Difference between revisions of "HackVerbatimPowerBay"

From RevSpace
Jump to navigation Jump to search
 
Line 1: Line 1:
 
{{Project
 
{{Project
 
  |Name=Hacking the Verbatim PowerBay Nas
 
  |Name=Hacking the Verbatim PowerBay Nas
  |Status=Cancelled
+
  |Status=Abandoned
 
  |Contact=User:FooBar
 
  |Contact=User:FooBar
 
  }}
 
  }}

Latest revision as of 17:35, 23 February 2014

Project Hacking the Verbatim PowerBay Nas
Status Abandoned
Contact User:FooBar
Last Update 2014-02-23

FooBar bought 2 Verbatim PowerBay nas boxes... These systems run Linux on an Arm5 system. The current goal is to 'root' the systems so we can run our own software on these.

Completed:

Next up:

  • Analyze filesystems/webinterface for exploit-vectors
  • Get telnetd/sshd running

or

  • Make backup of internal flash, make it restoreable
  • Install debian armel on internal flash or usb/sata

Hardware:

  • CPU: ARM926EJ-S [56251311] revision 1 (ARMv5TE), cr=00053977
  • Machine: Feroceon-KW
  • Memory: 256MB
  • Internal NOR Flash:
  • Ports: 5x SATA (4x internal, 1x e-SATA), 2x USB (front+back), 2x Gig-Ethernet
  • Operating System: Custom Linux
  • Hacker-friendlyness: Low


State: Cancelled, as the remaining Powerbay was bricked/scrapped.