Explore >> Select a destination


You are here

reverse.put.as
| | voidstarsec.com
2.6 parsecs away

Travel
| | In previous posts, we've gone over how to tear down Arcade cabinets containing SPI Flash as well as how to dissect the data that was extracted from the Rom. With this next series of posts, I'd like to take the concepts we talked about on those platforms and demonstrate them on a more popular platform With this post our goal will be to extract the firmware from the platform and locate and type of debugging if possible (UART,JTAG,etc). We will explore multiple ways of attempting to extract the filesystem and outline the steps taken for each method.
| | sergioprado.blog
1.2 parsecs away

Travel
| | A few days ago I decided to reverse engineer my routers firmware image with binwalk.
| | axelp.io
2.4 parsecs away

Travel
| | [AI summary] The provided text details a reverse-engineering and security analysis of a projector's firmware, leading to the discovery of a potential remote code execution (RCE) vulnerability. The author explored the firmware's CGI scripts and libraries, identified a command injection vulnerability in the `connect_network` function, and found that it could be exploited by sending a crafted HTTP request. However, the author's findings could not be validated due to the product being end-of-life (EOL), and the vulnerability may not be exploitable on newer devices due to hardware differences.
| | blog.tetrane.com
13.9 parsecs away

Travel
| [AI summary] Tetrane releases updates and free versions of REVEN, a timeless debugging and analysis platform designed to reverse engineer system executions and analyze vulnerabilities.