Hacking the Verizon Network Extender – Part 2

So here it comes!

The latest news!

So where I left off in part one we still needed to get back down to the US for more testing, this post will be talking about that a bit.

With Verizon Network Extender back at it’s home it was ready to give some service!

On the above photo you will notice a few LEDs these are the status LEDs.

The power LED is blue if  the device has power.

The system LED is the status of whether this device is connected to verizon’s network.(BTW it has to be blue for the device to work)

The GPS LED, this LED is blue if it has a good signal from the device. If not it is Red.

And last there is the LAN LED that shows network activity etc.

Trip 1

On trip one we recorded the serial signals coming from the Network Extender(Photo Below)

At this point the code for the AVR wasn’t finished.

This turned out to be kind of a bother because we couldn’t test it using the AVR to replace the signals coming from the gps and test it in the US at the same time.

Back in Canada

My brother got the code finished up and the output looking the same as the US Signals.

But there was a problem!

The GPS LED would turn a NICE blue, But the system LED stayed a BAD red!

Trip 2

Back in the US we decided to test the system just like we had it in canada, But no go!

Had verizon blocked us? Thankfully Not!

At this point we discovered something very interesting!

The time that our test phone showed was the same as the time that we recorded the signal!

Kinda strange to see the phone showing 4pm when it was 9pm!

But if that system LED was red there was no dialing out! NONE! LOL

If we bridged the GPS back to normal it all worked! Strange!

Where to go next

We think that part of the System check includes, checking the time that’s coming from the GPS and comparing it too their server time.

Also we are checking the second I/O port on the GPS for use.

We are also looking into setting up a US proxy.

Hack the whole thing?

Here’s a photo of the Network Extender’s I/O Port.

Maybe one of you reading this would like to do this! I think that it would be so cool to hack it to a point that you could use asterisk for switching!

Hope to have another update soon, keep checking back!


15 Responses to “Hacking the Verizon Network Extender – Part 2”

  1. Alex Says:

    Nice work with this, it seems like it might be possible, and you’re getting pretty close. But, about that HDMI port on the bottom, I actually asked Verizon what it was and they said that it was just there and had no purpose, but of course it must be of some use, I think at least…

  2. Maks Says:

    So far so good. The question is whether part 3 is coming soon?

  3. Maks Says:

    Hi Daniel,

    A quick question for you. The serial signal you have recorder from the Network Extender, was it an NMEA signal? Were you able to successfully decode it?


  4. Dan Says:

    Good post! I’m guessing that you dont have to set up U.S. proxy though.. just find a way to bypass GPS signal or spoof location then it should work. I would like to bring this system to other countries. Also any idea that it can work with Wifi or 3G network (via WCDMA/HSPA)?
    Thanks. Keep up the good work OP.

    • va7drm Says:

      Sorry that I’ve been so long in getting back to you, We did bypass the GPS(I think you can read about it in part 1) as for wifi/3g I believe that you’d have to run it over a VPN seeing that most cellular providers have the needed ports blocked… and every time you send packets another location you get more delay(my experience in running SIP over 3G.)

  5. russell Says:

    come on man, awesone stuff, Network extender part 3 PLEASE!

  6. Blake Says:

    hey man did you get the username and password for the device? when accessing its IP via a web browser? And did you ever figure out anything on what you can do with the I/O Port? Thanks man! Looking forward to Part 3

  7. Mass Says:

    Hey Daniel,

    good job so far!

    Did you finally get the NE working in Canada? I can set you up with a US VPN link if you haven’t done that and want to give it a try.

    Let me know.

  8. KiltWorld Says:

    I was told by a verizon rep that the port on the bottom is a firewire port

  9. Miles Says:

    I have a VPN server in our datacenter that we can test with. I have a project down in Guatemala that I would really like to get this figured out for. If you send me your address I’ll ship you a router with VPN preconfigured to haul traffic back to the US.

  10. robert Says:

    At the risk of adding nothing constructive to the discussion I’ve heard that this requires a lock on an actual Verizon network tower as well.

  11. Anonymous Says:

    The HDMI port is a serial connection. I can get in on it, but don’t have any login information to get a shell. Anyone gotten a shell on it yet?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: