Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Introduction: With the gradual development of the Internet of Things (IoT) era, the connections between devices have become closer, and each node cannot exist independently. Devices that are closely related to our daily lives, such as routers, cameras, and printers, increasingly impact various aspects of our lives, from personal privacy to intelligence gathering between hostile … Read more

Getting Started with Linux: Your First Progress Bar Program Made Easy!

Linux | Red Hat Certified | IT Technology | Operations Engineer 👇 Join our technical exchange QQ group with 1000 members, note 【public account】 for faster approval 1. Carriage Return and Line Feed In Windows, we consider carriage return and line feed as one concept; however, in reality, line feed moves to the current position … Read more

Linux x86 Buffer Overflow Level 3: Simple Buffer Overflow, Bypassing DEP and ASLR Protection via ROP

Linux x86 Buffer Overflow Level 3: Simple Buffer Overflow, Bypassing DEP and ASLR Protection via ROP

Preparation Work Enable ASLR and DEP protection. sudo -s echo 2 > /proc/sys/kernel/randomize_va_space To enable DEP protection, simply remove the<span>-z execstack</span> option when compiling with gcc. <span>gcc -m32 -fno-stack-protector -o level3 level3.c</span> Randomized Base Address The following shows the maps situation when running level3 multiple times. First Run $ cat /proc/22020/maps 56652000-56653000 r–p 00000000 08:03 … Read more

Avoiding Overflow Errors in Keil C51 Large Integer Constants

Avoiding Overflow Errors in Keil C51 Large Integer Constants

The default integer constant operations in the C51 compiler may lead to overflow errors. To avoid potential calculation errors, the data type of large integers should be specified. Keil C51 is a compiler compatible with ANSI C. The ANSI C standard specifies that the default data types for decimal integer constants are one of int, … Read more

Router Vulnerability EXP Development Practice

Router Vulnerability EXP Development Practice

Author: Member of Hongri Security lifeand Blog Address: http://sec-redclub.com/team/ Book Giveaway: “Unveiling Home Router 0day Vulnerability Exploitation Techniques” Event Address: Free book giveaway in March Testing Environment Debian 9 Qemu This article mainly discusses the development of an exploit for the buffer overflow vulnerability in routers, using CVE-2013-0230 as an example. 0x01 Environment Setup Using … Read more

Using GDB to Inspect Program Stack Space

Using GDB to Inspect Program Stack Space

Introduction: This is a quick tutorial on how to use GDB to inspect the stack space of a C program. Word count: 7403, estimated reading time: 10 minutes https://linux.cn/article-13550-1.htmlAuthor: Julia EvansTranslator: amwps290 Yesterday, while chatting with some people, they mentioned that they didn’t really understand how the stack works and didn’t know how to inspect … Read more