A journey into IoT Forensics - Episode 4 - Analysis of an iRobot Roomba 690 (aka thanks VTO Labs for sharing!)
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyt8N0KeOdmB5_X_34yT3fUp1WH63AHZESw6iU4ez9D84Bhb2buO-bpiZfJ_X6Qm7Yj5ZQgTtynvWd9ho35vJrlRUuKUBbd-Sd9f6ymYgXKc5AEnFyOaVwJwIn6GmaS2u84RRSYoYwx9M/s16000/image.png)
This the fourth blog post on the analysis of IoT devices images made available by VTO Labs . The first blog post was about the analysis of Samsung refrigerator , the second one was about the analysis of an LG Smart TV , the third one was about the analysis of an Ematic Android TV OS Box , and this one is about the analysis of an iRobot Roomba 690. [ START DISCLAIMER ] I only had one dataset, so the testing is limited and not to be considered strong and verified. The goal is to open a discussion and to provide a first glimpse into the analysis of these types of devices. [ END DISCLAIMER ] The iRobot Roomba 690 The fourth candidate for my research in the VTO Labs dataset was the image of an iRobot Roomba 690 , aWi-Fi Connected Robot Vacuum manufactured by iRobot Corporation. An old book (2006) on Hacking Roomba is available and the book website is still active . A forum on robot hacking is also available on Robot Reviews . I was not able to find any previous forensics research o