- 浏览: 287758 次
文章分类
- 全部博客 (276)
- burp+hydra暴力破解 (1)
- kali linux工具集 (6)
- kali (59)
- linux (54)
- password (14)
- web (63)
- 渗透测试 (50)
- windows (40)
- metasploit (9)
- 信息收集 (32)
- burp suit (4)
- 安全审计 (9)
- https://github.com/secretsquirrel/the-backdoor-factory (0)
- nmap (4)
- arachni (2)
- 工具 (5)
- sql (3)
- 网络 (2)
- 后渗透测试 (10)
- 内网 (5)
- 无线 (2)
- C (3)
- bios (1)
- RoR (12)
- mongodb (1)
- linxu (1)
- gdb (1)
- linux,虚拟化 (1)
- python (4)
最新评论
For video stuff: https://www.youtube.com/watch?v=FYPhEgbiWrk
command:http://pastebin.com/k4mwgS6T
#http://alexkaskasoli.com/wansview.pdf <-- notes
#wansview IPCAM telnet firmware 51.3.0.152
#user: root
#password: 123456
#get full version of busybox
#download to desktop mipsel version
wget "http://www.busybox.net/downloads/binaries/latest/busybox-mipsel" -O busybox
#now on the camera itself connect to your desktop and get the file
#note that there is very limited space on this device,
#but you can put the binary of busybox in "/tmp"
#it's running in RAM, so will be lost on reboot of camera
cd /tmp
/system/system/bin/ftp <desktop ip>
#once you download the file, make sure it's executable and then run it
chmod 777 busybox
./busybox
#now you can use DD and NetCat in busybox to image partitions
#mtdblock6 device is the main fs # use mount to figure this out
#on camera
./busybox nc -l -p 60000 < /dev/mtdblock6
#on desktop
nc <camera IP> 60000 > system.img
#note that Netcat does not disconnect when done
#watch file and when it stops growing it's done
#in this case it's 3MB
#this image is a jffs2 file, which I can't seem to mount or extract directly
#but, you can create a partition and mount it from there
sudo modprobe mtdram total_size=32768 erase_size=256
sudo modprobe mtdblock
#modprobe mtdchar
sudo mknod /dev/mtdblock2 b 31 0
sudo dd if=system.img of=/dev/mtdblock2
mkdir mnt
sudo mount -t jffs2 /dev/mtdblock2 mnt/
#ssh server
cd /tmp
/tmp/busybox wget "http://landley.net/aboriginal/downloads/binaries/extras/dropbearmulti-mipsel" -O dropbearmulti
chmod +x dropbearmulti
ln -s dropbearmulti dropbearkey
ln -s dropbearmulti dbclient
ln -s dropbearmulti dropbear
mkdir /etc/dropbear
cd /etc/dropbear
/tmp/dropbearkey -t rsa -f dropbear_rsa_host_key
/tmp/dropbearkey -t dss -f dropbear_dss_host_key
/tmp/dropbear start
#/tmp/dropbear dropbear -i
#have fun
command:http://pastebin.com/k4mwgS6T
引用
#http://alexkaskasoli.com/wansview.pdf <-- notes
#wansview IPCAM telnet firmware 51.3.0.152
#user: root
#password: 123456
#get full version of busybox
#download to desktop mipsel version
wget "http://www.busybox.net/downloads/binaries/latest/busybox-mipsel" -O busybox
#now on the camera itself connect to your desktop and get the file
#note that there is very limited space on this device,
#but you can put the binary of busybox in "/tmp"
#it's running in RAM, so will be lost on reboot of camera
cd /tmp
/system/system/bin/ftp <desktop ip>
#once you download the file, make sure it's executable and then run it
chmod 777 busybox
./busybox
#now you can use DD and NetCat in busybox to image partitions
#mtdblock6 device is the main fs # use mount to figure this out
#on camera
./busybox nc -l -p 60000 < /dev/mtdblock6
#on desktop
nc <camera IP> 60000 > system.img
#note that Netcat does not disconnect when done
#watch file and when it stops growing it's done
#in this case it's 3MB
#this image is a jffs2 file, which I can't seem to mount or extract directly
#but, you can create a partition and mount it from there
sudo modprobe mtdram total_size=32768 erase_size=256
sudo modprobe mtdblock
#modprobe mtdchar
sudo mknod /dev/mtdblock2 b 31 0
sudo dd if=system.img of=/dev/mtdblock2
mkdir mnt
sudo mount -t jffs2 /dev/mtdblock2 mnt/
#ssh server
cd /tmp
