GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by kajer (kajer@infosec.exchange), page 2

  1. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Thursday, 31-Jul-2025 07:25:16 JST kajer kajer
    • cR0w 🦃
    • Ryan Castellucci :nonbinary_flag:

    @cR0w @ryanc I might still have that challenge in an archive somewhere... I should check.

    https://ctftime.org/task/1189

    In conversation about 3 months ago from infosec.exchange permalink
  2. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Thursday, 31-Jul-2025 07:21:13 JST kajer kajer
    • cR0w 🦃
    • Ryan Castellucci :nonbinary_flag:

    @cR0w @ryanc we also used finger IIRC

    In conversation about 3 months ago from infosec.exchange permalink
  3. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Tuesday, 15-Jul-2025 07:54:21 JST kajer kajer

    Stop using 1.1.1.1
    Stop using 8.8.8.8
    Stop using 4.2.2.1

    quad9 is less evil

    In conversation about 4 months ago from infosec.exchange permalink
  4. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:45 JST kajer kajer
    in reply to

    also, fun fact. the eSIM in the Flock cellular module is not electronic sim, but "e"mbedded sim... meaning it's a standard SIM card.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/739/532/414/674/890/original/b8e1b8ca5d30658c.jpg
  5. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:45 JST kajer kajer
    in reply to

    SCRCPY WORKS!!!!

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/707/984/449/957/837/original/f9a9deb06c666d1a.png
  6. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:45 JST kajer kajer
    in reply to

    🤔

    I haven't tried to use SCRCPY

    It wasn't listed as a "feature" in adb, but the logcat output indicates there is a "display" and "sleep" modes when pressing one of the buttons on the board.

    Now I can't wait to go home and try it.

    Stupid day jobs...

    In conversation about 4 months ago from infosec.exchange permalink
  7. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:45 JST kajer kajer
    in reply to

    fuck ALPR tech

    Positive thoughts?

    These are so unlocked and so open, if these fucking devices ever made ewaste piles, the dev boards are so easy to harvest and repurpose as an unlocked android 8.1 dev board. Serial port is marked by G T R on the silk screen, and power seems wide input 12v tolerant.

    The case of the cam has no intrusion detection.

    There is no epoxy or potting or conformal coatring. I'm not sure there is even conformal coating. THe outer housing is sealed with a nice thicc gasket. Even the T20 security torx have o-rings. This is funny because the battery says not to charge in a sealed container.

    I have yet to explore the back case button behavior, since I am stealing 3.3v for the serial TTL from that header. Now that I have adb bridge access via USB, i can remove the serial link and connect that button to see what logcat says.

    The last bit for me to explore is to see if the 7 pin plug has any useful data on the bottom 3 pins.

    Now I get to re-learn android hax0ring all over again, yay!

    In conversation about 4 months ago from infosec.exchange permalink
  8. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:44 JST kajer kajer
    in reply to

    Can not set time in shell w/o root permissions.

    In conversation about 4 months ago from infosec.exchange permalink
  9. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:44 JST kajer kajer
    in reply to

    okay, I missed the fact that the Android OS is convinced that the date is 1970

    this may pose a problem

    In conversation about 4 months ago from infosec.exchange permalink
  10. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:44 JST kajer kajer
    in reply to

    I have a feeling that the camera is halting the boot process due to the missing sim card and the modem not initializing.

    I have yet to fully figure out the custom app ecosystem that makes up these cameras.

    In conversation about 4 months ago from infosec.exchange permalink
  11. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:44 JST kajer kajer
    in reply to

    I will be testing that SIM in a different cellular modem soon enough, but I am starting to think the cam I got off of ebay is not quite right.

    Watching the local logcat, there are a lot of permission errors and device errors. The QTI logging service on the SCRCPY console seems to never connect to the local logging services.

    I got a bitbold and hit one of factort reset buttons in another homebrew flock app, and that did reset the device a f ew time with filesystem stuff in the console logs. Yes all the system apps remained in place, so no flock APKs were harmed... Although. I'm not sure if this camera had enough to work fully in the first place.

