A Detailed Look At Avoiding Secure Boot On A Google Nest Hub

A Detailed Look At Avoiding Safe Boot On A Google Nest Hub

Posted on

Putting in Ubuntu On An Outdated Google Nest Hub

The dangerous information for these wanting to do this course of is that Google discovered and patched the vulnerability used to bypass the safe boot on the Google Nest Hub, so likelihood is you won’t be able to change your gadget.  Then again, the method is so nicely documented it’s price a glance simply to be taught extra about how this form of factor is completed.   They talk about not solely the vulnerability but additionally what they had been on the lookout for on the {hardware} that allowed them to leverage it.

It begins with a take a look at the insides of the Google Nest Hub, to look at the charger and USB daughterboard pin-out to discover a technique to interface with the board.  Their examination revealed a UART port they may use to attach and ship quite a lot of malformed information to see if they may discover potential flaws within the chip or board.  Their fuzzing assault revealed a buffer overflow flaw, which was all the knowledge they wanted to have the ability to construct some {hardware} to leverage the vulnerability and bypass the safe boot loader.

If you’re within the full particulars of what they did, how they did it and what they used to perform it, take a look at the publish at Hackaday.

Supply hyperlink

Leave a Reply

Your email address will not be published. Required fields are marked *