host specific changes

This commit is contained in:
tony
2022-04-12 14:10:14 -04:00
parent d4de49b5fb
commit 3db8fadeba
2 changed files with 6 additions and 6 deletions

View File

@@ -1,6 +1,6 @@
# Raspberry Pi
## Generic (2W, 3, or 4)
## Generic (Zero 2W, 3, or 4)
Use these instruction if:
@@ -30,13 +30,13 @@ managed=true
6. Install git `sudo apt install git`
7. Clone tuya-cloudcutter repo `git clone https://github.com/tuya-cloudcutter/tuya-cloudcutter`
8. (Optional as independent step) In the cloudcutter directory, build the docker image `sudo docker build --network=host -t cloudcutter .`
9. Run cloudcutter with `sudo ./run_detach.sh -r ...`
9. Run cloudcutter with `sudo ./run_detach.sh -r ...` (refer to [usage instructions](./INSTRUCTIONS.md))
## Pi Zero W2 with SSH over USB
## Pi Zero 2W with SSH over USB
Use these instructions if:
- You would like to SSH to the Pi Zero W2 using USB
- You would like to SSH to the Pi Zero 2W using USB
Steps:
@@ -73,4 +73,4 @@ unmanaged-devices=interface-name:usb*
9. Install git `sudo apt install git`
10. Clone tuya-cloudcutter repo `git clone https://github.com/tuya-cloudcutter/tuya-cloudcutter`
11. (Optional as independent step) In the cloudcutter directory, build the docker image `sudo docker build --network=host -t cloudcutter .`
12. Run cloudcutter with `sudo ./run_detach.sh -r ...`
12. Run cloudcutter with `sudo ./run_detach.sh -r ...` (refer to [usage instructions](./INSTRUCTIONS.md))

View File

@@ -15,7 +15,7 @@ Please be aware that this software is experimental and provided without any guar
If you're curious about the vulnerability and how the exploit chain works, here's the [detailed writeup](https://rb9.nl/posts/2022-03-29-light-jailbreaking-exploiting-tuya-iot-devices/) and the [proof of concept script](./proof-of-concept/poc.py).
## Usage
Check out [usage instructions](./INSTRUCTIONS.md) and [some host specific instructions for setups on devices like the RPi Zero 2W](./HOST_SPECIFIC_INSTRUCTIONS.md)
Check out [usage instructions](./INSTRUCTIONS.md) and [some host specific instructions for setups on devices like a Raspberry Pi](./HOST_SPECIFIC_INSTRUCTIONS.md)
## Contribution
We'd be happy to receive your contributions! One way to contribute if you already know your way around some binary exploitation or would like to get your hands into it is by building device profiles to support more exploitable devices. Check out the [detailed writeup](https://rb9.nl/posts/2022-03-29-light-jailbreaking-exploiting-tuya-iot-devices/) for the information about the vulnerability and exploit chain. Example device profiles can also be found in the `device-profiles` directory.