Here is the full Philips Sonicare Head NFC Password Calculation 🥳
How I got there you can find in this Thread. 1/N
Since lately the RF sniffing of the NFC Password was blogged by Cyrill Künzi kuenzi.dev/toothbrush/ I could not stop thinking on how to crack it.
So this afternoon I bought the cheapest available Toothbrush with the NFC feature (40€) and opened it up.
Quite simple to open!
Inside of this version we can find an
NXP NFC Reader MFRC630
and an MindMotion MM32F001 Cortex M0 SoC
16Kb Flash and 2Kb RAM
Plus nicely labeled Debug Pins...
Ok how much on the bet that it will be locked... but lets see...
Very unusual, after hitting connect I was greeted by a happily connected SWD Flasher which was able to read the full flash without problems 🥳
wonder who slept there at Philips...
After an exiting reverse engineering session in IDA everything came together and the NFC Password calculation was found.
And as shown already its a very simple CRC Calculation over the NFC Tag UID and the Manufacturing String that is in NFC Tag and also printed on the Brush Head
That's all 🙂
Finally that thought is satisfied!
You can find this story on YouTube as well:
Another Payment Terminal from @SumUp this time way more expensive with 100€ new but also more advanced overall with included 3G Simcard, Printer, Wifi, and Touchscreen Display.
Lets do a teardown... 1/x
The main device has 2 torx screws in the back.
Loosen them will directly trigger the tamper detection which puts the device into a soft lock state.
So lets continue
The internals reveal a big 1200mAh LIPO and a Quectel EG91-EX LTE Module
Also the tamper detection is visible
After removing 6screws we find the interesting parts
More Tamper detection
- ESP8266 WiFi Module
- nRF52832 BLE Module
- NXP CLRC663 NFC Chip
- MAX32552 ARM M3 Secure SOC
Quite similar internals to the BLE Terminal from last week, understandable decision
How i Hacked 2.5 million IP Cameras in just 3 nights
DISCLAIMER: This story may or may not be true for legal reasons.
About 2 years ago a friend of mine bought himself a IP Camera for his garage.
Just to test how far i can get i asked for only the App this Cam uses... 1/x
After decompiling and looking into the app with "Show Java"(Android App) it turned out that there are Assets with to much info's in like App Keys and Email credentials for their Support function 😖 first fail!
2/x
Unfortunately the Email credentials where real and still active
There where a lot of Support requests, every email contained the App database from the phone sending the mail (paperclip symbol)
These databases did include the login data and password in plain text 😖 Next fail! 3/x