H4ckd4ddy / bypass-sentry-safe

530 stars 27 forks source link

Update README.md #1

Closed sterlingbaldwin closed 2 years ago

sterlingbaldwin commented 2 years ago

Very cool write up! But its got a couple problems with the grammar. This commit cleans up the grammar, and fixes the tense of some of the verbs.

H4ckd4ddy commented 2 years ago

Definitely cleaner, thanks a lot for your help !

cyyccan commented 2 years ago

Great Project!!!! Any chance you can you post a detail photo of your soldering for the Atmega328 chip pins? Also, in the past I've converted a few Sentry Safe into Wifi only access using ESP8266. Maybe one day I'll get a chance to post the conversion

H4ckd4ddy commented 2 years ago

Hi @cyyccan, thanks for your feedback !

To solder the ATmega328, you juste have to connect power input (GND & VCC) a the pin defined in .ino sketch (pin 1 for me). You also have to flash the bootloader to use internal 8MHz quartz.

For my other repository concerning Fixed PCB and wifi features, I chose to split code verification and wifi features on 2 different microcontroller to avoid core code modification, in the case of a hypothetical OTA flaw for exemple. And also to keep the possibility to use only atmega for static code without any wireless hardware to reduce attack surface.

cyyccan commented 2 years ago

Hi Stellan,

    Fyi, I tried your code on a Sentry Safe model SFW123FTC it didn't

work

Shawn

On Tue, Jun 7, 2022, 2:15 PM Etienne Sellan @.***> wrote:

Hi @cyyccan https://github.com/cyyccan, thanks for your feedback !

To solder the ATmega328, you juste have to connect power input (GND & VCC) a the pin defined in .ino sketch (pin 1 for me). You also have to flash the bootloader to use internal 8MHz quartz.

For my other repository concerning Fixed PCB and wifi features https://github.com/H4ckd4ddy/fix-sentry-safe, I chose to split code verification and wifi features on 2 different microcontroller to avoid core code modification, in the case of a hypothetical OTA flaw for exemple. And also to keep the possibility to use only atmega for static code without any wireless hardware to reduce attack surface.

— Reply to this email directly, view it on GitHub https://github.com/H4ckd4ddy/bypass-sentry-safe/pull/1#issuecomment-1149121000, or unsubscribe https://github.com/notifications/unsubscribe-auth/ALJOFWAU6WE4G3ENREUMP7TVN6UVPANCNFSM5YAG4YQQ . You are receiving this because you were mentioned.Message ID: @.***>

H4ckd4ddy commented 2 years ago

Hi, I don't own this model, but it seem pretty similar to my SFW123ES. If you have a logic analyser, maybe you can capture serial communication between modules to check if there is any difference. Best regards

cyyccan commented 2 years ago

I have to apologize!!! I had a wire backwards ...but I can confirm that your project does work on Sentry SFW123 and SFW205... nice job!!!!

On Wed, Jun 22, 2022 at 2:10 AM Etienne Sellan @.***> wrote:

Hi, I don't own this model, but it seem pretty similar to my SFW123ES. If you have a logic analyser, maybe you can capture serial communication between modules to check if there is any difference. Best regards

— Reply to this email directly, view it on GitHub https://github.com/H4ckd4ddy/bypass-sentry-safe/pull/1#issuecomment-1162789143, or unsubscribe https://github.com/notifications/unsubscribe-auth/ALJOFWBKSNPYXVVRK3YR5GDVQLDAFANCNFSM5YAG4YQQ . You are receiving this because you were mentioned.Message ID: @.***>

-- Shawn Bahuaud

Calgary, AB Cell (587) 885-1589