actions. I have seen SQL references in how the local metadata processes are logging, so I think this could be an interesting defense.
I am pretty sure I am going to attempt to enable the remote control ports on 8888 / 9999 to see if those render any results before going down the root filesystem path.
But, for anyone looking for an interesting tid bit...
Triple-press the button on the back of the flock. You will enable wifi tethering. PSK is security
I will be testing that SIM in a different cellular modem soon enough, but I am starting to think the cam I got off of ebay is not quite right.
Watching the local logcat, there are a lot of permission errors and device errors. The QTI logging service on the SCRCPY console seems to never connect to the local logging services.
I got a bitbold and hit one of factort reset buttons in another homebrew flock app, and that did reset the device a f ew time with filesystem stuff in the console logs. Yes all the system apps remained in place, so no flock APKs were harmed... Although. I'm not sure if this camera had enough to work fully in the first place.
I can never get the camera to boot to it's ADB bridge consistently and rarely can I actually get the camera's local wifi hotspot to enable.
Also, the back button seems to enable hotspot mode, but, no network level ADB connections. :(
These are so unlocked and so open, if these fucking devices ever made ewaste piles, the dev boards are so easy to harvest and repurpose as an unlocked android 8.1 dev board. Serial port is marked by G T R on the silk screen, and power seems wide input 12v tolerant.
The case of the cam has no intrusion detection.
There is no epoxy or potting or conformal coatring. I'm not sure there is even conformal coating. THe outer housing is sealed with a nice thicc gasket. Even the T20 security torx have o-rings. This is funny because the battery says not to charge in a sealed container.
I have yet to explore the back case button behavior, since I am stealing 3.3v for the serial TTL from that header. Now that I have adb bridge access via USB, i can remove the serial link and connect that button to see what logcat says.
The last bit for me to explore is to see if the 7 pin plug has any useful data on the bottom 3 pins.
Now I get to re-learn android hax0ring all over again, yay!
It wasn't listed as a "feature" in adb, but the logcat output indicates there is a "display" and "sleep" modes when pressing one of the buttons on the board.