|
You are here |
www.sixfoisneuf.fr | ||
| | | | |
peterkleissner.com
|
|
| | | | | [AI summary] A blog post discusses the reverse engineering of Supermicro's IPMI license key algorithm to bypass vendor lock-in and enable free BIOS updates, revealing the use of HMAC-SHA1 with a fixed secret key. | |
| | | | |
sergioprado.blog
|
|
| | | | | A few days ago I decided to reverse engineer my routers firmware image with binwalk. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The provided text discusses the development of a payload using a custom encryption method, likely based on the Skipjack algorithm, to evade detection by antivirus systems. It outlines the steps to compile and run the payload on a Windows machine, and mentions that the code is intended for educational purposes only. The text also references the Clipper chip initiative and highlights the importance of awareness for cybersecurity professionals. | |
| | | | |
www.thezdi.com
|
|
| | | [AI summary] This blog post discusses two critical vulnerabilities in the Logsign Unified SecOps Platform, CVE-2024-5716 (authentication bypass) and CVE-2024-5717 (command injection), which can be combined for remote, unauthenticated code execution. | ||