![]() This project is a fantastic example of the kind of reverse engineering you can pull off with even a cheap logic analyzer and a keen eye, but also perfectly illustrates the fact that having physical access to a device largely negates any security measures the manufacturer tries to implement. The only thing left to do was crack it open and sniff the PIN with a logic analyzer. Unfortunately, the terminal has no function to change the PIN and none of the defaults he tried seemed to work. ![]() Wanted to reuse the SIM card that came with a ZTE WF721 wireless terminal he got from AT&T, but as he expected, it was locked to the device.
0 Comments
Leave a Reply. |