dustcloud

Xiaomi Smart Home Device Reverse Engineering and Hacking

Github星跟蹤圖

Welcome to our repository for reverse engineering and rooting of the Xiaomi Smart Home Devices. We provide you methods how to root your device without opening it or breaking the warranty seal (on your own risk).

The documentation of the devices (photos, datasheets, uart logs, etc) was moved to a new repo dustcloud-documentation

Please take a look at the Dustcloud Wiki, which also contains instructions on how to root and flash your device: (https://github.com/dgiese/dustcloud/wiki)

Talks

The content of the presentation differs from event to event. If you want to get an overview of the topics I am talking about, you find the overview here: Overview over all topics in presentations
[Sep 2018] I was invited by BeyondSecurity to give a talk at BeVX 2018 in Hong Kong: BeVX 2018 slides
[Aug 2018] I have given two talks at DEFCON26 (101-track and IoT-Village), both are recorded:
"Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices": DEFCON26 101-track Slides
"How-to modify ARM Cortex-M based firmware: A step-by-step approach for Xiaomi devices": DEFCON26 IoT Village Slides

[Jul 2018] I was on tour in Taiwan@HITCON14 Community: HITCON14 CMT slides
[Feb 2018] We had a talk at Recon BRX 2018. The presentation can be found here
[Dec 2017] Our talk at 34C3: Recording hosted at media.ccc.de, updated PDF.

Recommended resources / links

Flole App: alternative way to control the vacuum robot, instead of Xiaomi's Mi Home App. Is able to control and root your vacuum cleaner. Enables the use of various speech packages.
https://xiaomi.flole.de/

Roboter-Forum.com: German speaking forum with a lot of information about all sorts of robots. Contains special subforums for Xiaomi rooting. Primary resource for beginners.
http://www.roboter-forum.com/

Python-miio: Python library & console tool for controlling Xiaomi smart appliances.
https://github.com/rytilahti/python-miio

Interesting Robotics class project "ROS on Xiaomi Robot" (by N. Dave, S. Pozder, J. Tan and P. Terrasi) advised by Prof. Hanumant Singh@NEU Field Robotics Lab:
https://gitlab.com/EECE-5698-Group-7

Communication for the community

Yes, there is a telegram channel.

If you do not want to use telegram, you can use the Matrix.to channel
or our IRC-Channel #dustcloudproject on Freenode, which is bridged to the matrix channel.

In theory you can contact me via twitter.

I am communicating announcements over all channels.

Please inform yourself in the forums and with the howtos before you post in this channel. Otherwise your message is very likely to be ignored.

Contact

  • Dennis Giese <dgiese[at]mit.edu> / twitter
  • Daniel Wegemer <daniel[at]wegemer.com>

Press information

IoT will very likely become a very important topic in the future.
If you like to know more about IoT security, you can visit me at Northeastern University in Boston, US. Please contact me.

Acknowledgements:

Prof. Matthias Hollick at Secure Mobile Networking Lab (SEEMOO)

SEEMOO logo

Prof. Guevara Noubir (CCIS, Northeastern University)

CCIS logo

Ilfak Guilfanov / Hex-Rays: for their great tool "IDA Pro"

Hex-rays logo

Media coverage:

主要指標

概覽
名稱與所有者dgiese/dustcloud
主編程語言C
編程語言Shell (語言數: 9)
平台
許可證GNU General Public License v3.0
所有者活动
創建於2017-12-23 18:05:46
推送於2024-02-16 21:41:35
最后一次提交2023-08-23 11:36:22
發布數3
最新版本名稱0.3 (發布於 )
第一版名稱0.1 (發布於 )
用户参与
星數2.2k
關注者數118
派生數259
提交數526
已啟用問題?
問題數204
打開的問題數73
拉請求數120
打開的拉請求數8
關閉的拉請求數17
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?