HackVerbatimPowerBay
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
Project Hacking the Verbatim PowerBay Nas | |
---|---|
Status | Abandoned |
Contact | User:FooBar |
Last Update | 2014-02-23 |
FooBar bought 2 Verbatim PowerBay nas boxes... These systems run Linux on an Arm5 system. The current goal is to 'root' the systems so we can run our own software on these.
Completed:
- Get console access, thnx to LotLabor: https://www.loetlabor.org/Hacking_Verbatim_Powerbay
- Dump filesystems (FooBar)
Next up:
- Analyze filesystems/webinterface for exploit-vectors
- Get telnetd/sshd running
or
- Make backup of internal flash, make it restoreable
- Install debian armel on internal flash or usb/sata
Hardware:
- CPU: ARM926EJ-S [56251311] revision 1 (ARMv5TE), cr=00053977
- Machine: Feroceon-KW
- Memory: 256MB
- Internal NOR Flash:
- Ports: 5x SATA (4x internal, 1x e-SATA), 2x USB (front+back), 2x Gig-Ethernet
- Operating System: Custom Linux
- Hacker-friendlyness: Low
State: Cancelled, as the remaining Powerbay was bricked/scrapped.