[Starlink] Dumping and extracting the SpaceX Starlink User Terminal firmware | COSIC

Gary E. Miller gem at rellim.com
Thu Jul 8 15:17:12 EDT 2021


Yo David!

On Thu, 8 Jul 2021 11:23:01 -0700 (PDT)
David Lang <david at lang.hm> wrote:

> they were able to read from the flash storage on the dish and get a
> root shell on it.
> 
> https://www.esat.kuleuven.be/cosic/blog/dumping-and-extracting-the-spacex-starlink-user-terminal-firmware/

Thanks for the link.  Some impressive hacking!

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
	gem at rellim.com  Tel:+1 541 382 8588

	    Veritas liberabit vos. -- Quid est veritas?
    "If you can't measure it, you can't improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.bufferbloat.net/pipermail/starlink/attachments/20210708/fbca6782/attachment.sig>


More information about the Starlink mailing list