|
You are here |
reverse.put.as | ||
| | | | |
sergioprado.blog
|
|
| | | | | A few days ago I decided to reverse engineer my routers firmware image with binwalk. | |
| | | | |
axelp.io
|
|
| | | | | [AI summary] The provided text details a reverse-engineering and security analysis of a projector's firmware, leading to the discovery of a potential remote code execution (RCE) vulnerability. The author explored the firmware's CGI scripts and libraries, identified a command injection vulnerability in the `connect_network` function, and found that it could be exploited by sending a crafted HTTP request. However, the author's findings could not be validated due to the product being end-of-life (EOL), and the vulnerability may not be exploitable on newer devices due to hardware differences. | |
| | | | |
peterkleissner.com
|
|
| | | | | [AI summary] A blog post discusses the reverse engineering of Supermicro's IPMI license key algorithm to bypass vendor lock-in and enable free BIOS updates, revealing the use of HMAC-SHA1 with a fixed secret key. | |
| | | | |
markozivanovic.com
|
|
| | | Marko Zivanovic is a programmer, technologist, and one hell of a guy. He loves to learn new programming languages and enjoys long walks on the beach. | ||