- 浏览: 278157 次
文章分类
- 全部博客 (276)
- burp+hydra暴力破解 (1)
- kali linux工具集 (6)
- kali (59)
- linux (54)
- password (14)
- web (63)
- 渗透测试 (50)
- windows (40)
- metasploit (9)
- 信息收集 (32)
- burp suit (4)
- 安全审计 (9)
- https://github.com/secretsquirrel/the-backdoor-factory (0)
- nmap (4)
- arachni (2)
- 工具 (5)
- sql (3)
- 网络 (2)
- 后渗透测试 (10)
- 内网 (5)
- 无线 (2)
- C (3)
- bios (1)
- RoR (12)
- mongodb (1)
- linxu (1)
- gdb (1)
- linux,虚拟化 (1)
- python (4)
最新评论
hardware hacking
- 博客分类:
- linux
For video stuff: https://www.youtube.com/watch?v=FYPhEgbiWrk
command:http://pastebin.com/k4mwgS6T
#http://alexkaskasoli.com/wansview.pdf <-- notes
#wansview IPCAM telnet firmware 51.3.0.152
#user: root
#password: 123456
#get full version of busybox
#download to desktop mipsel version
wget "http://www.busybox.net/downloads/binaries/latest/busybox-mipsel" -O busybox
#now on the camera itself connect to your desktop and get the file
#note that there is very limited space on this device,
#but you can put the binary of busybox in "/tmp"
#it's running in RAM, so will be lost on reboot of camera
cd /tmp
/system/system/bin/ftp <desktop ip>
#once you download the file, make sure it's executable and then run it
chmod 777 busybox
./busybox
#now you can use DD and NetCat in busybox to image partitions
#mtdblock6 device is the main fs # use mount to figure this out
#on camera
./busybox nc -l -p 60000 < /dev/mtdblock6
#on desktop
nc <camera IP> 60000 > system.img
#note that Netcat does not disconnect when done
#watch file and when it stops growing it's done
#in this case it's 3MB
#this image is a jffs2 file, which I can't seem to mount or extract directly
#but, you can create a partition and mount it from there
sudo modprobe mtdram total_size=32768 erase_size=256
sudo modprobe mtdblock
#modprobe mtdchar
sudo mknod /dev/mtdblock2 b 31 0
sudo dd if=system.img of=/dev/mtdblock2
mkdir mnt
sudo mount -t jffs2 /dev/mtdblock2 mnt/
#ssh server
cd /tmp
/tmp/busybox wget "http://landley.net/aboriginal/downloads/binaries/extras/dropbearmulti-mipsel" -O dropbearmulti
chmod +x dropbearmulti
ln -s dropbearmulti dropbearkey
ln -s dropbearmulti dbclient
ln -s dropbearmulti dropbear
mkdir /etc/dropbear
cd /etc/dropbear
/tmp/dropbearkey -t rsa -f dropbear_rsa_host_key
/tmp/dropbearkey -t dss -f dropbear_dss_host_key
/tmp/dropbear start
#/tmp/dropbear dropbear -i
#have fun
command:http://pastebin.com/k4mwgS6T
引用
#http://alexkaskasoli.com/wansview.pdf <-- notes
#wansview IPCAM telnet firmware 51.3.0.152
#user: root
#password: 123456
#get full version of busybox
#download to desktop mipsel version
wget "http://www.busybox.net/downloads/binaries/latest/busybox-mipsel" -O busybox
#now on the camera itself connect to your desktop and get the file
#note that there is very limited space on this device,
#but you can put the binary of busybox in "/tmp"
#it's running in RAM, so will be lost on reboot of camera
cd /tmp
/system/system/bin/ftp <desktop ip>
#once you download the file, make sure it's executable and then run it
chmod 777 busybox
./busybox
#now you can use DD and NetCat in busybox to image partitions
#mtdblock6 device is the main fs # use mount to figure this out
#on camera
./busybox nc -l -p 60000 < /dev/mtdblock6
#on desktop
nc <camera IP> 60000 > system.img
#note that Netcat does not disconnect when done
#watch file and when it stops growing it's done
#in this case it's 3MB
#this image is a jffs2 file, which I can't seem to mount or extract directly
#but, you can create a partition and mount it from there
sudo modprobe mtdram total_size=32768 erase_size=256
sudo modprobe mtdblock
#modprobe mtdchar
sudo mknod /dev/mtdblock2 b 31 0
sudo dd if=system.img of=/dev/mtdblock2
mkdir mnt
sudo mount -t jffs2 /dev/mtdblock2 mnt/
#ssh server
cd /tmp
/tmp/busybox wget "http://landley.net/aboriginal/downloads/binaries/extras/dropbearmulti-mipsel" -O dropbearmulti
chmod +x dropbearmulti
ln -s dropbearmulti dropbearkey
ln -s dropbearmulti dbclient
ln -s dropbearmulti dropbear
mkdir /etc/dropbear
cd /etc/dropbear
/tmp/dropbearkey -t rsa -f dropbear_rsa_host_key
/tmp/dropbearkey -t dss -f dropbear_dss_host_key
/tmp/dropbear start
#/tmp/dropbear dropbear -i
#have fun
发表评论
-
使用GCC/GNU-ld删除dead code
2016-05-09 17:18 614[url] https://gcc.gnu.org/ml/gc ... -
python 修饰器
2016-02-05 15:11 377def wrapper1(function): ... -
ubuntu 14.04 install e431 wifi driver
2016-01-25 20:59 415引用 sudo apt-get install linu ... -
git
2016-01-07 12:01 405http://finalshares.cn/attachmen ... -
嵌入式中使用gdb
2016-01-06 17:38 3633编译 For gdb: /path/to/gdb-sr ... -
linux change boot image
2016-01-02 00:55 5051. change grub2 引用vim /etc/defa ... -
binwalk --dd
2015-12-28 21:51 1358http://www.devttys0.com/2012/12 ... -
embeded LD_PRELOAD
2015-12-28 00:17 512引用 eve@eve:~/squashfs-root$ sud ... -
ubuntu support kindle
2015-12-20 23:13 330引用apt-get install mtpfs -
linux 备份系统
2015-12-05 22:22 386引用备份 dd if=/dev/sda > myimag ... -
[译]root权限运行vlc
2015-11-30 22:19 1264原文地址:http://www.blackmoreops.co ... -
【转】关闭TCP Timestamps来节省一点带宽
2015-10-15 23:29 1581http://highscalability.com/blog ... -
[转]Terminal escape sequences – the new XSS for Linux sysadmins
2015-09-25 23:58 401https://ma.ttias.be/terminal-es ... -
ipython basic
2015-09-25 11:31 420Introspection引用 Using a questio ... -
static in C
2015-09-22 11:35 279jason@ubuntu:~/test$ cat a.c ... -
lxc重命名容器名
2015-09-20 00:25 770lxc-ls 使用文件夹名作为容器名。所以可以更改文件夹名称来 ... -
lxc更新apt源
2015-09-18 11:49 719最近一直在使用lxc创建容器,每次创建一个容器都需要把apt源 ... -
wireshark:Couldn't run /usr/bin/dumpcap in child process: Permission denied
2015-09-11 10:26 3225When start wireshark, I met an ... -
[转]调试python内存泄漏
2015-09-09 00:48 325http://chase-seibert.github.io/ ... -
[转]Python @classmethod and @staticmethod for beginner?
2015-09-07 16:59 340http://stackoverflow.com/questi ...
相关推荐
Hardware Hacking Projects for Geeks 英文chm 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
这个是Game Console Hacking的相关篇目,由于很难找所以从外国网盘拖了回来。仅供于学习参考用途。
10 Hardware Hacking Projects for Around Home.pdf
Game Console Hardware Hacking.rar
一本介绍硬件制作的书,制作出你特有的设备
网络安全渗透测试
Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp.pdf
硬件黑客 有关硬件黑客的一些知识... :electric_plug: :magnifying_glass_tilted_left: :wrench: :laptop:
As integrated circuits (ICs) continue to have an overwhelming presence in our ...chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop...
This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on ...
Atmel's AVR microcontrollers are the go-to chip for many hobbyists and hardware hacking projects. In this book, PROGRAMMING AND INTERFACING ATMEL'S AVRS, you will learn how to program and interface ...
Part V: Hardware Hacking Chapter 12: Introduction to the Arduino Chapter 13: Laser Audio Display Chapter 14: A Raspberry Pi–Based Weather Monitor Appendix A: Software Installation Appendix B: Basic ...
Moving on you will cover malware analysis and Forensis along with hardware hacking. Lastly you will learn how to create an optimum quality pentest report! By the end of this book, you will learn how...
Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp
Part IV: Hardware Hacking Chapter 13: Learning to Hack Hardware Chapter 14: The GPIO Port Chapter 15: The Raspberry Pi Camera Module Chapter 16: Add-On Hardware Part V: Appendixes Appendix A: Python ...
FTDI-Oh-My FTDI FT232H tools for hardware hacking
藏经阁-Hacking Hardware with a $10.pdf
Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp.pdf