Difference between revisions of "HackVerbatimPowerBay"

From RevSpace
Jump to: navigation, search
Line 1: Line 1:
  |Name=Hacking the Verbatim PowerBay Nas
  |Name=Hacking the Verbatim PowerBay Nas

Latest revision as of 18:35, 23 February 2014

Project Hacking the Verbatim PowerBay Nas
Status Abandoned
Contact User:FooBar
Last Update 2014-02-23
FooBar bought 2 Verbatim PowerBay nas boxes... These systems run Linux on an Arm5 system. The current goal is to 'root' the systems so we can run our own software on these.


Next up:

  • Analyze filesystems/webinterface for exploit-vectors
  • Get telnetd/sshd running


  • Make backup of internal flash, make it restoreable
  • Install debian armel on internal flash or usb/sata


  • CPU: ARM926EJ-S [56251311] revision 1 (ARMv5TE), cr=00053977
  • Machine: Feroceon-KW
  • Memory: 256MB
  • Internal NOR Flash:
  • Ports: 5x SATA (4x internal, 1x e-SATA), 2x USB (front+back), 2x Gig-Ethernet
  • Operating System: Custom Linux
  • Hacker-friendlyness: Low

State: Cancelled, as the remaining Powerbay was bricked/scrapped.