|
You are here |
sergioprado.blog | ||
| | | | |
blog.redcrowlab.com
|
|
| | | | | Up to this point in previous posts I've talked about identifying chips, analyzing PINs, using tools like the BusPirate and JTAGulater, etc. Today I'm going to demonstrate a very important aspect of hardware analysis: Dumping Firmware. I'm using a Mikrotik mAP2nd router for demonstration purposes. First thing is to disassemble | |
| | | | |
axelp.io
|
|
| | | | | ||
| | | | |
reverse.put.as
|
|
| | | | | Note: the original post was written in 2017 when there weren't many posts discussing direct attacks to firmware flash. It also took a while to get in touch with the ISP to give them a chance to fix some of the issues described (in particular the ACS access) and then it was left in draft mode until today. I just made a quick revision and fixed quite a few dead links. | |
| | | | |
it-notes.dragas.net
|
|
| | | [AI summary] This article provides a detailed guide on setting up a personal VPN using FreeBSD, WireGuard, IPv6, and ad-blocking features. It covers the installation and configuration of FreeBSD, setting up WireGuard for secure communication, configuring IPv6, implementing ad-blocking with Unbound, and setting up a firewall with pf to block malicious traffic. The guide also includes steps for creating and managing WireGuard clients and integrating DNS-based ad-blocking. | ||