Smart Doorbell Security (Part 5) (LiteOS analysis)
In the previous part of this series, we analysed the bootloader of the device in order to understand whether the compression in use was trivial. We concluded it appeared to take place in hardware and as such, we didn’t have visibility of its underlying workings. This post intends to analyse the firmware of the device …