AirPort Express Reverse Engineered, Private Key Obtained
Posted April 11, 2011 at 11:52am by iClarified
Developer James Laird has reverse engineered the Airport Express obtaining its private keys and releasing an emulator.
My girlfriend moved house, and her Airport Express no longer made it with her wireless access point. I figured it'd be easy to find an ApEx emulator - there are several open source apps out there to play to them. However, I was disappointed to find that Apple used a public-key crypto scheme, and there's a private key hiding inside the ApEx. So I took it apart (I still have scars from opening the glued case!), dumped the ROM, and reverse engineered the keys out of it.
Laird emulator is called ShairPort and is written in Perl. Third parties could use this information to enable iTunes streaming to a variety of different hardware devices.
Read More [via MacRumors]
My girlfriend moved house, and her Airport Express no longer made it with her wireless access point. I figured it'd be easy to find an ApEx emulator - there are several open source apps out there to play to them. However, I was disappointed to find that Apple used a public-key crypto scheme, and there's a private key hiding inside the ApEx. So I took it apart (I still have scars from opening the glued case!), dumped the ROM, and reverse engineered the keys out of it.
Laird emulator is called ShairPort and is written in Perl. Third parties could use this information to enable iTunes streaming to a variety of different hardware devices.
Read More [via MacRumors]