Hacking a WiFi Fireworks Firing System - The FireFly Plus

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 56

  • @avri210984
    @avri210984 4 місяці тому +68

    Up next is flashing it with esphome and connecting it to home assistant 😉

    • @dowster593
      @dowster593 4 місяці тому +12

      going to update my morning automation to show me the weather _and_ launch a random pyro

    • @MonkGD
      @MonkGD 4 місяці тому +8

      “Hello Dispatch, i have someone breaking into my house; please look for the mortars firing off every 3 minutes, and when you are 2 minutes out, i will trigger a green smoke screen at the entrance of my house.”

  • @I_hu85ghjo
    @I_hu85ghjo 4 місяці тому

    It has been a while since i have enjoyed learning something. Such a gem of a channel. Keep on the great work!

  • @SailAway33
    @SailAway33 4 місяці тому

    Thanks Matt you fill a space on UA-cam that too few fill. I love learning what the devices around us are doing.

  • @Jennn
    @Jennn 4 місяці тому +2

    This should have so many more views.

  • @XYZ56771
    @XYZ56771 4 місяці тому +1

    really nice material, keep it up!

  • @AceTrainerBanjo
    @AceTrainerBanjo 4 місяці тому

    Hell yeah brother! Rock, Flag, and Eagle!

  • @bleh198
    @bleh198 4 місяці тому +3

    happy late 4th of jul matt!

  • @AngDeLuca
    @AngDeLuca 4 місяці тому +3

    Having this protocol, which is safety-critical, be of such low quality is concerning.

  • @fireteamomega2343
    @fireteamomega2343 4 місяці тому +12

    When you want revenge against your rich pyrotechnic neighbor... or a Mr beast set 😅

    • @mattbrwn
      @mattbrwn  4 місяці тому +5

      Judging by how buggy this SW is I'm going to guess there is no way Mr Beast is using this thing 😂

    • @fireteamomega2343
      @fireteamomega2343 4 місяці тому +1

      Good point but great exercise nonetheless. I love hardware hacking and that you're incorporating microcontrollers from what I've seen you are the real deal so subbed. It would be cool to see you build a portable standalone uart decoder with a text editor. I'm thinking an esp32 maybe a wroom or a capable dev model along with a 3.5" touchscreen. Then your parts list is a uart module a voltage detection module a 5v and 3v relay a logic level converter a battery pack and a mini keyboard module and of course a decent amount of programming and debug. 3d print up a custom case and you could definitely sell them.

    • @ChrisS-oo6fl
      @ChrisS-oo6fl 4 місяці тому

      @@mattbrwnI have a Racing (lap time) RF Transponder Id love to hack. We used to be able to purchase one and it always worked. Now you purchase them for the same $300 but they are all “subscription based” and you need to activate it. They constantly transmit the Transponder ID via RF as long is it’s charged and your service is valid. It never shuts off. Each year you connect the device Via Bluetooth and pay for your service duration of 6 months or a year. Then it’s always transmitting. You never connect Bluetooth agin so it must have an internal timer triggered by a Bluetooth command. After a year it stops transmitting and you have to pay another $125.. I’m not familiar with this world but I’d assume you could listen to the Bluetooth traffic and then spoof the command/ packet somehow . Think you could get one to transmit without service? Or permanently Transmit?

  • @Donn29
    @Donn29 4 місяці тому +3

    Is it possible that some of the bytes are different, for different serial numbers of devices? Meaning, what is the likelihood that that code would work on any machine?

    • @mattbrwn
      @mattbrwn  4 місяці тому +7

      It could be, however I never entered the SN or any other device information when setting up the app. So if anything in that data is unique it's getting pulled over that same protocol.

    • @fiskebent
      @fiskebent Місяць тому

      If you go back to the Java code, you can see that commands always start with 550000 followed by device id and the command. FFFF as device id probably means 'all devices'.

  • @d3stinYwOw
    @d3stinYwOw 4 місяці тому

    Great material! But definitely those scripts need some love LOL :D

  • @cybertechug7900
    @cybertechug7900 4 місяці тому

    Hello, greetings from Uganda. I have an isp nokia locked outdoor 4G reciever unit. How about we find means on how you can receive it and give it a try to log into it

  • @tonirhtdm
    @tonirhtdm 4 місяці тому

    Hello Mat can you explain how to root shell of a router and change the MAC id of a device.

  • @drumba
    @drumba 4 місяці тому +3

    thats damn cool

  • @arraybytes7214
    @arraybytes7214 4 місяці тому

    I am just curious if the checksum function does a check for a checksum of 16? I am not great at Java so I didn't notice if it did or not.

  • @SoldererOfFortune
    @SoldererOfFortune 4 місяці тому

    How many amps are they switching through what seems to be an audio jack/wire to get that element hot af?

