This video documents Matt Brown's attempt to obtain a root shell on a Hikvision security camera. Initial attempts using bootloader access fail, leading to a chip-off firmware extraction as the next step. The video details the process of removing the eMMC chip and extracting the firmware.
This video details Matt Brown's process of obtaining a root shell on a Hikvision security camera. He initially attempts to modify environmental variables within the bootloader but finds them read-only. This necessitates a chip-off firmware extraction, which is the focus of the video. The video shows the physical removal of the eMMC chip and subsequent firmware extraction and analysis.
boot args environmental variable within the Hikvision security camera's U-boot bootloader is read-only, preventing direct modification to achieve root shell access via standard bootloader commands (set env, env).boot args, Matt performs a chip-off extraction. This involves:
strings command: To search for readable text strings within the firmware image, revealing potentially relevant information, like boot arguments.boot args location and format.binwalk: An open-source tool used for analyzing various firmware file types to discover embedded files and file systems within the extracted firmware image.diff command: To compare the original and modified firmware files to confirm changes.boot args within the firmware image and plans to modify them by replacing /linux rc with /bin sh in a subsequent video, enabling a root shell. The modification considers the null termination of the string and avoids adding extra characters.boot args variable)/linux rc with /bin sh in the boot args string.)