

Identifying the chip’s model and serial number is essential and will provide us with the information we need in latter stages. These can be internal or external ports, the board’s chips, components, model and serial numbers. Once opened, we can then identify different points of interest within the device.

There are three easily removable housing screws situated on the underside of the device. The first step is to investigate the internal components of the device, starting by carefully taking apart the unit. Successfully replicating this attack scenario is the main goal of this challenge. Now that the smart remote is functional, an attacker who has physical access to the device may attempt to extract configuration or sensitive information loaded in memory. Start by connecting the smart remote to a Wi-Fi network and entering the Wi-Fi SSID and Passphrase within the e-Controls application. The application then subsequently tries to locate the device within the network and once it is found, a connection is established. In a real scenario, the device would likely already be set up. For the purpose of this challenge, setting up the device is required.