  • @jsc0
    @jsc0 4 місяці тому +1

    Can't you capture the traffic on the PC, without ARP poisoning, if you use promiscuous mode in Wireshark? Assuming all the devices are on the same LAN.

    • @mattbrwn
      @mattbrwn  4 місяці тому

      No as the traffic between the mobile phone and firing device won't be routed to the PC.

  • @spotpkt
    @spotpkt 4 місяці тому

    The 16 may be a time constant for how long the primer fires. Shooting in the dark here.

  • @FreshaThen
    @FreshaThen 4 місяці тому

    What OS do you use? And is it run in a VM or bare metal?

  • @TornTech1
    @TornTech1 4 місяці тому

    20 seconds in an already enjoying it!!! "A Wifi Based Firework Launching device" sure!!! lets put explosives on a wifi network!

  • @ClumsyCars
    @ClumsyCars 4 місяці тому

    1:53 it looks like you can add a hc05 blue tooth module in that white square.

    • @mattbrwn
      @mattbrwn  4 місяці тому +2

      That is actually labeled "Lora"

    • @ClumsyCars
      @ClumsyCars 4 місяці тому

      @@mattbrwn that's neat. A google search seems to indicate a LORA module is a "radio modem"

    • @ErebuBat
      @ErebuBat 4 місяці тому

      LoraWAN for long distance control 🤔

  • @caseysmith5585
    @caseysmith5585 4 місяці тому +4

    I really like your videos but I just wish I knew what everything was 😂

    • @cognisent_
      @cognisent_ 4 місяці тому +1

      Not knowing what everything is means you still have more to learn! That's exciting!

  • @Sama_09
    @Sama_09 4 місяці тому

    Next we need a hacking video on hp printers 😂 hope they dont sue !!

  • @monad_tcp
    @monad_tcp 4 місяці тому

    2:19 oh no its upside down, the electrons are going to fall out as would say Dave Jones

  • @josh9761
    @josh9761 4 місяці тому

    10/10

  • @samuraidriver4x4
    @samuraidriver4x4 4 місяці тому

    Atleast they didnt just send a simple single digit over and atleast tried to do the right thing.
    Fun little device, anything else on the other side of the PCB or is the shift registers combined with transistors it?

    • @mattbrwn
      @mattbrwn  4 місяці тому +1

      No there is nothing of note on the back

    • @samuraidriver4x4
      @samuraidriver4x4 4 місяці тому

      @@mattbrwn interesting, pretty simple hardware then.

  • @tekvax01
    @tekvax01 4 місяці тому +2

    BTW... they are called fuses not wicks...

  • @yusuf9356
    @yusuf9356 4 місяці тому

    Can you reverse engineering a linux smart watch?

  • @italosoares69
    @italosoares69 4 місяці тому

    I got a bit scared seeing someone using such an outdated esp-idf from a dirty branch, in such critical devices. Imagine having you hand blown out by a bug that may habe been fixed 5 years ago. Hardware seems ok, but cant say much as i dont have one.

  • @danvasicek4122
    @danvasicek4122 4 місяці тому

    Hello this seems interesting. Happy 4th of july even tho here is fifth already, maybe for you too.

    • @mattbrwn
      @mattbrwn  4 місяці тому +2

      Lol yeah the first part of the vid was filled on the 5th and the outdoor part on the 4th.

  • @mikescholz6429
    @mikescholz6429 4 місяці тому

    The only responsible thing to do is to hook it up to a public network and make it fireable through an unauthenticated web interface 😈

  • @AUATUWVSH
    @AUATUWVSH 4 місяці тому

    ez
    byte[] command = new byte[]{...};
    int sum = 0;
    for(byte b : command){
    sum += b;
    }
    return sum & 0xFF;

  • @tubeDude48
    @tubeDude48 4 місяці тому

    Why type 'clear', just hit CTRL-L As a UNIX user back in the 90's, I HATED VIM, so I was so glad when Linux came along with 'nano', which is so much easier to move around in when editing, so why people still use VIM is beyond me!

    • @a97807
      @a97807 4 місяці тому

      Great thing about unix is there's always 10 ways to do the same thing. We all rely on muscle memory to do things. :wq

    • @monad_tcp
      @monad_tcp 4 місяці тому

      its because its a cult, I always found it funny that people use a PC pretending the PC keyboard its a PDP one that didn't had arrow keys, pageup/down, home/end or the numpad or even the function keys.
      the proper sequence of commands for a iBM PC really is the DOS one (whichever DOS you like, it doesn't need to be the Microsoft one).
      also, the idea of having two modes for the keyboard is ironic, you have to keep pressing ESC, I pretty much prefer to press CTRL to access my commands, does that means I'm a Emacs user ? who knows. I paid for my 108 keys keyboard and I use all of the keys, not just the ESC