/tmp/busybox wget "http://landley.net/aboriginal/downloads/binaries/extras/dropbearmulti-mipsel" -O dropbearmulti
chmod +x dropbearmulti
ln -s dropbearmulti dropbearkey
ln -s dropbearmulti dbclient
ln -s dropbearmulti dropbear
mkdir /etc/dropbear
cd /etc/dropbear
/tmp/dropbearkey -t rsa -f dropbear_rsa_host_key
/tmp/dropbearkey -t dss -f dropbear_dss_host_key
/tmp/dropbear start
#/tmp/dropbear dropbear -i
#have fun
发表评论
-
使用GCC/GNU-ld删除dead code
2016-05-09 17:18 644[url] https://gcc.gnu.org/ml/gc ... -
python 修饰器
2016-02-05 15:11 410def wrapper1(function): ... -
ubuntu 14.04 install e431 wifi driver
2016-01-25 20:59 447引用 sudo apt-get install linu ... -
git
2016-01-07 12:01 443http://finalshares.cn/attachmen ... -
嵌入式中使用gdb
2016-01-06 17:38 3684编译 For gdb: /path/to/gdb-sr ... -
linux change boot image
2016-01-02 00:55 5361. change grub2 引用vim /etc/defa ... -
binwalk --dd
2015-12-28 21:51 1394http://www.devttys0.com/2012/12 ... -
embeded LD_PRELOAD
2015-12-28 00:17 553引用 eve@eve:~/squashfs-root$ sud ... -
ubuntu support kindle
2015-12-20 23:13 358引用apt-get install mtpfs -
linux 备份系统
2015-12-05 22:22 416引用备份 dd if=/dev/sda > myimag ... -
[译]root权限运行vlc
2015-11-30 22:19 1361原文地址:http://www.blackmoreops.co ... -
【转】关闭TCP Timestamps来节省一点带宽
2015-10-15 23:29 1624http://highscalability.com/blog ... -
[转]Terminal escape sequences – the new XSS for Linux sysadmins
2015-09-25 23:58 429https://ma.ttias.be/terminal-es ... -
ipython basic
2015-09-25 11:31 453Introspection引用 Using a questio ... -
static in C
2015-09-22 11:35 311jason@ubuntu:~/test$ cat a.c ... -
lxc重命名容器名
2015-09-20 00:25 803lxc-ls 使用文件夹名作为容器名。所以可以更改文件夹名称来 ... -
lxc更新apt源
2015-09-18 11:49 747最近一直在使用lxc创建容器,每次创建一个容器都需要把apt源 ... -
wireshark:Couldn't run /usr/bin/dumpcap in child process: Permission denied
2015-09-11 10:26 3342When start wireshark, I met an ... -
[转]调试python内存泄漏
2015-09-09 00:48 356http://chase-seibert.github.io/ ... -
[转]Python @classmethod and @staticmethod for beginner?
2015-09-07 16:59 365http://stackoverflow.com/questi ...
相关推荐
Hardware Hacking Projects for Geeks 英文chm 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
这个是Game Console Hacking的相关篇目,由于很难找所以从外国网盘拖了回来。仅供于学习参考用途。
根据提供的文件信息,“10 Hardware Hacking Projects for Around Home”这本书由Barry Press和Marcia Press共同编写,出版于2005年。本书聚焦于介绍十个家庭环境下的硬件黑客项目,旨在帮助读者掌握和应用硬件知识...
Game Console Hardware Hacking.rar
硬件黑客工具包(Hardware Hacking Toolkit): 硬件黑客活动通常涉及对硬件内部工作机理的理解,并且攻破其安全保护措施,以便尽可能多地利用硬件资源及其配合的软件。硬件黑客过程往往从逆向工程开始,这从硬件...
《硬件黑客项目指南》这本书是为那些对探索和改造电子硬件充满热情的极客们精心编写的。书中涵盖了一系列激动人心的项目,旨在激发读者的创新思维,让他们亲手打造出独一无二的设备。硬件黑客并不仅仅是破解或破坏,...
网络安全渗透测试
硬件黑客是一种技术领域,涉及到对电子设备的逆向工程、修改和创新,以实现非传统或预期的功能。在这个领域,熟练的硬件黑客可以利用他们的技能来探索设备的内部工作原理,发现潜在的安全漏洞,或者创建定制化的解决...
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop...
Part IV: Hardware Hacking Chapter 13: Learning to Hack Hardware Chapter 14: The GPIO Port Chapter 15: The Raspberry Pi Camera Module Chapter 16: Add-On Hardware Part V: Appendixes Appendix A: Python ...
Moving on you will cover malware analysis and Forensis along with hardware hacking. Lastly you will learn how to create an optimum quality pentest report! By the end of this book, you will learn how...
Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp
藏经阁-Hacking Hardware with a $10 SD Card Reader 本文档主要介绍如何使用一个仅仅10美元的SD卡读卡器来 hack 硬件,特别是eMMC闪存芯片。下面是对该文档的详细解读和知识点总结: 一、什么是eMMC闪存? eMMC...
“hardware hacking”是指对物理电子设备的逆向工程和破解,这在CTF中是常见的挑战类型。参赛者可能需要通过分析电路板、读取内存或接口通信来寻找漏洞。在Rhme-2017中,这可能涉及解码硬件信号、模拟输入或识别脆弱...
DefCon 23 Hardware Hacking Village学习焊料套件,作者: Smitty, (概念,加密和固件(2014年)) Krux, (硬件) Cmdc0de, (固件(2015)) 这些是构建DefCon DarkNet ID徽章的固件所需的文件,该固件已...
Hardware Hacking | Blogger |Speaker </title> <meta http-equiv="content-type" content="text/html; charset=utf-8"/> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <...