<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Posts on blog.aydindogm.us</title>
    <link>https://blog.aydindogm.us/posts/</link>
    <description>Recent content in Posts on blog.aydindogm.us</description>
    <generator>Hugo -- 0.151.2</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 14 Nov 2020 18:30:11 +0000</lastBuildDate>
    <atom:link href="https://blog.aydindogm.us/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Superbox Hacks V2 - Rewrite and finalize</title>
      <link>https://blog.aydindogm.us/posts/superbox-hacks-v2/</link>
      <pubDate>Sat, 14 Nov 2020 18:30:11 +0000</pubDate>
      <guid>https://blog.aydindogm.us/posts/superbox-hacks-v2/</guid>
      <description>&lt;p&gt;This is the second and final version of the learn-while-hacking styled review for my router. I thought there would be more of it in the beginning but pricing policy of my ISP and existing reverse engineering attempts on similar hardware made it less interesting for me to tinker with it further. And it will be less interesting and shorter compared to the first version.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s been a while and I do not even remember why did I choose shell scripting in the first place. So I decided to prefer something more powerful and easier to use. Both of these are subjective, of course. My previous attempts to web scrap some easy-to-parse services before, using Requests and BeautifulSoup also helped a little bit. I used Python to rewrite the old bash script.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Superbox Hacks V1 - Login and Fetch SMSes</title>
      <link>https://blog.aydindogm.us/posts/superbox-hacks-v1/</link>
      <pubDate>Tue, 26 May 2020 22:22:24 +0300</pubDate>
      <guid>https://blog.aydindogm.us/posts/superbox-hacks-v1/</guid>
      <description>&lt;h1 id=&#34;not-so-superbox&#34;&gt;Not so Superbox&lt;/h1&gt;
&lt;p&gt;I have received a &lt;a href=&#34;https://www.turkcell.com.tr/superbox&#34;&gt;Turkcell Superbox&lt;/a&gt; from my ISP a while ago. It&amp;rsquo;s a rebranded &lt;a href=&#34;https://www.imei.info/phonedatabase/118263-zte-mf286r/&#34;&gt;ZTE MF286R&lt;/a&gt;. I am a tin foil hat wearer and it&amp;rsquo;s a nightmare fuel for me to have a black box residing in my network which runs proprietary software and frequently phones home. Most of wireless routers are like this and my ISP provided router is not an exception.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s not a good aspect of the device to find out that there&amp;rsquo;s no chance to reflash its&amp;rsquo; firmware with some free alternatives like &lt;a href=&#34;https://openwrt.org/&#34;&gt;OpenWrt&lt;/a&gt; or &lt;a href=&#34;https://dd-wrt.com/&#34;&gt;DD-WRT&lt;/a&gt;, yet. So I decided to fiddle with it to see if I can adjust a thing or two in order to mitigate the possible unwanted behaviors.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