    I can never get the camera to boot to it's ADB bridge consistently and rarely can I actually get the camera's local wifi hotspot to enable.

    Also, the back button seems to enable hotspot mode, but, no network level ADB connections. :(

    In conversation about 4 months ago from infosec.exchange permalink
  12. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:43 JST kajer kajer
    in reply to

    I am pretty sure I am going to attempt to enable the remote control ports on 8888 / 9999 to see if those render any results before going down the root filesystem path.

    But, for anyone looking for an interesting tid bit...

    Triple-press the button on the back of the flock. You will enable wifi tethering. PSK is security

    In conversation about 4 months ago from infosec.exchange permalink
  13. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:43 JST kajer kajer
    in reply to

    Tested the "e"SIM in other cellular modems I have. Nada. This particular camera's sim card seems to have been disabled.

    In conversation about 4 months ago from infosec.exchange permalink
  14. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:43 JST kajer kajer
    in reply to

    Any of my Android hacker friends with a nice CLI based priv escalation (for Android 8.1) would do well to DM me please.

    In conversation about 4 months ago from infosec.exchange permalink
  15. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:42 JST kajer kajer
    in reply to
    • Rick O

    @rickoooooo

    ha ha

    yeeeeeeessssssssssssssss

    msm8953_32:/ # whoami
    root
    In conversation about 4 months ago from infosec.exchange permalink
  16. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:42 JST kajer kajer
    in reply to
    • Rick O

    @rickoooooo Sadly, the above blog post (:thread:) doesn't quite get me as far as I was hoping for when it comes to root on the Flock camera.

    The "steps" posted in the blog are from memory at best. I think enough has been left out to make reproduction impossible.

    I am going to keep drilling. I have the boot images extracted, and magisk 23 claimed it was able to patch, but a reboot caused a kernel panic

    So... I'm going to attempt a few other magisk versions. v29(latest) also fails to patch or produce a new-boot.img

    :(

    In conversation about 4 months ago from infosec.exchange permalink
  17. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Monday, 14-Jul-2025 15:18:42 JST kajer kajer
    in reply to
    • Rick O

    There is an onboard app on the flock camera that offers to start a listener on port 8888/9999 and I have yet to explore that.

    It's probably the last thing I do before going scorched earth and dumping the boot images via EDL

    @rickoooooo linked this blog to me last night and I am going to attempt rooting the camera.

    https://gainsec.com/2025/06/19/grounded-flight-device-2-root-shell-on-flock-safetys-falcon-sparrow-automated-license-plate-reader/

    What I really want to see is where the image processing extracts the license plate text and try to pull some bobby tables actions. I have seen SQL references in how the local metadata processes are logging, so I think this could be an interesting defense.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      THAT.IT

  18. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Friday, 11-Jul-2025 12:50:23 JST kajer kajer
    in reply to

    Camera body has 8 deeply inset T-20 security torx.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/041/388/602/068/original/440c9b71a56947db.jpg
  19. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Friday, 11-Jul-2025 12:50:23 JST kajer kajer

    Miserable piece of shit is getting opened soon.

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/027/939/377/590/original/5f61136304d8237f.jpg

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/028/235/613/501/original/1b3e4081b9a6c9db.jpg
  20. Embed this notice
    kajer (kajer@infosec.exchange)'s status on Friday, 11-Jul-2025 12:50:22 JST kajer kajer
    in reply to

    Chips, unique ids cropped

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/124/771/940/203/original/06f9b87b7c6d9a67.jpg

    2. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/124/820/035/890/original/b865b7db933f191c.jpg

    3. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/702/124/875/624/975/original/624ccbc1a5544746.jpg
  • After
  • Before

User actions

    kajer

    kajer

    Computer Hacker / security professional / former CCNP / Amateur wannabe car mechanic / IPv6 advocate / Fiber Seeking Backhoe Owner / Useless Emoji Hater

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          137497
          Member since
          18 Jun 2023
          Notices
          194
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.