|
You are here |
blog.redcrowlab.com | ||
| | | | |
www.sixfoisneuf.fr
|
|
| | | | | ||
| | | | |
sergioprado.blog
|
|
| | | | | JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices. | |
| | | | |
axelp.io
|
|
| | | | | [AI summary] The provided text details a reverse-engineering and security analysis of a projector's firmware, leading to the discovery of a potential remote code execution (RCE) vulnerability. The author explored the firmware's CGI scripts and libraries, identified a command injection vulnerability in the `connect_network` function, and found that it could be exploited by sending a crafted HTTP request. However, the author's findings could not be validated due to the product being end-of-life (EOL), and the vulnerability may not be exploitable on newer devices due to hardware differences. | |
| | | | |
kevquirk.com
|
|
| | | Ever wondered how websites check your password? I mean, how can they check your password without being able to read it? It's a catch 22, surely? | ||