Latest YouTube Video

Sunday, May 31, 2015

[FD] Broken, Abandoned, and Forgotten Code, Part 6

Part 6 is live! We continue reversing the undocumented Netgear firmware header by debugging the embedded HTTP server. We identify two more fields, including an unknown checksum. A disassembly-to-python reimplementation of the checksum algorithm is provided in this week's update to the example code. Here's a link: http://ift.tt/1PW5LuZ I forgot to include the link to part 5 in last week's message (whoops!): http://ift.tt/1LUJ7Nn The goal remains to reverse engineer the firmware format so we can generate a malicious firmware image to use when exploiting the SetFirmware SOAP action described in parts 1-4. If you missed my post to Full Disclosure where I introduced the series, here's that: http://ift.tt/1F6IUWA As always I welcome feedback via email or Twitter. I'm @zcutlip. I hope you enjoy it! Cheers, Zach

Source: Gmail -> IFTTT-> Blogger

No comments: