Fully unlock your Bobcat 300 - HNT Miner
Introduction
I have always been a cryptocurrency enthusiast, one day I discovered this cryptocurrency called Helium (HNT), which is a very particular cryptocurrency and different from the usual ones, it is a cryptocurrency developed for IoT applications via the LoRaWAN network. The token is not generated through PoW like BTC but through PoC with this device called "Hotspots" which are basically the mining part of the Network.
Hotspots provide miles of wireless network coverage to millions of devices around you using Helium LongFi, and you get rewarded in HNT for that. And because of an innovative proof-of-work model (we call it the "Coverage Test"), your Hotspot uses only 5W of power.
https://www.helio.com/mine
Obviously the function is quite complex and articulate, I'm not the best person to explain it, but I invite you towe informbecause it's very interesting and could be a very good technology for the future of IoT.
all very cool right? But one of the first things that disappointed me is that to do this mining currently you cannot use your computer connected to a simple LoRa card or create your own miner like with a Rasperry pi, but you must necessarily use a dedicated miner made by a company . authorized by the project management company.
Why?..

But despite that, moved by the hype, I decided to try this "revolution" of cryptocurrencies, not wanting to wait 6 months for delivery ordering on official websites, I went on Ebay and bought one with 24h shipping, spending practically twice as much. original price. I bought a Bobcat 300 miner, which has to be one of the best miners on the market.
I also bought a nice powerful antenna, installed everything on the roof of my house, created a VPN system on my network to publicly expose a specific port needed for mining.
At first everything worked very well and the first mining profits arrived, not too high and lower than I expected, but acceptable.
But after a few months mining profits were well below zero, it seems that everyone in my area decided to mine HNT as well. Anyway, among so many problems and ridiculous profits I realized that I will never recover my investment, so at least let's see what I get...
Device and security concerns
The HNT miner usually needs to publicly open TCP port 44158 to communicate with the HNT blockchain, so port forwarding is required for it to work properly, and this will expose our private IP, which is not good, but you can use a VPN with a VPS, this should be best practice
But do we really manufacture this device?
After some research, I found this photo of an old model, where "EasyLinkin" is written as the manufacturer on the back:https://fccid.io/2AZCK-MINER300/External-Photos/External-Photos-5413181
So the real factory is this Chinese company: http://www.easylinkin.net/, we can see from the homepage that there is a device identical to our Bobcat 300. This product is used in industrial level for different applications and modes. For this reason, on the motherboard we find several slots for things not related to HNT or empty, such as GPS, etc.
On the internet there are scary stories of people who also opened port 22 and found themselves in their own compromised network.

Clearly, Bobcat support can access our device remotely if port 22 is exposed...
Then unknown people from an unknown country (probably China) can access our personal device and do any operation... other devices on the network, try to hack into them, steal private data or compromise our network in general. Or whoever has that SSH key can use these devices to create a botnet and carry out malicious attacks from our ISP.
This raises several questions: Who has access to SSH keys? Are these keys unique to each device or is it just one for all? How are these keys stored? Who has access to it?
So, with all these security concerns, it's time to take full control of this miner and stop anyone from accessing it without permission. But before continuing with this reading, make sure your Bobcat is not currently showing port 22 on the Internet.
blow
Warning: The following procedure may void the device's warranty and potentially break the device or compromise its behavior.
Proceed at your own risk, I am not responsible for any damage you may cause.
Before starting:
- This guide tries to be as simple and clear as possible for everyone, but some IT knowledge assumptions are accepted, especially about using a Unix shell.
- Not sure if the technique below works on all Bobcat 300s as there are multiple hardware versions and revisions so it may not work on your device or the exploit has been fixed with a firmware update.
- This was made on board: TU-GM1002Z, RockChip RK3566 CPU, firmware version: V.1.0.2.91
- Pro Tips: If there is no recovery button on your device's motherboard but there are 'holes' where it should be or somewhere similar, if you have the skills, try soldering a button :)
The device offers some open TCP ports, we have port 22 for SSH, port 80 for the web interface and port 44158 which is the main port for the HNT protocol.
The web server doesn't expose many specific functions or pages that could be vulnerable to an exploit, and the other ports don't offer anything interesting.
So, it's time to see what's under the hood. The interesting parts are the "recovery" button and the 2 micro USB ports "USB_OTG" and "DEBUG". Initially I thought that debugging was the most important thing, but actually it's the "USB_OTG" we are interested in. The "DEBUG" port can probably be used to upload and download firmware, but the manufacturer's drivers and applications are required.

Disconnect all cables from the device, including the power supply, press and hold the "recovery" button while inserting the power cable and wait a few seconds with the button pressed before releasing it.
If after that the light on the LoRa antenna board turns on and the main LED remains off, it means that we have successfully entered recovery mode.
Now, just insert a micro USB cable into the "USB_OTG" port (the one exposed on the panel, not the internal "debug" port) and connect it to your computer. In the computer's device manager, we will find a device "Android ADB interface" connected.

If no device is found or the computer cannot identify the device type, it may be helpful to install theRockChip controlleror other useful drivers for the ADB interface.
LosAndroid Debug Bridge (ADB)is a versatile command line tool that allows you to communicate with a device, basically it is a tool that creates a UNIX-like shell on an Android/ARM based device. We just need to download the Android SDK tool fromhereand open cmd in the directory containing adb.exe.
First, use the command "adb devices
" to get the list of devices, if everything worked, we should have a device in the results. And now just run the "shell adb
" and as a result we will have a UNIX like shell directly in the miner as we can see in "admin@bobcatminer"

This shell has the Unix user called 'admin' and we have root permissions, but it's an incomplete operating system, this is a recovery, it's a fake operating system. used for debugging purposes. We can have fun exploring the file system, but there isn't much, the only interesting thing is inside the /userdata directory, where the scripts and test results performed at the factory to verify the device's operation are present, as well as the keys/certificates (generated based on the MAC address of the device) which at first glance seem to be used for OpenVPN (maybe for OTA update(?), very interesting... but that's not what we're interested in unlocking that device, maybe it'll come back on another time to take a look at this folder...
After exploring a bit, I found that the disk is partitioned and divided into multiple sectors to check this, just use the commandfdisk - l
to see the partitions inside the disk.

By far the most interesting partition is the one called "rootfs", which should contain the entire filesystem and none of them implement any security checks or encryption, so... why not try just mounting them?
Use the command "montar /dev/block/by-name/rootfs /mnt/sdcard
" to mount the "rootfs" sector in the /mnt/sdcard folder (you can use any empty folder).

Now in this folder we mount the actual device file system which will be used in its normal operation and we have full read and write permissions so we can modify it to our liking. There are several interesting files and folders, but our goal is to take control of the device and we can explore the file system later once we've established solid access.
So I'll get straight to the point.
As we said before, there is an SSH port, let's check who has access to this port with the command "cat /mnt/sdcard/home/admin/.ssh/authorized_keys"

This file contains a public key basically anyone who has the corresponding private key can login directly from SSH and have full control of the device, this must just be the manufacturing company for support reasons right?
Also, it would be interesting to know if the keys are uniquely generated for each device or if it is the same for each device, so whoever finds this key will possibly compromise all the miners and create a botnet.
If we replace this key with another one under our control, we will have access to the SSH service with the user administrator. To do this, we can use PuttyGen to create our keyring and use the echo command to replace it on the authorized host. You can also add it after what's already in use if you want to keep it for support (or if you like the idea of a stranger being able to connect to your device :D ) or just make a backup and change it if needed. 🇧🇷

After generating the keys, use the "echo "ssh-rsa AAAAB3Nza…….." > /mnt/sdcard/home/admin/.ssh/authorized_keys
" by inserting in it the output of putty gen which is the public key but already structured for this file, and save the corresponding private key with the "Save Private Key" button.
To enter the device it is established that in addition to the private key, the user password is also required, so in this case the administrator user password, we can try to force the user password present in the file shadow. or we can simply modify the file/mnt/sdcard/home/admin/.ssh/autorizadas_claves
change the last string from "Public key, password authentication methods
" one "Public key authentication methods
"
For this, we modified the SSH service configuration file, establishing only the exchange of certificates without the password as an authentication method.
And now restart the device and reconnect as usual, it will start its normal work no difference... But now you can use Putty, or your favorite remote connection tool, to SSH to your normal IP and set the authentication method. the private key generated by us and as an admin user.

By doing this we have full control of the device as root user, we can see everything and fully control it; so in case HNT mining becomes useless one day, we can at least use this device as a personal one. miniserver :)
conclusion
Unfortunately due to lack of time and experience on this type of device I didn't delve into exploring the file system in depth, it will be interesting to see if someone finds something interesting inside or finds ways to improve the device. It will certainly be interesting to see what the community comes up with.
And please, before putting any strange device on your home network, check well what it is and if it can be a cyber attack vector and, above all, never expose ports (such as 22) freely on the Internet if you don't have full control access. from that
If you have any problems or you are unable to follow this guide, please contact me directly, I will try to respond as soon as possible.
Thanks for reading.
ade
12/12/2022 15:16:16
Witch command change rssi increase or decrease rssi
jorge
14/11/2022 22:37:04
Excellent article. First of all, I'm sorry that your Twitter account has been deleted. I would love to continue. Second, I'm trying to redirect my Bobcat to be like a Raspberry IP. Any advice on this?
hammer blow
11/08/2022 07:34:10
No more ADB running on Bobcat due to firmware changes. But there might be another way to get root/ssh access. It's about UART and Adrian's "rooted" miner. You just need to use JohnTheRipper to force the password (using "etc/shadow"). Knowing the username ("admin") and password, we could gain root access simply using a UART serial connection. Because after boot there is a command prompt asking for username and password. The UART is easily accessible via the "Debug-USB" port (1.5M baud rate, 3.3V, 8-bit, no parity, no flow control). The RX and TX pins are labeled incorrectly on the PCB! This means you will need to connect RX to RX and TX to TX on your FTDI adapter. Once you've established the serial connection (via PuTTy or MobaXTerm) and the miner has finished starting, you'll end up with a shell prompt asking for your username and password. Successful login will grant control over the Linux file system (OP-TEE) and SSH access can be gained. So I hope Adrian reads this comment and can brute force the admin password please :-)
Steve
10/08/2022 17:28:25
I have mine showing up in device management, but adb doesn't find a connected device when running the command, unfortunately! Any idea?
hammer blow
30/07/2022 17:15:46
Hello, I have the Bobcat Rev. G285-v1.0 (RK3566) and the recovery and reset buttons are located where the "DEBUG-USB" port is on your image. And the "DEBUG-USB" port is located near the miner led. I tried different "boot methods" but they all resulted in the same problems with ADB. Startup method 1: When I power on while holding down the recovery button, the miner light comes on for less than a second and then goes off. No led appears on the LoRa hub. Boot method 2: When I power on while pressing the Recovery button AND the USB-OTG is already connected to a computer, the miner LED comes on and stays on (white). No led appears on the LoRa hub. Result: In both cases, LINUX can identify a connected USB device (ID 2007:350a) named "Fuzhou Rockchip Electronics Company". But ADB doesn't see this device so it can't connect to it. Editing "adb_usb.ini" (adding Vendor ID "x02207") and also editing "51-android.rules" (SUBSYSTEM=="usb", ATTR{idVendor}=="2207", MODE="0666") I do not help. ADB refuses to see the device. Windows, with the latest ADB and Rockchip drivers installed, also recognizes a "Rockusb device" (VID2007 PID350a), categorized as "class for rockusb devices". But ADB cannot see the device/connect to this device. Any ideas what to try next, to put the miner into recovery mode? Yours sincerely
unknown
30/07/2022 14:01:33
Yes, the TU-GM1001A exposes a RockChip "maskrom mode" when the recovery button is pressed at startup. You can use this tool to get information about the card... but it doesn't have an adb interface :-|https://github.com/rockchip-linux/rkbin/archive/master.zip Wouldn't write anything as the software is unknown at this time.
+120,83dBm
2022-07-08 18:05:04
Thanks, great article. It was exactly what I needed to fix my Bobcat that had bad FS on the user data partition. I can confirm that the ssh public key I found on my device under author_keys appears to match the one shown in the screenshot.
Tr4nc3
08/07/2022 17:39:18
Any chance you could try to confirm if this is possible in newer versions of bobcat? I have the TU-GM1001A model board which I assume uses a PX30, connecting the cable to USB. I have a Rockchip device, not an Android ADB interface.
FAQs
What is the default SSH password for Bobcat miner? ›
Bobcat Miner 300 Helium miner:
Username: bobcat. Password: miner.
Opening port 22 allows Bobcat to remotely connect to your hotspot to run diagnostics including firmware updates, address Helium Miner issues, and more in cases where we can't remotely access your hotspot normally through our VPN service.
How do I find my SSH key password? ›- In Finder, search for the Keychain Access app.
- In Keychain Access, search for SSH.
- Double click on the entry for your SSH key to open a new dialog box.
- In the lower-left corner, select Show password.
- You'll be prompted for your administrative password. ...
- Your password will be revealed.
SSH user authentication by password is enabled by default, with the username/password being “anonymous”.
What Helium ports need to be open? ›We recommend enabling TCP Ports 44158 in both directions in your router. Check your Router's manufacturing instructions on how to open ports 44158. For support and firmware updates, we will need ports 22 and 443 open Outbound.
Do I need to port forward for Helium miner? ›Port Forwarding
Before launching the Miner, you will want to configure ports on your network to forward two ports: 44158/TCP: the Miner communicates to other Miners over this port. The networking logic knows how to get around a lack of forwarding here, but you will get better performance by forwarding the port.
Port 443 is the default port for HTTPS data, the secure version of HTTP, Port 22 is used for Secure Shell data, the text-based console used primarily with Linux/Unix systems and network devices, Port 3389 is assigned for RDP (Remote Desktop Protocol), primarily used for accessing the console of Windows-based systems.
How much does a Bobcat Miner 300 make a day? ›Let's assume that you're buying a bobcat 300. After taxes, shipping, and taxes it comes out to $526 bucks. If I look at my own earnings, I'm making around 0.04 helium per day, but the average earnings on the network are around 0.097 helium per day. The average daily production is a big factor in your profitability.
How much do Helium miners make? ›Depending on your location, the amount of HNT you earn may vary. In February 2022, a participant claimed that he was able to earn more than $400 per month. The Helium Network is built to encourage broad coverage, using a reward scale metric to reach this goal.
What does reset miner do? ›Consider this a system wide wipe over. This action will stop the Docker process, delete the Miner and log files and delete the Helium Miner software before downloading a fresh copy of the latest Miner software and starting the Docker process and Miner process up again.
Can you factory reset a bobcat miner? ›
Bobcat users can now access Reboot, Reset, Resync, and Fastsync for all their Bobcat miners from anywhere in the world.
How many days does it take for Bobcat miner to sync? ›The blockchain sync process generally takes 24-48 hours for Hotspots, and then you'll be all set to start mining $HNT 🙌! Sounds like you should be all set to go in no time 🙂. Hi there. I received my Bobcat miner and I am so stoked.
How do I bypass SSH username and password? ›- Open the SSH terminal on your machine and run the following command: ssh your_username@host_ip_address. ...
- Type in your password and hit Enter. ...
- When you are connecting to a server for the very first time, it will ask you if you want to continue connecting.
- Create an SSH Key Using ssh-keygen. Use the ssh-keygen command to create an SSH key. ...
- Copy the SSH Public Key to the Remote Host with ssh-copy-id. ...
- Login to the Remote Host Without a Password.
- Make sure that SSH server is running. ...
- Connect to remote machine. ...
- Generate private and public keys. ...
- Copy the public key file to the remote machine. ...
- Login to your server using SSH keys.
Make sure the authorized_keys file and the private key itself have the correct permissions and ownership. Check that key-based authentication is allowed by the server. Make sure the private key is readable by the SSH client. If you're using PuTTY, make sure your SSH keys are properly configured for the session.
How do I allow open SSH? ›- As root, edit the sshd_config file in /etc/ssh/sshd_config : Copy. Copied! ...
- Add a line in the Authentication section of the file that says PermitRootLogin yes . This line may already exist and be commented out with a "#". ...
- Save the updated /etc/ssh/sshd_config file.
- Restart the SSH server: Copy.
However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.
Is it OK to unplug Helium miner? ›Don't unplug and replug in your router too often, it could mess it up. The Reddit community r/HeliumNetwork is a useful forum to go to for troubleshooting advice. Read this blog post by Nik Hawks to get an overview of which antenna may be best for you. Generally, stick with the stock antenna that came with your router.
Should I put Helium miner in DMZ? ›DMZ's are a way of having a device on your network exposed to the internet without the protection of the firewall. If you place your miner/hotspot in a DMZ you don't need to worry about port forwarding HOWEVER given it is so exposed, it makes it very vulnerable to other kinds of attacks.
How close do Helium miners need to be to each other? ›
The Nebra HNT Outdoor Hotspot Miner earns HNT Helium tokens when devices connect, and for validating wireless coverage delivered by peers. Using a system called Proof-of-Coverage, Hotspot Miners earn more HNT when they're in range of other miners, but need to be at least 300 metres apart.
How do you maximize a Helium miner? ›Keep your antenna cable as short as possible if you want maximum earnings. GIVE YOUR ANTENNA 20-30′ OF RUNWAY — LoRa does best if you give it room to breathe. Do NOT put your antenna next to a house, building, or other solid obstacle (unless you know what you're doing and have a very good reason to.)
What is best placement for Helium miner? ›Hotspot Location/Antenna View
It's best to have the hotspot mounted high, with a clear line of sight. Long cable length can severly effect antenna performance.
While the average internet speed might vary by location, 42 Mbps is quite the average. If your household uses more than 4 devices at the same time, you might need to get above average internet speed for as long as you have the Helium miner connected.
What can a hacker do with an open port? ›Cybercriminals can exploit open ports and protocols vulnerabilities to access sensitive. If you don't constantly monitor ports, hackers may exploit vulnerabilities in these ports to steal and leak data from your system.
Can you exploit port 443? ›Ports 80, 443, 8080 and 8443 (HTTP and HTTPS)
HTTP and HTTPS are the hottest protocols on the internet, so they're often targeted by attackers. They're especially vulnerable to cross-site scripting, SQL injections, cross-site request forgeries and DDoS attacks.
Note: The hostname for port 443 is ssh.github.com , not github.com .
What is the most profitable Helium miner? ›- Comparison Table of Best Miners for Helium.
- #1) SenseCAP Miner.
- #2) Browan MerryIoT.
- #3) Milesight LoRaWAN.
- #4) Nebra Rock Pi.
- #5) Radacat Cotx-X3.
- #6) Bobcat Miner.
- #7) MNTD Miner.
#1) Antminer S19 Pro
The Antminer S19 Pro is the most profitable ASIC miner for Bitcoin and the SHA-256 algorithm for now.
Absolutely ! I consider myself a hobbyist and my miner earns approximately . 30 HNT per day as I have a better than average location . I continue to mine in a bear market because eventually the bear will become a bull market and crypto prices across the board will rise once again.
How much HNT is mined a month? ›
As of August 1, 2021 (the most recent halving), the target production rate for new HNT minted per month is 2,500,000 . This means that, if the blockchain performs as designed, it will produce 2,500,000 HNT per month.
How far can Bobcat Miner 300 reach? ›The Bobcat Miner 300 runs on ultra-low power consumption (5W) and its signal range can cover up to 10+ miles, providing connectivity to tens of thousands of LoRaWAN end nodes detected within its range.
How much is 1 Helium worth? ›The current price is $2.68 per HNT.
Why is HNT so low? ›Helium's HNT has lost significant value since developers proposed a plan to move the network over to Solana. Overall, HNT is down 32% over the past week and 47% in the last 30 days.
How much can I make a day mining Helium? ›The daily network mining average is currently around 0.11 HNT per day which at a market price of 30 USD/HNT is only $3.30 USD. Earning $3.30 USD per day may not be so appealing to most especially when a decent setup can cost upwards of $1000 USD.
Does Reset get rid of hackers? ›Reset your phone
The majority of malware can be removed with a factory reset of your phone. This will, however, wipe any data stored on your device, such as photos, notes, and contacts, so it's important to back up this data before resetting your device.
Should You Use a VPN for Cryptocurrency? The short answer: yes. And that's because a VPN adds an extra layer of security between your device and the Internet.
What happens when you hit reset settings? ›A factory reset will delete pretty much everything on your device, reverting it to the state it was in when you unboxed it. A network settings reset will not delete any files, folders, or other media stored on your device. Nor will it delete any web browser data, such as your browsing history or saved bookmarks.
What is the default password for Bobcat 300? ›Bobcat Miner 300 Helium miner:
Username: bobcat. Password: miner.
Your hotspot/miner needs to have a fixed/static IP address on YOUR HOME NETWORK. This is so the port forwarding can always find the device on your network to forward the Helium traffic to.
How do I update my Bobcat miner firmware? ›
...
In this article
- Required Tools.
- Step 1 - Install Firmware Upgrade Tool.
- Step 2 - Open & Connect Miner 300.
- Step 3 - Upgrade Firmware.
- Step 4 - Connect Ethernet & Power On.
- Manual Firmware Upgrade Complete.
How much data does a Helium hotspot/miner use per month? Roughly 250Gb. The equivalent of watching a movie or two on Netflix per day. About 5-20Kbps constant.
Is Bobcat Miner a full hotspot? ›The Bobcat Miner 300 is a high-efficiency miner hotspot for the HNT (Helium) coin.
What is EMC default password? ›Connect to the Unity array using a browser to the management IP and logon as admin with the default initial password "Password123#".
What is the default username password for EMC storage? ›Note: Unisphere Central installs with a default username, admin, and password, Password123#.
What is the default password for PowerMax? ›Unisphere for PowerMax login window The default username for the Unisphere Initial Setup User is smc, and the default password is smc.
What is the password for eg8145v5? ›The default user name and password for common users are Epuser and userEp, respectively.
What is BIOS admin password? ›Setup or Admin password - Password that you must enter to access and make changes to the BIOS settings of the computer. Prevents an unauthorized user from accessing the BIOS or making changes to the settings in the BIOS.
What is BIOS master password? ›A BIOS password is authentication information that is sometimes required to log into a computer's basic input/output system (BIOS) before the machine will boot up. BIOS is the program a computer's microprocessor uses to control the computer's initial boot sequence and hardware initialization.
Is admin password same as BIOS password? ›In BIOS, You can set up two types of password: Administrator Password: The Computer will prompt this password only when you are trying to access the BIOS. It is used to prevent others from changing the BIOS settings. System Password: This will be prompted before the operating system can boot up.
How do I find a stored password? ›
- On your Android phone or tablet, open Chrome .
- At the top right, tap More Settings.
- Tap Password Manager under "Password Checkup," tap Check passwords.
Go to the Windows Control Panel. Click on User Accounts. Click on Credential Manager. Here you can see two sections: Web Credentials and Windows Credentials.
Where is the user password stored *? ›Each user's password is stored in an encrypted form within the /etc/passwd file. These credentials are hashed using a one-way hash function so they cannot be decrypted.
How do I reset my ASMI admin password? ›On the ASMI Welcome pane, specify your user ID and password, and click Log In. In the navigation area, expand Login Profile. Select Change Password.
What is the default password for HP BIOS? ›Today, there is no default BIOS password with HP laptop. If you're using a personal device, a BIOS password will need to be enabled first. But if your device is asking for a password, someone has manually turned on the function. You can remove the BIOS password from your personal device by resetting your BIOS.
What is 192.168 18.1 password? ›The default username and password for 192.168. 18.1 are usually: User name: Epuser. Password: userEp.
What is admin password for DG8245V? ›Step 2 - Login to your Huawei DG8245V router by entering your admin username and password (factory defaults are Username: admin and Password: @HuaweiHgw), and clicking Log In.
What is the default username and password for eg8245h5? ›The default username for your Huawei EG8245H is Epuser. The default password is userEp. Enter the username & password, hit "Enter" and now you should see the control panel of your router.