/dustcloud

Xiaomi Smart Home Device Reverse Engineering and Hacking

Primary LanguageCGNU General Public License v3.0GPL-3.0

Welcome to our repository for hacking and rooting of the Xiaomi Smart Home Devices. We provide you methods how to root your device without opening it or breaking the warranty seal (on your own risk).

We moved the documentation of the devices (photos, datasheets, uart logs, etc) to a new repo dustcloud-documentation

Please take a look at the Dustcloud Wiki: (https://github.com/dgiese/dustcloud/wiki)

Talks

Recording of our talk at 34C3 (2017): https://media.ccc.de/v/34c3-9147-unleash_your_smart-home_devices_vacuum_cleaning_robot_hacking

You can find a more detailed version of our 34c3 presentation with more details here.

We had a talk at Recon BRX 2018, the recording should be published in the next few months: (https://recon.cx/2018/brussels/)

The Recon presentation can be found here

Recommended ressources / links

Flole App: alternative way to control the vacuum robot, instead of Xiaomi's Mi Home App. Is able to control and root your vacuum cleaner. Enables the use of various speech packages. https://xiaomi.flole.de/

Roboter-Forum.com: German speaking forum with a lot of information about all sorts of robots. Contains special subforums for Xiaomi rooting. Primary ressource for beginners. http://www.roboter-forum.com/

Python-miio: Python library & console tool for controlling Xiaomi smart appliances. https://github.com/rytilahti/python-miio

Communication for the community

Yes, there is a telegram channel. https://t.me/joinchat/Fl7Mm0iEV7Pgf9ngDyly-g

If you do not want to use telegram, you can use the following channel: https://matrix.to/#/#dustcloud:matrix.org

We are communicating announcements over both channels.

Please inform yourself in the forums and with the howtos before you post in this channel. Otherwise your message is very likely to be ignored.

Contact

  • Dennis Giese <dgi[at]posteo.de>
  • Daniel Wegemer <daniel[at]wegemer.com>

Press information

Iot will very likely become a very important topic in the future. If you like to know more about IoT security, you can visit us at Northeastern University in Boston, US (Dennis) or at the TU Darmstadt, DE. Please contact us.

Acknowledgements:

Prof. Matthias Hollick at Secure Mobile Networking Lab (SEEMOO)

SEEMOO logo

Prof. Guevara Noubir (CCIS, Northeastern University)

CCIS logo

Ilfak Guilfanov / Hex-Rays: for their great tool "IDA Pro"

Hex-rays logo

Media coverage: