Reversing and Exploiting Embedded Devices: Software Stack Part 1

Reversing and Exploiting Embedded Devices: Software Stack Part 1

Translated from https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack Author Elvis Collado Posted Thursday, June 02, 2016, 11:17 AM CDT by In the past few months, I have been traveling to guide people on how to exploit vulnerabilities in embedded devices. Just slides are not sufficient to convey enough information, so I have written everything down for better knowledge digestion. The … Read more

Embedded Linux Firmware Simulation and Security Analysis with Firmadyne

Embedded Linux Firmware Simulation and Security Analysis with Firmadyne

Firmadyne is an open-source software for automated analysis of embedded Linux system security, developed by Carnegie Mellon UniversityDaming D. Chen. It supports batch detection, with the entire system including firmware crawling, root filesystem extraction, QEMU simulation execution, and vulnerability discovery. The system can be downloaded from github: https://github.com/firmadyne/firmadyne The framework is shown in the figure … Read more

A Simple Analysis of STM32 Firmware

A Simple Analysis of STM32 Firmware

This article is a highlight from the Kanxue Forum. Author ID on Kanxue Forum: Shaobanjia After reading the STM32 firmware reverse engineering thread on the forum (https://bbs.pediy.com/thread-272811.htm), I found a help request in the comments about the STM32 chip program that uses the XTEA encryption algorithm, but I couldn’t understand the data sorting issue (https://bbs.pediy.com/thread-272872.htm). … Read more

Router Vulnerability EXP Development Practice

Router Vulnerability EXP Development Practice

Author: Member of Hongri Security lifeand Blog Address: http://sec-redclub.com/team/ Book Giveaway: “Unveiling Home Router 0day Vulnerability Exploitation Techniques” Event Address: Free book giveaway in March Testing Environment Debian 9 Qemu This article mainly discusses the development of an exploit for the buffer overflow vulnerability in routers, using CVE-2013-0230 as an example. 0x01 Environment Setup Using … Read more

IOT Competition Review and MQTT RCE Analysis 2024

IOT Competition Review and MQTT RCE Analysis 2024

One Introduction This year’s West Lake Sword IOT part provided a development board equipped with OpenWrt, and participants needed to analyze the development board and the provided Firmware.zip to answer the questions posed by the organizers. Two Overview of Questions and Score Distribution Since there were no screenshots of the questions retained, I organized the … Read more