Part 13 (the penultimate installment) of Broken, Abandoned, and Forgotten Code is up. In this first of two parts covering post exploitation, we cover how to customize the stage 1 firmware image the exploit will flash onto the target. It is the job of this minimized firmware image to bootstrap a fully functional, trojanized stage 2 firmware onto the Netgear R6200. Here's a link to part 13: http://ift.tt/1WPqlx2 If you missed my post to Full Disclosure where I introduced the series, here's that: http://ift.tt/1F6IUWA As always I welcome feedback via email or Twitter. I'm @zcutlip. I hope you enjoy it! Cheers, Zach
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment