hadleyresearch.com
NBitWonder |
http://www.hadleyresearch.com/tag/nbitwonder
Projects of the Past – RGBSaber. May 4, 2015. Introduction Every electronics hobbyist has that project, that first project which they obsess over, which they pour their time and money and sanity into, which they get burned on and make their mistakes on and go on to be learned … Continue reading →. Projects of the Past – CardPOV. May 4, 2015. NBitWonder Content Now Available. May 2, 2015. Hadley Research Eagle Library Now Available. Closeup Soldering w/ Demux4555. Electronics Humor (April Fools Day 2016).
devttys0.com
What the Ridiculous Fuck, D-Link?! – /dev/ttyS0
http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link
Hacking the D-Link DIR-890L. Binwalk v2.1.1 Stable Release ». What the Ridiculous Fuck, D-Link? April 14, 2015. As mentioned in an update to my post on the HNAP bug. In the DIR-890L, the same bug was reported earlier this year in the DIR-645, and a patch. Was released. D-Link has now released a patch. For the DIR-890L as well. The patches for both the DIR-645 and DIR-890L are identical, so I’ll only examine the DIR-890L here. Although I focused on command injection in my previous post. Pfft, why bother?
devttys0.com
Electronics – /dev/ttyS0
http://www.devttys0.com/electronics
Here at devttys0, we’re mostly focused on firmware and embedded security, but we like other stuff too! If, like us, you’re into hardware / electronics, check out our sister site, AnalogZoo. Electronics design, videos, hardware reversing, equipment repair/reviews, RF, signal processing, and more! November 27, 2015 at 12:38 pm. Do you know where I can find info on hacking into the Netgear NeoTv NTV300 so I can install Kodi? Leave a Reply Cancel reply. Your email address will not be published.
devttys0.com
May 2014 – /dev/ttyS0
http://www.devttys0.com/2014/05
Monthly Archives: May 2014. Hacking the DSP-W215, Again, Again, Again. May 25, 2014. So far, the. In the DSP-W215 have only been practically exploitable from the LAN, unless someone was foolish enough to make their smart plug remotely accessible on the Internet. Vulnerability only URL decodes a small range of ASCII values). The my cgi.cgi. Void decode(char *encode buf, char *decode buf);. The decode while loop. Continue reading →. Hacking the DSP-W215, Again, Again. May 24, 2014. DSP-W215 exploit, I ment...
devttys0.com
December 2013 – /dev/ttyS0
http://www.devttys0.com/2013/12
Monthly Archives: December 2013. Binwalk 2.0 Development. December 28, 2013. Binwalk version 2.0 is currently under development. This is a fundamental re-design which makes binwalk more modular and easier to extend. Scripting is easier, plugins are easier – basically everything is easier. New features, plus Python3 support (and possibly even a Windows package) are also in the works. Once 2.0 is stable enough to be merged into the master branch, the wiki. 3D Binary Visualizations With Binwalk.
devttys0.com
Training – /dev/ttyS0
http://www.devttys0.com/training
We’ve just opened registration for our Hardware Hacking Workshop. Register for our Linux/RTOS Embedded Device Exploitation classes here. Introduction to electronics, package types, and component identification. Interconnect types and design (GPIO, SPI, I2C, JTAG, etc.). Identifying flash chip types and methods to extract their contents. Analysis and extraction of flash image contents. Vulnerability analysis with unpacked firmware image. Introduction to MIPS dis/assembly. Return to libc in MIPS. See the t...
devttys0.com
Tools – /dev/ttyS0
http://www.devttys0.com/tools
Baudrate is a tool to help quickly identify the baud rate of an unknown serial device. It displays received data from a serial device while allowing the user to change the baud rate of their host system’s serial port on the fly. A collection of tools and scripts to assist in analyzing bFLT binaries distributed with ucLinux, including an IDA bFLT loader. An IDA plugin to graph all paths between two functions. A collection of IDA scripts and plugins useful during firmware RE. April 15, 2013 at 6:23 pm.
devttys0.com
April 2014 – /dev/ttyS0
http://www.devttys0.com/2014/04
Monthly Archives: April 2014. April 13, 2014. Are the slides from my short talk on getting started using JTAG. Thanks to everyone who came out! April 7, 2014. Just got back from the EELive. Conference in San Jose – great talks. And way better weather than we had back here on the east coast. For those interested, the slides for my talk, “Finding and Reverse Engineering Backdoors in Consumer Firmware” can be found here. If you get a chance to go next year, I highly recommend it! Hacking the D-Link DIR-890L.
devttys0.com
July 2014 – /dev/ttyS0
http://www.devttys0.com/2014/07
Monthly Archives: July 2014. Binwalk v2.0 Released! July 26, 2014. Binwalk v2.0.0 has (finally) been released. Grab it from the github page. Defcon 24: Blinded By The Light. Hardware Hacking Workshop is Now Live! Binwalk v2.1.1 Stable Release. What the Ridiculous Fuck, D-Link? Hacking the D-Link DIR-890L. On Reverse Engineering Serial Ports. On Reverse Engineering Serial Ports. On Cracking WPA in 10 Hours or Less. On Reverse Engineering Firmware: Linksys WAG120N. On Reverse Engineering Serial Ports.
devttys0.com
April 2015 – /dev/ttyS0
http://www.devttys0.com/2015/04
Monthly Archives: April 2015. What the Ridiculous Fuck, D-Link? April 14, 2015. As mentioned in an update to my post on the HNAP bug. In the DIR-890L, the same bug was reported earlier this year in the DIR-645, and a patch. Was released. D-Link has now released a patch. For the DIR-890L as well. The patches for both the DIR-645 and DIR-890L are identical, so I’ll only examine the DIR-890L here. Although I focused on command injection in my previous post. To validate the HNAP. Continue reading →. I was cu...
SOCIAL ENGAGEMENT