Hacking a WiFi Fireworks Firing System - The FireFly Plus
Matt Brown Matt Brown
39.8K subscribers
12,128 views
0

 Published On Jul 5, 2024

In this video, we reverse engineer the binary protocol used to send firing commands to the FireFly Plus Firework Firing System.

IoT Hackers Hangout Community Discord Invite:
  / discord  

🛠️ Stuff I Use 🛠️

🪛 Tools:
XGecu Universal Programmer: https://amzn.to/4dIhNWy
Multimeter: https://amzn.to/4b9cUUG
Power Supply: https://amzn.to/3QBNSpb
Oscilloscope: https://amzn.to/3UzoAZM
Logic Analyzer: https://amzn.to/4a9IfFu
USB UART Adapter: https://amzn.to/4dSbmjB
iFixit Toolkit: https://amzn.to/44tTjMB

🫠 Soldering & Hot Air Rework Tools:
Soldering Station: https://amzn.to/4dygJEv
Microsoldering Pencil: https://amzn.to/4dxPHwY
Microsoldering Tips: https://amzn.to/3QyKhrT
Rework Station: https://amzn.to/3JOPV5x
Air Extraction: https://amzn.to/3QB28yx

🔬 Microscope Setup:
Microscope: https://amzn.to/4abMMao
Microscope 0.7X Lens: https://amzn.to/3wrV1S8
Microscope LED Ring Light: https://amzn.to/4btqiTm
Microscope Camera: https://amzn.to/3QXSXsb

About Me:
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems.

- Soli Deo Gloria

💻 Social:
twitter:   / nmatt0  
linkedin:   / mattbrwn  
github: https://github.com/nmatt0/

#hacking #iot #cybersecurity

show more

Share/Embed