|
You are here |
www.sixfoisneuf.fr | ||
| | | | |
blog.benjojo.co.uk
|
|
| | | | | [AI summary] An author demonstrates how to jailbreak a cheap Dell D1100 Ethernet switch to run custom code and WireGuard for secure networking by exploiting its ONIE support. | |
| | | | |
peterkleissner.com
|
|
| | | | | [AI summary] A blog post discusses the reverse engineering of Supermicro's IPMI license key algorithm to bypass vendor lock-in and enable free BIOS updates, revealing the use of HMAC-SHA1 with a fixed secret key. | |
| | | | |
voidstarsec.com
|
|
| | | | | In previous posts, we've gone over how to tear down Arcade cabinets containing SPI Flash as well as how to dissect the data that was extracted from the Rom. With this next series of posts, I'd like to take the concepts we talked about on those platforms and demonstrate them on a more popular platform With this post our goal will be to extract the firmware from the platform and locate and type of debugging if possible (UART,JTAG,etc). We will explore multiple ways of attempting to extract the filesystem and outline the steps taken for each method. | |
| | | | |
rossmarks.uk
|
|
| | | I wanted to give a quick demo on how to reverse engineer an ATtiny85 micro-controller to read the code stored on the device. For this demo the "hello world" is a small circuit with four | ||