A Detailed Look At Avoiding Secure Boot On A Google Nest Hub

A Detailed Look At Avoiding Secure Boot On A Google Nest Hub

Posted on


Installing Ubuntu On An Old Google Nest Hub

The bad news for those wanting to try this process is that Google found and patched the vulnerability used to bypass the secure boot on the Google Nest Hub, so chances are you will not be able to modify your device.  On the other hand, the process is so well documented it is worth a look just to learn more about how this sort of thing is accomplished.   They discuss not only the vulnerability but also what they were looking for on the hardware that allowed them to leverage it.

It starts with a look at the insides of the Google Nest Hub, to examine the charger and USB daughterboard pin-out to find a way to interface with the board.  Their examination revealed a UART port they could use to connect and send a variety of malformed data to see if they could find possible flaws in the chip or board.  Their fuzzing attack revealed a buffer overflow flaw, which was all the information they needed to be able to build some hardware to leverage the vulnerability and bypass the secure boot loader.

If you are interested in the full details of what they did, how they did it and what they used to accomplish it, check out the post at Hackaday.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *