mirror of
https://github.com/tuya-cloudcutter/tuya-cloudcutter.git
synced 2026-02-19 21:51:18 +01:00
host specific changes
This commit is contained in:
@@ -1,6 +1,6 @@
|
||||
# Raspberry Pi
|
||||
|
||||
## Generic (2W, 3, or 4)
|
||||
## Generic (Zero 2W, 3, or 4)
|
||||
|
||||
Use these instruction if:
|
||||
|
||||
@@ -30,13 +30,13 @@ managed=true
|
||||
6. Install git `sudo apt install git`
|
||||
7. Clone tuya-cloudcutter repo `git clone https://github.com/tuya-cloudcutter/tuya-cloudcutter`
|
||||
8. (Optional as independent step) In the cloudcutter directory, build the docker image `sudo docker build --network=host -t cloudcutter .`
|
||||
9. Run cloudcutter with `sudo ./run_detach.sh -r ...`
|
||||
9. Run cloudcutter with `sudo ./run_detach.sh -r ...` (refer to [usage instructions](./INSTRUCTIONS.md))
|
||||
|
||||
## Pi Zero W2 with SSH over USB
|
||||
## Pi Zero 2W with SSH over USB
|
||||
|
||||
Use these instructions if:
|
||||
|
||||
- You would like to SSH to the Pi Zero W2 using USB
|
||||
- You would like to SSH to the Pi Zero 2W using USB
|
||||
|
||||
Steps:
|
||||
|
||||
@@ -73,4 +73,4 @@ unmanaged-devices=interface-name:usb*
|
||||
9. Install git `sudo apt install git`
|
||||
10. Clone tuya-cloudcutter repo `git clone https://github.com/tuya-cloudcutter/tuya-cloudcutter`
|
||||
11. (Optional as independent step) In the cloudcutter directory, build the docker image `sudo docker build --network=host -t cloudcutter .`
|
||||
12. Run cloudcutter with `sudo ./run_detach.sh -r ...`
|
||||
12. Run cloudcutter with `sudo ./run_detach.sh -r ...` (refer to [usage instructions](./INSTRUCTIONS.md))
|
||||
|
||||
@@ -15,7 +15,7 @@ Please be aware that this software is experimental and provided without any guar
|
||||
If you're curious about the vulnerability and how the exploit chain works, here's the [detailed writeup](https://rb9.nl/posts/2022-03-29-light-jailbreaking-exploiting-tuya-iot-devices/) and the [proof of concept script](./proof-of-concept/poc.py).
|
||||
|
||||
## Usage
|
||||
Check out [usage instructions](./INSTRUCTIONS.md) and [some host specific instructions for setups on devices like the RPi Zero 2W](./HOST_SPECIFIC_INSTRUCTIONS.md)
|
||||
Check out [usage instructions](./INSTRUCTIONS.md) and [some host specific instructions for setups on devices like a Raspberry Pi](./HOST_SPECIFIC_INSTRUCTIONS.md)
|
||||
|
||||
## Contribution
|
||||
We'd be happy to receive your contributions! One way to contribute if you already know your way around some binary exploitation or would like to get your hands into it is by building device profiles to support more exploitable devices. Check out the [detailed writeup](https://rb9.nl/posts/2022-03-29-light-jailbreaking-exploiting-tuya-iot-devices/) for the information about the vulnerability and exploit chain. Example device profiles can also be found in the `device-profiles` directory.
|
||||
|
||||
Reference in New Issue
Block a user