[Starlink] Dumping and extracting the SpaceX Starlink User Terminal firmware | COSIC
Gary E. Miller
gem at rellim.com
Thu Jul 8 15:17:12 EDT 2021
Yo David!
On Thu, 8 Jul 2021 11:23:01 -0700 (PDT)
David Lang <david at lang.hm> wrote:
> they were able to read from the flash storage on the dish and get a
> root shell on it.
>
> https://www.esat.kuleuven.be/cosic/blog/dumping-and-extracting-the-spacex-starlink-user-terminal-firmware/
Thanks for the link. Some impressive hacking!
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can't measure it, you can't improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.bufferbloat.net/pipermail/starlink/attachments/20210708/fbca6782/attachment.sig>
More information about the Starlink
mailing list