Difference between revisions of "Nanoleaf Light Panels - Hacking"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 9: Line 9:
Hardware Version: 1.6.2
Hardware Version: 1.6.2


* [[nanoleaf light panels smarter kit]]
Link: [[nanoleaf light panels smarter kit]]


===Amazon Echo Dot===
===Amazon Echo Dot===
Line 15: Line 15:
Firmware: 618571520
Firmware: 618571520


* [[Amazon Echo Dot]]
Link: [[Amazon Echo Dot]]


== Description ==
== Authors ==


=== Step 1 ===
The project was conducted for the course [[Vertiefendes Wahlfachprojekt]] in the winter term 2019 by following bachelor students:


Enter these commands in the shell
* Ebubekir Öcalan
* Asmir Turanovic
* Kevin Falmbigl


echo foo
== Results ==
echo bar


=== Step 2 ===
* A [[:File:Wahlfachprojekt_Nanoleaf_Light_Panels.pdf|documentation]] about the Man in the Middle attack against the Nanoleaf Light Panels.
* The [[:File:Capture Files BLE.zip|capture files]] produced with Wireshark during the disrupting attack.


Make sure to read
* War and Peace
* Lord of the Rings
* The Baroque Cycle


== Used Hardware ==
== Used Hardware ==
Line 43: Line 40:
* [[Vertiefendes Wahlfachprojekt]] (2019)
* [[Vertiefendes Wahlfachprojekt]] (2019)


== References ==
* https://wikipedia.org
* https://google.com


[[Category:Documentation]]
[[Category:Documentation]]

Revision as of 08:29, 26 February 2019

Summary

These are the results of a student project regarding Hacking the Nanoleaf Light Panels. The Nanoleaf Light Panel are controlled by Amazon Alexa.

Requirements

Nanoleaf Light Panels

Firmware 2.3.0

Hardware Version: 1.6.2

Link: nanoleaf light panels smarter kit

Amazon Echo Dot

Firmware: 618571520

Link: Amazon Echo Dot

Authors

The project was conducted for the course Vertiefendes Wahlfachprojekt in the winter term 2019 by following bachelor students:

  • Ebubekir Öcalan
  • Asmir Turanovic
  • Kevin Falmbigl

Results

  • A documentation about the Man in the Middle attack against the Nanoleaf Light Panels.
  • The capture files produced with Wireshark during the disrupting attack.


Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses