Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Analysis of TP-LINK WDR 7660 VxWorks System

Analysis of TP-LINK WDR 7660 VxWorks System

Author | Green Alliance Technology Laboratory Wei Fan Introduction:The router is the most widely used IoT device, and TP-LINK is the largest router manufacturer in China. Its WDR 7660 model router uses the VxWorks operating system for the first time, offering high real-time performance and reliability, but also presenting significant challenges for reverse analysis. This … Read more

Analysis and Solution of an Unexpected Mining Trojan Virus

Analysis and Solution of an Unexpected Mining Trojan Virus

Since I changed my job position, I haven’t researched reverse security for about 4 or 5 years. I thought I would have no connection with this profession again, but unexpectedly, today I had a chance to “enjoy” it again due to a random opportunity. Recently, my colleagues in the company have been constantly reporting that … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

A Simple Analysis of STM32 Firmware

A Simple Analysis of STM32 Firmware

This article is a highlight from the Kanxue Forum. Author ID on Kanxue Forum: Shaobanjia After reading the STM32 firmware reverse engineering thread on the forum (https://bbs.pediy.com/thread-272811.htm), I found a help request in the comments about the STM32 chip program that uses the XTEA encryption algorithm, but I couldn’t understand the data sorting issue (https://bbs.pediy.com/thread-272872.htm). … Read more

Attacking Microcontroller Firmware via USB

Attacking Microcontroller Firmware via USB

One Who Hacks Video Game Consoles? The manufacturing of counterfeit and unauthorized products is prevalent in the world of video game consoles. This is a multi-billion dollar industry where demand creates supply. You can now find devices for nearly every existing console that allow you to play licensed video game “backups” from flash drives, counterfeit … Read more

Understanding Tesla Attack Cases: Hardware Reverse Analysis

Understanding Tesla Attack Cases: Hardware Reverse Analysis

This article is an excellent piece from the KXue Forum, author ID: kxliping 1 Purpose of Analyzing Attack Cases The main purpose of studying attack cases is to understand how attackers breach vehicles and take control of them. In the research on Tesla attacks, Tencent’s Keen Lab has contributed several successful cases, which should ideally … Read more

Restoration of APP Encryption and Signature Algorithms

Restoration of APP Encryption and Signature Algorithms

This article is an excellent piece from the KX forum. KX forum author ID: taobluesky Recently encountered a shell with quite high intensity, sharing how to debug with the shell, purely a technical exchange, please do not use this article for illegal purposes! 1 Prepare Environment frida 12.11.18 jeb-3.24 jadx-gui-1.3.3-1 xcube android 7.0 (real machine) … Read more