Explore >> Select a destination


You are here

sergioprado.blog
| | blog.redcrowlab.com
3.8 parsecs away

Travel
| | Up to this point in previous posts I've talked about identifying chips, analyzing PINs, using tools like the BusPirate and JTAGulater, etc. Today I'm going to demonstrate a very important aspect of hardware analysis: Dumping Firmware. I'm using a Mikrotik mAP2nd router for demonstration purposes. First thing is to disassemble
| | www.sixfoisneuf.fr
3.3 parsecs away

Travel
| |
| | reverse.put.as
2.9 parsecs away

Travel
| | Note: the original post was written in 2017 when there weren't many posts discussing direct attacks to firmware flash. It also took a while to get in touch with the ISP to give them a chance to fix some of the issues described (in particular the ACS access) and then it was left in draft mode until today. I just made a quick revision and fixed quite a few dead links.
| | www.reversinglabs.com
29.9 parsecs away

Travel
| With the rise of attacks on the supply chain and threats from AI, a modern strategy for securing containers is required. Here are key considerations.